Tuesday , August 12 2025
₹5.58 crore

Biometric Clone: ₹5.58 crore loss, 251 accounts in 17 districts

A sophisticated cyber fraud has stolen over ₹5.58 crore from many bank accounts, highlighting serious concerns about digital payment security. This scam involved cloning biometric data and affected 251 accounts in 17 districts. Authorities are working hard to contain the situation and catch those responsible.

The Modus Operandi: A Digital Heist

SoupDealer Malware Bypasses Every Sandbox, AV’s, XDR/EDR in Real-World Incidents

In early August 2025, cybersecurity teams in Türkiye detected a new Java-based loader that avoided detection by all public sandboxes,...
Read More
SoupDealer Malware Bypasses Every Sandbox, AV’s, XDR/EDR in Real-World Incidents

WinRAR Zero-Day and 7-Zip Vulnerability actively exploited

ESET researchers found a zero-day vulnerability in WinRAR for Windows, tracked as CVE-2025-8088, which has been used to run malicious...
Read More
WinRAR Zero-Day and 7-Zip Vulnerability actively exploited

Biometric Clone: ₹5.58 crore loss, 251 accounts in 17 districts

A sophisticated cyber fraud has stolen over ₹5.58 crore from many bank accounts, highlighting serious concerns about digital payment security....
Read More
Biometric Clone: ₹5.58 crore loss, 251 accounts in 17 districts

Google Confirms Data Breach: Notifying Affected Users

Google confirmed that a recent data breach in one of its Salesforce CRM systems exposed information about potential Google Ads...
Read More
Google Confirms Data Breach: Notifying Affected Users

28,000+ Microsoft Exchange Servers Exposed Online for CVE-2025-53786

More than 28,000 unpatched Microsoft Exchange servers are publicly accessible and vulnerable to the critical security flaw CVE-2025-53786, as reported...
Read More
28,000+ Microsoft Exchange Servers Exposed Online for CVE-2025-53786

Google alerts of cloud storage bucket hijacking attacks

Google has unveiled its best practices aimed at thwarting dangling bucket takeovers, encouraging developers to fortify their cloud environments. The...
Read More
Google alerts of cloud storage bucket hijacking attacks

Multiple 0-days to Bypass BitLocker and Extract Data

Researchers revealed critical zero-day vulnerabilities that bypass Windows BitLocker encryption, enabling attackers with physical access to quickly extract data from...
Read More
Multiple 0-days to Bypass BitLocker and Extract Data

Amazon ECS Internal Protocol Exploited to Steal AWS Credentials

Security researchers disclosed a cirtical flaw in Amazon Elastic Container Service (ECS) that enables harmful containers to steal AWS credentials...
Read More
Amazon ECS Internal Protocol Exploited to Steal AWS Credentials

7 Tools for Automated Server Patching

Let’s look at 7 tools for automating patch deployment. Each tool offers unique features for various environments, from small DevOps...
Read More
7 Tools for Automated Server Patching

Germany’s top court rules police may use spyware solely for serious crimes

Germany's top court ruled on Thursday that police can secretly install spy software on phones and computers only for serious...
Read More
Germany’s top court rules police may use spyware solely for serious crimes

Fraudsters exploited a crucial vulnerability in the Aadhaar payment system to clone biometric data and unlawfully access victims’ bank accounts. Most victims were rural residents dependent on local businesses for banking, whose fingerprints and personal information were stolen without their consent. The fraudulent transactions were carried out using business units linked to Fino Payments Bank Limited, which serves remote areas.

A Widespread Network of Deception

The fraud covers 17 districts in Bihar, India, with Araria as the main hub, losing over ₹3.05 crore from 140 accounts. Purnia and Kishanganj also faced significant losses of ₹99.87 lakh and ₹69.82 lakh, respectively. This widespread crime indicates a well-organized and skilled criminal network.

The Human Cost: A Community in Crisis

Most fraud victims come from marginalized communities, losing a significant portion of their savings. Many discovered their accounts empty after depositing their earnings, causing great distress. Complaints have been filed with the National Cyber Crime Reporting Portal (NCRCP), but only a small fraction of the money has been recovered, leaving many in despair.

Questions of Security and Accountability

The bank has reported a leak of confidential customer data, leading to an investigation by the Economic Offences Unit (EOU) of the Bihar Police. The bank is worried about the local police’s slow response and is keen to identify those responsible to prevent further misuse.

Google alerts of cloud storage bucket hijacking attacks

Check Also

7 tools

7 Tools for Automated Server Patching

Let’s look at 7 tools for automating patch deployment. Each tool offers unique features for …

Leave a Reply

Your email address will not be published. Required fields are marked *