Don't forget to click on these seven links
We are all familiar with this proverb - the one who has the power of intellect. And the recent increase in the number of hacking incidents in the country constantly reminds us of this proverb. What a wonderful thing! Hackers all over the world are being able to carry out multiple nefarious activities by inventing various tricks without any heavy physical effort. However, well-known companies are constantly working to protect users from them. Since the main purpose of hacking is to defraud people and steal their hard earned money, the incidence of hacking can be noticed in the banking sector itself. The Indian Computer Emergency Response Team (CERT-IN) under the Ministry of Electronics and Information Technology has warned Indian citizens about a new type of cyber attack centered on online banking.
CERT-IN has issued a guideline stating that fraudsters have created phishing websites to look like the internet banking websites of popular banks in India, and for this they are using the ‘Ngrok’ platform. Already many ordinary people have fallen into their trap. But now the question is, how do you understand that you have been the victim of this new type of fraud? According to CERT-IN, you will receive a message like this - “Dear customer, your xxx bank account will be suspended! Please click on this link (446bdf227fc4.ngrok. (Io) xxxbank) for KYC verification update. ” The moment you click on this link to log in to your internet banking account, your online banking login details and mobile number will be stolen to get the money.
Then, the scammer will enter your details on the actual online banking website and send an OTP to the phone. At the same time the phishing website will also ask you to enter OTP and as soon as you give OTP, the scammer will get it. So, taking proper precautions and precautions is the only and only way to avoid this kind of online hacking. Below are seven types of links that you can avoid if you avoid clicking on them.
1. The name of the bank will be mentioned at the end of the link
A sample phishing link “[http: //] 1a4fa3e03758. ngrok [.] may look like io / xxxbank ”. The xxx part may be the name of the bank mentioned at the end. Such things will never be seen in the links of the original websites.
2. The link may contain KYC elements to fool users
To fool users by clicking on malicious or harmful links, a ‘Ngrok’ link may be used which will contain the word ‘full KYC’. For example, a possible link could be http: //1e2cded18ece.ngrok [.] Io / xxxbank / full-kyc.php.
3. Most bogus links are based on the HTTP protocol instead of HTTPS.
Most malicious links may appear as follows: “http: //1d68ab24386.ngrok [.] Io / xxxbank /” and will be based on the HTTP protocol. Remember, HTTPS is more secure than HTTP and all banking websites are built based on the HTTPS protocol.
4. Some ‘Ngrok’ links are also based on the HTTPS protocol
The link mentions HTTPS but should not be clicked with absolute certainty. Some bogus links like “https: //05388db121b8.sa.ngrok [.] Io / xxxbank /” are built on the HTTPS protocol. However, the name of the bank will always be mentioned at the end of the link.
5. Most fake links will have random numbers and letters
Most links to phishing websites look like "http: //1e61c47328d5.ngrok [.] Io / xxxbank", which always has a combination of random letters and numbers.
. Fake online banking links can be shorted
You can receive an SMS with short links, so that when you click, you will see a link like the one mentioned below - "https: //0936734b982b.ngrok [.] Io / xxxbank /". Whenever you see such a link, always remember that it is a phishing link.
. The same link may appear with the name of a different bank
You can find a link similar to “https: //0e552ef5b876.ngrok [.] Io / xxxbank /”, which will mention the names of different banks at the same time.
0 Comments