<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[The Cyber Chanacya]]></title><description><![CDATA[Cybersecurity Learner | Ethical Hacker in Progress.
Writing with a mindset inspired by Chanakya, focused on digital defense.]]></description><link>https://blog.interintender.com</link><image><url>https://cdn.hashnode.com/res/hashnode/image/upload/v1749203625574/3d2ce7f8-47ab-4466-b71e-dd7458aab1b6.png</url><title>The Cyber Chanacya</title><link>https://blog.interintender.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 29 Apr 2026 11:26:18 GMT</lastBuildDate><atom:link href="https://blog.interintender.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Grafana — CVE-2024-9264]]></title><description><![CDATA[TL;DR
CVE-2024-9264 is a critical vulnerability in Grafana 11.x where the SQL Expressions feature forwards attacker-controlled SQL to a backend (DuckDB), enabling local file reads (LFI) and, in some setups, remote code execution (RCE). In many config...]]></description><link>https://blog.interintender.com/grafana-cve-2024-9264</link><guid isPermaLink="true">https://blog.interintender.com/grafana-cve-2024-9264</guid><category><![CDATA[CVE-2024-9264]]></category><category><![CDATA[Grafana]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Wed, 17 Sep 2025 13:30:41 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1758093192251/8f53fdc2-e78f-4313-b805-36bab96c29a1.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-tldr">TL;DR</h2>
<p>CVE-2024-9264 is a <strong>critical</strong> vulnerability in Grafana 11.x where the SQL Expressions feature forwards attacker-controlled SQL to a backend (DuckDB), enabling local file reads (LFI) and, in some setups, remote code execution (RCE). In many configurations the flaw can be triggered by accounts with <em>Viewer</em>-level access or higher. Grafana released security patches in October 2024 — upgrade to the patched 11.x builds or later immediately.</p>
<h2 id="heading-short-story">Short story</h2>
<p>Imagine a public library where a reader can ask the front desk for a book. The desk clerk fetches only from the public shelves — except there’s a new, eager helper (an automated archive clerk) who will fetch <em>any</em> file the desk asks for. One careless instruction to that helper, and a curious reader ends up handed private files from the staff-only archive. That’s what happened with Grafana’s SQL Expressions: a feature meant for harmless post-processing could be used to ask the backend to read or execute things it shouldn’t.</p>
<h2 id="heading-what-happened-and-why-you-should-care">What happened and why you should care</h2>
<p>Grafana added the SQL Expressions feature to let dashboards do lightweight data transformations on the server. That feature relies on an SQL engine (DuckDB) on the Grafana host to run queries. Due to insufficient sanitization and the presence of DuckDB helpers that can access files or load extensions, an attacker who can submit an expression can trick the engine into reading arbitrary files (like <code>/etc/passwd</code> or <code>/opt/secret.txt</code>) — and in some setups, can even get code execution by loading extensions or abusing functions that call the OS. The vulnerability affects Grafana 11.0.x, 11.1.x and 11.2.x and is tracked as CVE-2024-9264.</p>
<p>Why care? Many organizations expose Grafana to internal teams or the internet. If low-privilege users (or attackers who gain a Viewer account) can run expressions, they can exfiltrate secrets, read config files, and potentially pivot to further compromise. Real-world proof-of-concepts were published soon after disclosure, demonstrating file reads and RCE paths.</p>
<h2 id="heading-technical-deep-dive">Technical deep dive</h2>
<p><strong>Components involved</strong></p>
<ul>
<li><p><strong>Grafana SQL Expressions:</strong> a server-side post-processing datasource that evaluates SQL-like expressions.</p>
</li>
<li><p><strong>DuckDB:</strong> an embeddable SQL engine Grafana can call to execute those expressions. DuckDB exposes helper functions (for example, functions that read text/files or can load extensions).</p>
</li>
<li><p><strong>Unsafe path:</strong> user-supplied input flowed into DuckDB without adequate sandboxing or sanitization, enabling <code>read_text()</code>-style file reads and extension loading.</p>
</li>
</ul>
<p><strong>Typical exploitation flow</strong></p>
<ol>
<li><p>Authenticate (some setups require an account; many PoCs assume Viewer or higher).</p>
</li>
<li><p>Send a POST to Grafana’s expression API (<code>/api/ds/query?ds_type=__expr__&amp;expression=true</code>) with a JSON body where <code>expression</code> contains a DuckDB call such as <code>SELECT * FROM read_text('/opt/flag.txt')</code>.</p>
</li>
<li><p>Grafana forwards the query to DuckDB; DuckDB executes <code>read_text()</code> and returns the file contents inside Grafana’s JSON response. Parsing the response yields the secret. In configurations where extensions like <code>shellfs</code> are available or DuckDB is run with broader privileges, an attacker can escalate to arbitrary command execution.</p>
</li>
</ol>
<p><strong>Conditions that make the exploit possible</strong></p>
<ul>
<li><p>Grafana 11.0–11.2 with SQL Expressions enabled (default in some builds).</p>
</li>
<li><p>DuckDB or vulnerable helper functions accessible to Grafana (in PATH or installed).</p>
</li>
<li><p>An account that can call the Expressions API — PoCs show Viewer-level accounts may be sufficient.</p>
</li>
</ul>
<h2 id="heading-fix-amp-mitigation">Fix &amp; mitigation</h2>
<p><strong>Immediate (do now)</strong></p>
<ol>
<li><p><strong>Upgrade Grafana</strong> to a patched release. Grafana published security patch releases for 11.0.x, 11.1.x and 11.2.x on Oct 17, 2024 — upgrade to the recommended <code>+security</code> builds or later.</p>
</li>
<li><p><strong>If you can’t upgrade immediately, disable or restrict Expressions:</strong> remove or disable the Expression datasource, or restrict its usage to trusted admin roles only.</p>
</li>
<li><p><strong>Remove DuckDB from PATH</strong> on systems that don’t need it for Grafana, and avoid installing risky DuckDB extensions (e.g., community extensions that allow shell access).</p>
</li>
<li><p><strong>Contain Grafana’s runtime:</strong> run Grafana with least privilege (dedicated non-root user, minimal FS permissions, read-only root if possible, container seccomp/AppArmor).</p>
</li>
</ol>
<p><strong>Detect &amp; monitor</strong></p>
<ul>
<li><p>Log and alert on calls to <code>/api/ds/query</code> (Expression API), especially queries containing suspicious functions like <code>read_text</code>, <code>ATTACH</code>, <code>load_extension</code>, or long multi-line SQL.</p>
</li>
<li><p>Search historic logs for <code>read_text</code> or unusual /api/ds/query payloads to detect past exploitation attempts.</p>
</li>
<li><p>Monitor outbound connections and unusual processes launched by Grafana host.</p>
</li>
</ul>
<p><strong>Longer-term</strong></p>
<ul>
<li><p>Harden host OS with file ACLs so Grafana’s process user cannot read sensitive files.</p>
</li>
<li><p>Consider network segmentation: avoid exposing Grafana dashboards to untrusted networks if not necessary.</p>
</li>
</ul>
<h2 id="heading-responsible-disclosure-amp-precautions">Responsible disclosure &amp; precautions</h2>
<ul>
<li><p>If you find this behavior on a <strong>production</strong> Grafana, <strong>do not</strong> run exploit PoCs on those systems. Instead, take the instance offline or restrict access and patch immediately. If you are a defender, gather logs and follow your incident response process.</p>
</li>
<li><p>If you’re a researcher, disclose findings responsibly to vendor (Grafana Labs) per their policy before posting exploit details publicly. Grafana already released advisories and patches in Oct 2024.</p>
</li>
</ul>
<p><strong><em>CVE-2024-9264 is a reminder that powerful features (server-side expression engines, embedded SQL runtimes) increase attack surface. The fix is straightforward: patch, restrict, and harden. Treat server-side evaluation capabilities as untrusted input sinks and apply the same distrust you’d apply to user input on any public-facing service.</em></strong></p>
<h2 id="heading-references">References</h2>
<ul>
<li><p>Grafana Labs — Security release &amp; advisory for CVE-2024-9264.</p>
</li>
<li><p>NVD / CVE entry for CVE-2024-9264.</p>
</li>
<li><p>Public PoC repositories demonstrating file-read and RCE techniques.</p>
</li>
<li><p>Technical writeups and vendor analyses (Wiz / Indusface / Tenable coverage summaries).</p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[CVE-2024-4956 — Nexus Repository 3 Path Traversal (no login needed)]]></title><description><![CDATA[TL;DR

What: An unauthenticated path traversal in Sonatype Nexus Repository 3 lets anyone craft a URL that makes Nexus return any file on the server—even outside the app folder. No login required. Fixed in 3.68.1.

Affected: All Nexus Repository 3.x ...]]></description><link>https://blog.interintender.com/cve-2024-4956-nexus-repository-3-path-traversal-no-login-needed</link><guid isPermaLink="true">https://blog.interintender.com/cve-2024-4956-nexus-repository-3-path-traversal-no-login-needed</guid><category><![CDATA[CVE-2024-4956]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Sun, 14 Sep 2025 13:30:09 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1757700989082/7fe028c0-e722-41e0-b1cc-ac2d48894288.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-tldr">TL;DR</h2>
<ul>
<li><p><strong>What:</strong> An <strong>unauthenticated path traversal</strong> in <strong>Sonatype Nexus Repository 3</strong> lets anyone craft a URL that makes Nexus return <strong>any file</strong> on the server—even outside the app folder. <strong>No login required.</strong> Fixed in <strong>3.68.1</strong>.</p>
</li>
<li><p><strong>Affected:</strong> <strong>All Nexus Repository 3.x up to and including 3.68.0</strong> (OSS &amp; Pro). Update to <strong>3.68.1+</strong>.</p>
</li>
<li><p><strong>Risk:</strong> Exposure of sensitive files (credentials, configs) → possible <strong>pipeline compromise</strong>; public <strong>PoCs</strong> exist.</p>
</li>
<li><p><strong>Fix now:</strong> <strong>Upgrade</strong> to 3.68.1+; if you truly can’t yet, apply Sonatype’s <strong>temporary mitigations</strong> (Jetty change or WAF rule).</p>
</li>
</ul>
<h2 id="heading-a-simple-story-the-library-window-that-gave-any-book">A simple story: “The library window that gave any book”</h2>
<p>Think of your Nexus server as a big library. The front desk should hand out only the books that are in the public shelf.</p>
<p>But there’s a <strong>side window</strong> with a sign: “Give me a note with the book path, I’ll fetch it.”<br />A stranger slips in a note with a <strong>tricky path</strong> that walks past the public shelf, down the hallway, and into the <strong>staff-only archive</strong>. The librarian at the window doesn’t notice the trick; they simply follow the path and hand back <strong>whatever book</strong> was requested.</p>
<p>That’s CVE-2024-4956 in spirit: the server <strong>doesn’t block</strong> path segments that escape the public area, so a crafted URL can return <strong>arbitrary files</strong> without authentication.</p>
<h2 id="heading-what-exactly-is-cve-2024-4956">What exactly is CVE-2024-4956?</h2>
<ul>
<li><p><strong>Bug class:</strong> <strong>Path Traversal</strong> (CWE-22). The HTTP handler accepts paths that include traversal sequences, letting a request reach files <strong>outside</strong> Nexus’s intended scope.</p>
</li>
<li><p><strong>Impact:</strong> <strong>Arbitrary file read</strong> by unauthenticated users (confidentiality impact <strong>High</strong>). Sonatype/NVD confirm fix in <strong>3.68.1</strong>.</p>
</li>
<li><p><strong>Scope:</strong> <strong>All 3.x up to 3.68.0</strong> (OSS/Pro). Sonatype’s advisory urges <strong>immediate upgrade</strong> and notes public PoCs began circulating shortly after disclosure.</p>
</li>
</ul>
<h2 id="heading-why-it-matters">Why it matters</h2>
<ul>
<li><p><strong>Secrets exposure:</strong> Files like service configs, tokens, keys, or build credentials might be exposed. That can <strong>cascade</strong> into source theft or CI/CD takeover.</p>
</li>
<li><p><strong>Low bar to entry:</strong> No account. A <strong>single URL</strong> can be enough.</p>
</li>
<li><p><strong>Exploitation in the wild:</strong> Public PoCs and scanning appeared days after the advisory. Treat as <strong>urgent</strong>.</p>
</li>
</ul>
<h2 id="heading-technical-quick-look">Technical quick look</h2>
<ul>
<li><p><strong>Root cause:</strong> A web route exposed a <strong>filesystem-backed resource</strong> without properly preventing <code>../</code>-style traversal (or equivalent encodings), letting requests reach files beyond the app’s public directory.</p>
</li>
<li><p><strong>Fixed in:</strong> <strong>3.68.1</strong>, which removes the unsafe behavior. Release notes call out a <strong>critical vulnerability</strong> fixed in this version.</p>
</li>
<li><p><strong>Temporary mitigations:</strong></p>
<ul>
<li><p><strong>Jetty config change:</strong> remove the <code>resourceBase</code> mapping to the <code>public</code> dir in <code>etc/jetty/jetty.xml</code> (side effect: some favicon/asset files won’t load).</p>
</li>
<li><p><strong>AWS WAF:</strong> enable <strong>GenericLFI_URIPATH</strong> rule if fronted by AWS WAF; Sonatype verified it blocks known exploit patterns.</p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-how-its-typically-exploited">How it’s typically exploited</h2>
<ol>
<li><p>Attacker identifies a public Nexus endpoint.</p>
</li>
<li><p>They send a <strong>crafted URL</strong> with traversal sequences to request a <strong>specific file path</strong>.</p>
</li>
<li><p>The server <strong>returns the file</strong> as a download—even if it lives outside Nexus’s web root. (In vulnerable versions only.)</p>
</li>
</ol>
<blockquote>
<p>Note: Exploit DB and various blogs host PoCs, confirming practical exploitation against vulnerable builds. <strong>Do not</strong> test against systems you don’t own.</p>
<p><a target="_blank" href="https://github.com/amalpvatayam67/day04-nexus-4956">https://github.com/amalpvatayam67/day04-nexus-4956</a></p>
</blockquote>
<h2 id="heading-detection-quick-wins-for-defenders">Detection: quick wins for defenders</h2>
<ul>
<li><p><strong>Access logs:</strong> Hunt for <code>../</code> patterns (and encoded variants), unusual requests for <code>/etc/…</code>, <code>C:\Windows\…</code>, or other sensitive paths from the Nexus host OS.</p>
</li>
<li><p><strong>Spike watch:</strong> Sudden <strong>404/200</strong> patterns or large <strong>downloads</strong> from unknown IPs targeting non-repository paths.</p>
</li>
<li><p><strong>Robots check for mitigation:</strong> If you followed Sonatype’s Jetty mitigation, requesting <code>/robots.txt</code> should now return <strong>404</strong> (because <code>public/</code> is no longer served).</p>
</li>
</ul>
<h2 id="heading-how-to-fix-priority-order">How to fix (priority order)</h2>
<ol>
<li><p><strong>Upgrade to 3.68.1 or newer</strong> (recommended)<br /> This permanently closes the vulnerability for all Nexus Repository 3 instances.</p>
</li>
<li><p><strong>If you absolutely cannot upgrade yet (temporary)</strong></p>
<ul>
<li><p><strong>Jetty config:</strong> Remove the <code>resourceBase</code> line in <code>etc/jetty/jetty.xml</code>, restart, and verify <code>/robots.txt</code> is 404. Expect minor UI icon issues; they’re harmless.</p>
</li>
<li><p><strong>WAF filter:</strong> Apply <strong>AWS WAF GenericLFI_URIPATH</strong> rule if using AWS edge; Sonatype validated this mitigates known exploit paths.</p>
</li>
</ul>
</li>
<li><p><strong>Hardening checklist</strong></p>
<ul>
<li><p>Restrict external exposure of Nexus (VPN, IP allowlists).</p>
</li>
<li><p>Put Nexus <strong>behind a reverse proxy</strong> with LFI/Traversal signatures blocked.</p>
</li>
<li><p>Rotate credentials that might reside on the host if you suspect exposure (Sonatype recommends this out of caution).</p>
</li>
</ul>
</li>
</ol>
<h2 id="heading-sources-amp-further-reading">Sources &amp; further reading</h2>
<ul>
<li><p><strong>Sonatype advisory:</strong> affected versions, fix, PoC notice, recommendations.</p>
</li>
<li><p><strong>NVD:</strong> brief description, CWE-22, fixed in 3.68.1.</p>
</li>
<li><p><strong>Sonatype mitigations:</strong> Jetty edit + AWS WAF rule, with verification steps.</p>
</li>
<li><p><strong>Release notes:</strong> 3.68.1 “critical vulnerability fix.”</p>
</li>
<li><p><strong>Analyst overviews / PoC discussions:</strong> Wiz, SOCRadar, Exploit-DB.</p>
</li>
</ul>
<h2 id="heading-disclaimer">Disclaimer</h2>
<p>This article is for <strong>educational and defensive purposes only</strong>. Test only on systems you <strong>own</strong> or where you have <strong>explicit written permission</strong>. Unauthorized access is illegal. Always follow your organization’s change-management process and <strong>patch promptly</strong>.</p>
]]></content:encoded></item><item><title><![CDATA[Jenkins with no login — CVE-2024-23897]]></title><description><![CDATA[TL;DR

What: A flaw in the Jenkins CLI lets an attacker read files on the Jenkins server using a special “@file” trick in command arguments. In many setups, this works without logging in (unauthenticated), though it may initially reveal only the firs...]]></description><link>https://blog.interintender.com/jenkins-with-no-login-cve-2024-23897</link><guid isPermaLink="true">https://blog.interintender.com/jenkins-with-no-login-cve-2024-23897</guid><category><![CDATA[Jenkins]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Sat, 13 Sep 2025 14:00:35 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1757699249158/ddd40d3f-8c56-4876-8ddd-bdb9fa55b3ab.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-tldr">TL;DR</h2>
<ul>
<li><p><strong>What:</strong> A flaw in the <strong>Jenkins CLI</strong> lets an attacker read files on the Jenkins server using a special “@file” trick in command arguments. In many setups, this works <strong>without logging in</strong> (unauthenticated), though it may initially reveal only the <strong>first few lines</strong> of a file; with minimal read rights it can reveal <strong>full files</strong>.</p>
</li>
<li><p><strong>Why it matters:</strong> Reading sensitive files (tokens, keys) can <strong>cascade into RCE</strong> under certain conditions.</p>
</li>
<li><p><strong>Affected:</strong> Jenkins <strong>2.441 and earlier</strong> (weekly) and <strong>LTS 2.426.2 and earlier</strong>. Fixed in <strong>2.442</strong>, <strong>LTS 2.426.3</strong>, and <strong>LTS 2.440.1</strong>.</p>
</li>
<li><p><strong>Fix now:</strong> <strong>Upgrade</strong> to a fixed version. As a short-term workaround, <strong>disable the CLI</strong>.</p>
</li>
</ul>
<h2 id="heading-a-simple-story-the-helper-who-read-the-wrong-note">A simple story: “The helper who read the wrong note”</h2>
<p>Imagine your Jenkins is a busy office. There’s a helpful clerk at the door called <strong>CLI</strong>. You can hand this clerk a note (a command), and they’ll read it to Jenkins.</p>
<p>One day, a stranger passes a note that says: “Read what’s in <strong>@/etc/passwd</strong>.” The clerk has a habit: when a note includes <strong>@path</strong>, they quietly <strong>open that file</strong> and put its contents into the note before handing it to Jenkins. The clerk doesn’t even check <strong>who</strong> handed the note!</p>
<p>Result: the stranger learns what’s inside a file on your server—possibly secrets. That’s <strong>CVE-2024-23897</strong> in spirit: a convenience feature in the CLI that replaces <strong>@filename</strong> with the file’s contents, which attackers can abuse remotely</p>
<h2 id="heading-what-exactly-is-cve-2024-23897">What exactly is CVE-2024-23897?</h2>
<ul>
<li><p><strong>Root cause:</strong> Jenkins’s CLI uses a command parser (from <a target="_blank" href="https://www.jenkins.io/security/advisory/2024-01-24/"><strong>args4j</strong></a>) with a feature called <strong>expandAtFiles</strong>. If an argument contains <code>@/path/to/file</code>, the parser replaces it with the <strong>contents</strong> of that file. In vulnerable versions, this feature wasn’t disabled.</p>
</li>
<li><p><strong>Impact:</strong></p>
<ul>
<li><p><strong>No login:</strong> Attackers <strong>without</strong> Overall/Read permission can often read the <strong>first few lines</strong> of arbitrary files (how many lines depends on available CLI commands).</p>
</li>
<li><p><strong>Low read rights:</strong> Attackers <strong>with</strong> Overall/Read permission can read <strong>entire files</strong>.</p>
</li>
<li><p><strong>Chaining:</strong> Reading certain <strong>binary secrets/keys</strong> can enable <strong>RCE</strong> through follow-on tricks the Jenkins team documented.</p>
</li>
</ul>
</li>
<li><p><strong>Affected &amp; fixed versions:</strong> Affected up to <strong>2.441</strong> (weekly) and <strong>LTS 2.426.2</strong>. Fixed in <strong>2.442</strong>, <strong>LTS 2.426.3</strong>, and <strong>LTS 2.440.1</strong>—these builds <strong>disable</strong> the @file behavior in CLI.</p>
</li>
</ul>
<h2 id="heading-why-no-login-matters">Why “no login” matters</h2>
<p>Because the CLI endpoint can be reachable on many Jenkins installs, an outsider may trigger the @file expansion <strong>without authentication</strong>, at least to leak the <strong>first lines</strong> of files. Those lines can still be dangerous (think config headers or keys). With minimal read permission, the floodgates open to <strong>entire files</strong>.</p>
<h2 id="heading-a-safe-local-lab-demo-so-you-understand-the-shape-of-the-bug">A safe, local-lab demo (so you understand the shape of the bug)</h2>
<blockquote>
<p><strong>Practice only in your own isolated lab. Do not touch systems you don’t own. See disclaimer below.</strong></p>
<p><a target="_blank" href="https://github.com/amalpvatayam67/day03-jenkins-23897">https://github.com/amalpvatayam67/day03-jenkins-23897</a></p>
</blockquote>
<ol>
<li><p><strong>Get the CLI jar from your lab Jenkins (typical path):</strong></p>
<pre><code class="lang-bash"> curl -fsS http://localhost:8080/jnlpJars/jenkins-cli.jar -o jenkins-cli.jar
</code></pre>
</li>
<li><p><strong>Run a harmless command, but pass an argument that references a local file via ‘@’</strong></p>
<pre><code class="lang-bash"> java -jar jenkins-cli.jar -s http://localhost:8080 <span class="hljs-built_in">help</span> <span class="hljs-string">"@/etc/passwd"</span>
</code></pre>
</li>
</ol>
<p>If vulnerable, the parser tries to <strong>inline</strong> the file content where <code>@/etc/passwd</code> appears, and portions may leak in the output—<strong>even without logging in</strong>. (Exact behavior varies with version/commands; newer fixed versions <strong>block</strong> this.)</p>
<h2 id="heading-how-this-can-escalate">How this can escalate</h2>
<p>The Jenkins team showed that reading certain <strong>binary secrets</strong> can enable paths to <strong>RCE</strong> (e.g., via Resource Root URLs or forging “Remember me” cookies), depending on settings and what secrets you can steal. That’s why they treat this as <strong>critical</strong> and not “just file read.”</p>
<h2 id="heading-how-to-fix-priority-order">How to fix (priority order)</h2>
<ol>
<li><p><strong>Upgrade Jenkins immediately</strong></p>
<ul>
<li><p>Weekly: <strong>2.442</strong> or newer</p>
</li>
<li><p>LTS: <strong>2.426.3</strong> or <strong>2.440.1</strong> (or newer)<br />  These versions <strong>disable the @file expansion</strong> in CLI.</p>
</li>
</ul>
</li>
<li><p><strong>Short-term workaround (if you can’t upgrade yet): Disable the CLI</strong><br /> Jenkins provides a documented method to <strong>disable CLI access</strong>; doing so <strong>prevents exploitation</strong>. (This doesn’t require a restart.) Treat this only as a <strong>temporary</strong> measure.</p>
</li>
<li><p><strong>Harden access</strong></p>
<ul>
<li><p>Ensure <strong>anonymous</strong> users have <strong>no permissions</strong>.</p>
</li>
<li><p><a target="_blank" href="https://www.jenkins.io/security/advisory/2024-01-24/">Limit</a> network exposure of <strong>/cli</strong> (and the CLI WebSocket) behind a reverse proxy/VPN.</p>
</li>
<li><p>While you’re patching 23897, also make sure you’re covered for the related <strong>WebSocket/CLI origin validation issue (CVE-2024-23898)</strong> by upgrading to the same fixed versions.</p>
</li>
</ul>
</li>
</ol>
<h2 id="heading-disclaimer">Disclaimer</h2>
<p>This article is for <strong>educational and defensive purposes only</strong>. Test <strong>only</strong> in environments you own or have <strong>explicit written permission</strong> to assess. Unauthorized access to computer systems is illegal. Always <strong>patch promptly</strong>, follow your organization’s change-management process, and coordinate with your security team.</p>
<h2 id="heading-sources">Sources</h2>
<ul>
<li><p><strong>Jenkins Security Advisory (Jan 24, 2024):</strong> root cause, affected/fixed versions, unauthenticated partial file read, escalation scenarios, and workarounds.</p>
</li>
<li><p><strong>NVD CVE page:</strong> concise description of the @file argument expansion leading to arbitrary file read.</p>
</li>
<li><p><strong>Rapid7 / Qualys / others:</strong> impact write-ups, scanning and detection context.</p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[SSRF — When a Server Makes the Wrong Call]]></title><description><![CDATA[TL;DR

What: SSRF happens when an application lets a user supply a URL, and the server fetches it.

Why it’s bad: The server sits inside a trusted network, so it can be tricked into calling localhost or internal services you can’t reach from the inte...]]></description><link>https://blog.interintender.com/ssrf-when-a-server-makes-the-wrong-call</link><guid isPermaLink="true">https://blog.interintender.com/ssrf-when-a-server-makes-the-wrong-call</guid><category><![CDATA[ssrf ]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Fri, 12 Sep 2025 17:16:50 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1757697039316/93913422-87c3-41f2-bc99-27efe06a2c51.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-tldr">TL;DR</h2>
<ul>
<li><p><strong>What:</strong> SSRF happens when an application lets a user supply a URL, and the <strong>server</strong> fetches it.</p>
</li>
<li><p><strong>Why it’s bad:</strong> The server sits inside a trusted network, so it can be tricked into calling <a target="_blank" href="http://localhost"><strong>localhost</strong></a> or <strong>internal services</strong> you can’t reach from the internet.</p>
</li>
<li><p><strong>Impact:</strong> Read “internal-only” data, scan private networks, hit cloud <strong>metadata endpoints</strong>, pivot to other attacks.</p>
</li>
<li><p><strong>Fix:</strong> <strong>Allowlist</strong> destinations, <strong>block private/loopback IPs</strong>, restrict protocols &amp; redirects, <strong>pin DNS</strong>, and add <strong>egress firewalls</strong> + logging.</p>
</li>
</ul>
<h2 id="heading-a-simple-story-the-messenger-who-trusts-every-address">A simple story: “The messenger who trusts every address”</h2>
<p>Think of your app as a helpful messenger. Users hand it an address (a URL), and it dutifully runs to fetch the content.<br />One day, a clever stranger gives the messenger a special address: <strong>“please deliver this to <em>your own back door</em> and bring me whatever you find there.”</strong><br />Because the messenger lives <strong>inside</strong> the building, it can open doors outsiders cannot. It grabs a note from a private room and brings it back.<br />That’s <strong>SSRF</strong>: the attacker can’t reach the private room directly, but they convince <strong>your server</strong>—which <em>can</em>—to go there on their behalf.</p>
<h2 id="heading-what-exactly-is-ssrf">What exactly is SSRF?</h2>
<p><strong>Server-Side Request Forgery</strong> is a class of bugs where the server performs a network request to a user-controlled URL. If not restricted, attackers can:</p>
<ul>
<li><p>Reach <a target="_blank" href="http://localhost"><strong>localhost</strong></a> (<code>127.0.0.1</code>, <code>::1</code>) services (admin panels, dev dashboards).</p>
</li>
<li><p>Reach <strong>private subnets</strong> (e.g., <code>10.0.0.0/8</code>, <code>172.16.0.0/12</code>, <code>192.168.0.0/16</code>).</p>
</li>
<li><p>Query <strong>link-local</strong>/special IPs (e.g., cloud <strong>instance metadata</strong>).</p>
</li>
<li><p>Sometimes abuse <strong>non-HTTP protocols</strong> (if the stack allows them).</p>
</li>
</ul>
<p>Two common flavors:</p>
<ul>
<li><p><strong>Classic SSRF:</strong> you see the internal response in the app’s output.</p>
</li>
<li><p><strong>Blind SSRF:</strong> no visible response; success is inferred (e.g., via DNS logs or timing).</p>
</li>
</ul>
<h2 id="heading-where-ssrf-often-appears">Where SSRF often appears</h2>
<ul>
<li><p>“<strong>Fetch a URL</strong>” features: link previewers, image fetchers, PDF/thumbnail generators.</p>
</li>
<li><p><strong>Webhooks</strong> and <strong>integrations</strong> that pull data from third-party URLs.</p>
</li>
<li><p>“<strong>Import from URL</strong>” in CMS/commerce backends.</p>
</li>
<li><p>Microservices that offer <strong>proxy</strong> or <strong>redirect</strong> functionality.</p>
</li>
</ul>
<h2 id="heading-why-its-powerful-even-without-code-execution">Why it’s powerful (even without code execution)</h2>
<ul>
<li><p><strong>Data exposure:</strong> internal flags, config pages, health checks, open dashboards.</p>
</li>
<li><p><strong>Network pivot:</strong> internal port scanning via timing/response differences.</p>
</li>
<li><p><strong>Cloud secrets:</strong> access to metadata services if not locked down.</p>
</li>
<li><p><strong>Chaining:</strong> SSRF can be combined with deserialization, template injection, or misconfigured credentials for bigger impact.</p>
</li>
</ul>
<h2 id="heading-how-attackers-make-requests-sneak-past-filters">How attackers make requests sneak past filters</h2>
<ul>
<li><p><strong>Alternate IP notations:</strong> <code>127.1</code>, decimal <code>2130706433</code>, hex <code>0x7f000001</code>, IPv6/IPv4-mapped.</p>
</li>
<li><p><strong>Redirects:</strong> start at an allowed host, then <code>301/302</code> to private IPs.</p>
</li>
<li><p><strong>DNS tricks:</strong> <strong>DNS rebinding</strong>—hostname resolves to a public IP first, then to a private IP.</p>
</li>
<li><p><strong>Protocol confusion:</strong> <a target="_blank"><code>file://</code></a>, <code>gopher://</code>, etc. (depends on your stack).</p>
</li>
</ul>
<blockquote>
<p>Never test outside your own lab or with explicit permission.</p>
</blockquote>
<h2 id="heading-how-to-defend">How to defend</h2>
<ol>
<li><p><strong>Hard allowlist of destinations</strong><br /> Only permit requests to <strong>specific hosts/paths</strong> you control. Avoid “allow any URL”.</p>
</li>
<li><p><strong>Block dangerous IP ranges (v4 &amp; v6)</strong><br /> Reject loopback, link-local, private, multicast, and unrouted ranges. Re-validate on <strong>every redirect</strong>.</p>
</li>
<li><p><strong>Pin DNS &amp; re-check redirects</strong><br /> Resolve the hostname once, connect to that IP (avoid DNS rebinding), and <strong>disable or cap redirects</strong>.</p>
</li>
<li><p><strong>Restrict protocol &amp; method</strong><br /> Allow <strong>http/https only</strong>; disallow <a target="_blank"><code>file://</code></a>, <code>gopher://</code>, etc. Enforce short timeouts and response size limits.</p>
</li>
<li><p><strong>Egress network controls</strong><br /> Firewalls/proxies so the app <strong>cannot</strong> reach private ranges or metadata endpoints unless explicitly needed.</p>
</li>
<li><p><strong>Cloud hardening</strong></p>
<ul>
<li><p>AWS: enforce <strong>IMDSv2</strong>, least-privilege IAM roles.</p>
</li>
<li><p>GCP/Azure: require protective headers/firewalling for metadata; least privilege everywhere.</p>
</li>
</ul>
</li>
<li><p><strong>Observability</strong><br /> Log <strong>full target</strong> (scheme, host, resolved IP). Alert on requests to private/link-local ranges, weird encodings, or sudden spikes.</p>
</li>
</ol>
]]></content:encoded></item><item><title><![CDATA[CVE-2025-54236 (aka “SessionReaper”) — What it is, why it matters, and how to fix it]]></title><description><![CDATA[TL;DR

What: A critical bug in Adobe Commerce / Magento Open Source that lets an attacker take over customer accounts via the Commerce API (no login or clicks needed).

Severity: CVSS 9.1 — High impact to confidentiality and integrity; no user intera...]]></description><link>https://blog.interintender.com/sessionreaper</link><guid isPermaLink="true">https://blog.interintender.com/sessionreaper</guid><category><![CDATA[CVE-2025-54236]]></category><category><![CDATA[infosec]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Thu, 11 Sep 2025 17:00:59 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1757572821276/5d4cd7ec-1da1-4309-9757-014642f50fce.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-tldr">TL;DR</h2>
<ul>
<li><p><strong>What:</strong> A critical bug in <strong>Adobe Commerce / Magento Open Source</strong> that lets an attacker <strong>take over customer accounts</strong> via the Commerce API (no login or clicks needed).</p>
</li>
<li><p><strong>Severity:</strong> CVSS 9.1 — <strong>High impact</strong> to confidentiality and integrity; <strong>no user interaction</strong> required.</p>
</li>
<li><p><strong>Fix:</strong> <strong>Apply Adobe’s hotfix immediately</strong> (and/or update to the latest secure release); Adobe has also pushed <strong>WAF rules</strong> for cloud customers.</p>
</li>
<li><p><strong>Nickname:</strong> Many researchers refer to it as <strong>“SessionReaper.”</strong></p>
</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1757573455224/1e72b78d-5e74-4035-b43d-645907360a72.png" alt="The checkout that trusted too much" class="image--center mx-auto" /></p>
<h2 id="heading-a-simple-story-the-checkout-that-trusted-too-much">A simple story: “The checkout that trusted too much”</h2>
<p>Imagine you run an online store. Your site uses an API to handle customer actions (login, cart, checkout). Normally, the API checks inputs strictly: <em>Is this value a number? Is this field allowed?</em></p>
<p>Now imagine a sneaky attacker sends a specially shaped API request that slips past those checks. Your site <strong>accepts something it shouldn’t</strong>, and the attacker ends up <strong>walking into a real customer’s account</strong>—seeing their orders, addresses, maybe even placing orders as them. That’s CVE-2025-54236 in spirit: <strong>poor input validation</strong> in the API layer can be twisted into <strong>session/account takeover</strong>.</p>
<h2 id="heading-what-exactly-is-cve-2025-54236">What exactly is CVE-2025-54236?</h2>
<ul>
<li><p><strong>Type:</strong> Improper Input Validation (<strong>CWE-20</strong>) in Adobe Commerce / Magento’s web API path.</p>
</li>
<li><p><strong>Impact:</strong> <strong>Security feature bypass → session/account takeover</strong> (attacker can hijack a customer account without their interaction).</p>
</li>
<li><p><strong>Scope / versions:</strong> Adobe lists wide impact across <strong>2.4.x lines</strong> (Commerce &amp; Magento Open Source); a <strong>hotfix</strong> is available and recommended now. Some advisories also mention certain <strong>B2B</strong> versions and the <strong>Custom Attributes Serializable</strong> module depending on your setup. Always check Adobe’s current bulletin for your exact version.</p>
</li>
<li><p><strong>Risk level:</strong> <strong>CVSS 9.1</strong> (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). In plain English: exploitable over the network, easy to do, no login, no user click, and high data and integrity impact.</p>
</li>
<li><p><strong>Extra context from researchers:</strong> Some researchers say that <strong>under certain conditions</strong> the flaw can be extended further (e.g., towards RCE in complex environments). Treat it as <strong>urgent</strong></p>
</li>
</ul>
<h2 id="heading-why-its-dangerous-in-non-technical-terms">Why it’s dangerous (in non-technical terms)</h2>
<ul>
<li><p><strong>No customer action needed:</strong> Victims don’t have to click anything.</p>
</li>
<li><p><strong>Steals trust:</strong> Attackers can place orders, view addresses, or change details as if they were the real customer.</p>
</li>
<li><p><strong>Hard to notice:</strong> Looks like a normal user session in your logs—<em>but it’s not</em>.</p>
</li>
</ul>
<h2 id="heading-technical-deep-dive">Technical deep dive</h2>
<h3 id="heading-root-cause-high-level">Root cause (high level)</h3>
<p>The <strong>web API layer</strong> (e.g., REST/GraphQL/SOAP) <strong>insufficiently validates nested input</strong> structures. With carefully crafted payloads, an attacker can <strong>bypass intended checks</strong> in request processing and pivot to <strong>session takeover</strong>. (Researchers point to the <strong>ServiceInputProcessor</strong> area as key.)</p>
<h3 id="heading-why-authentication-isnt-required">Why authentication isn’t required</h3>
<p>NVD’s vector shows <strong>PR:N / UI:N</strong> — no prior login and no clicks. That means the <strong>first request</strong> an attacker sends can already trigger the vulnerable code path if the store is unpatched.</p>
<h3 id="heading-what-youd-see-in-the-logs-what-to-hunt-for">What you’d see in the logs (what to hunt for)</h3>
<ul>
<li><strong>Unusual API traffic</strong> to Commerce endpoints (REST/GraphQL) with <strong>nested / un</strong></li>
</ul>
<ul>
<li><p><strong>expected JSON shapes</strong>.</p>
</li>
<li><p><strong>Account anomalies</strong>: multiple sessions for the same customer from <strong>new IPs/ASNs</strong> close together.</p>
</li>
<li><p><strong>Spike in 4xx/5xx near API auth or customer endpoints</strong>, followed by normal 200s for account actions.<br />  (These are general hunting ideas; confirm against your environment and WAF/IDS.)<br />  Vendor notes also mention <strong>WAF rules</strong> pushed for Commerce Cloud to block known exploit patterns. Check WAF logs for blocks linked to this CVE.</p>
</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1757574026998/4cd9031d-de5e-4268-aeb1-a7c18ad51bd3.png" alt="How to fix" class="image--center mx-auto" /></p>
<h2 id="heading-how-to-fix-priority-order">How to fix (priority order)</h2>
<ul>
<li><p><strong>Apply Adobe’s hotfix immediately.</strong><br />  Adobe published an <strong>out-of-band hotfix</strong> and recommends updating to the newest secure version as soon as possible. Follow Adobe’s bulletin for steps and compatibility (2.4.4–2.4.7 hotfix package; see latest notes for newer trains).</p>
</li>
<li><p><strong>Enable/verify WAF rules.</strong><br />  If you’re on Adobe Commerce Cloud, Adobe has <strong>deployed WAF mitigations</strong>. Make sure they’re active and monitor for blocks related to this CVE.</p>
</li>
<li><p><strong>Audit extensions &amp; custom code.</strong><br />  Even when core is patched, <strong>old extensions</strong> that touch request processing can re-introduce weaknesses. Review any modules that <strong>extend API request handling</strong> or customer/session flows. (Vendors warn stores can stay unstable if extensions are outdated.)</p>
</li>
<li><p><strong>Rotate sensitive tokens &amp; review sessions.</strong><br />  After patching, <strong>invalidate active customer sessions</strong> and <strong>rotate API keys/tokens</strong> as a precaution.</p>
</li>
<li><p><strong>Monitor &amp; test.</strong></p>
<ul>
<li><p>Add temporary <strong>rate limits</strong> and <strong>anomaly detection</strong> on customer/account endpoints.</p>
</li>
<li><p>Create a <strong>negative test suite</strong> with malformed/nested payloads to ensure the hotfix blocks them.</p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-sources-amp-further-reading">Sources &amp; further reading</h2>
<ul>
<li><p><strong>NVD</strong>: CVE-2025-54236 (improper input validation; session takeover; CVSS 9.1; UI:N, PR:N).</p>
</li>
<li><p><strong>Adobe Security Bulletin / Hotfix</strong> (APS<strong>B</strong> link; installation guidance, supported ranges, acknowledgements).</p>
</li>
<li><p><strong>Adobe Experience League KCS</strong> (account takeover via Commerce REST API).</p>
</li>
<li><p><strong>The Hacker News</strong> (overview, affected versions, WAF note, “SessionReaper” name).</p>
</li>
<li><p><strong>Sansec research</strong> (technical context; potential for broader impact under certain conditions).</p>
</li>
<li><p><strong>Tenable / CVE Details</strong> (concise vendor-agnostic summaries).</p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Inside the World of Malware: A Global Journey Through Cyber Threats]]></title><description><![CDATA[Welcome, seekers of cyber wisdom, to Inside the World of Malware. In this journey, we’ll explore how malicious software operates, uncover its various forms, and witness its real-world consequences.
The Anatomy of Malware
Malware—short for malicious s...]]></description><link>https://blog.interintender.com/malware-cyber-threats</link><guid isPermaLink="true">https://blog.interintender.com/malware-cyber-threats</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Malware]]></category><category><![CDATA[#CyberThreats]]></category><category><![CDATA[infosec]]></category><category><![CDATA[hacking]]></category><category><![CDATA[ransomware]]></category><category><![CDATA[cyberattack]]></category><category><![CDATA[#onlinesafety]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Sat, 09 Aug 2025 11:17:09 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1754561636779/9a01d3bf-56f9-4cd2-9888-bd8caa3f0745.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome, seekers of cyber wisdom, to <em>Inside the World of Malware</em>. In this journey, we’ll explore how malicious software operates, uncover its various forms, and witness its real-world consequences.</p>
<h2 id="heading-the-anatomy-of-malware">The Anatomy of Malware</h2>
<p><a target="_blank" href="https://www.cisco.com/site/in/en/learn/topics/security/what-is-malware.html">Malware</a>—short for <em>malicious software</em>—is an intrusive software designed to infiltrate, damage, or gain unauthorized access to computer systems. Within this broad category, several distinct types emerge:</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Malware Type</strong></td><td><strong>Description</strong></td><td><strong>Notable Characteristics</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>Virus</strong> <em>(Subgroup of malware)</em></td><td>Attaches to files or documents that support macros. Lies dormant until opened, then disrupts system operations.</td><td>Needs a host file, causes data loss and system issues, can spread from host to host.</td></tr>
<tr>
<td><strong>Worm</strong> <em>(Self-replicating malware)</em></td><td>Spreads via networks or downloaded files, without needing a host file.</td><td>Rapid propagation, network disruption, often leads to data loss.</td></tr>
<tr>
<td><strong>Trojan Virus</strong> <em>(Disguised-access malware)</em></td><td>Disguises as legitimate software; once downloaded, it steals or modifies sensitive data.</td><td>Cannot self-replicate, used for backdoors, theft, or data destruction.</td></tr>
<tr>
<td><strong>Spyware</strong> <em>(Surveillance malware)</em></td><td>Secretly collects user data and reports it to an external attacker, often used to steal personal or financial info.</td><td>Includes keyloggers, enables remote access, targets sensitive information.</td></tr>
<tr>
<td><strong>Adware</strong> <em>(Advertisement-driven malware)</em></td><td>Collects user data to display targeted ads; may redirect users or contain other malicious components.</td><td>Slows down systems, may include spyware or Trojans, not always malicious but often invasive.</td></tr>
<tr>
<td><strong>Ransomware</strong> <em>(Data-extortion malware)</em></td><td>Encrypts user data and demands ransom for decryption; often delivered through phishing emails or malicious links.</td><td>Locks user files, demands payment (usually in crypto), increasingly common in large-scale cyberattacks.</td></tr>
<tr>
<td><strong>Fileless Malware</strong> <em>(Memory-resident malware)</em></td><td>Operates entirely in memory (RAM) without storing malicious files on disk, making it hard to detect and analyze.</td><td>Disappears after reboot, avoids traditional antivirus, used in advanced persistent threats like DNS Messenger (2017).</td></tr>
</tbody>
</table>
</div><h2 id="heading-malware-in-the-wildreal-world-catastrophes">Malware in the Wild—Real-World Catastrophes</h2>
<h3 id="heading-tag-110httpsthehackernewscom202505russia-linked-hackers-target-tajikistanhtml"><a target="_blank" href="https://thehackernews.com/2025/05/russia-linked-hackers-target-tajikistan.html">TAG-110</a></h3>
<p>A Russia-aligned threat group known as <strong>TAG-110</strong> recently launched a <strong>spear-phishing campaign targeting Tajikistan</strong> using <strong>macro-enabled Word templates (.dotm)</strong>. These malicious documents mimic official government files and, once opened, <strong>execute VBA macros</strong> that embed themselves in the Word startup folder for <strong>automatic execution on future launches</strong>. This shift in tactic marks a departure from their previous use of HTA-based malware (HATVIBE), highlighting an evolution in persistence techniques. The campaign likely aims to <strong>gather intelligence from government, educational, and research institutions</strong>, consistent with TAG-110’s espionage history.</p>
<h3 id="heading-iloveyou-wormhttpswwwebscocomresearch-starterscomputer-scienceiloveyou-virus-attacks-computers"><a target="_blank" href="https://www.ebsco.com/research-starters/computer-science/iloveyou-virus-attacks-computers">ILOVEYOU Worm</a></h3>
<p>The <strong>ILOVEYOU virus</strong>, released on May 4, 2000, is one of the most destructive computer viruses ever, infecting millions of systems within hours. It spread via email as a fake "love letter" attachment, exploiting Microsoft Outlook to replicate itself rapidly. Once opened, it would send copies to all contacts, causing massive disruptions across governments and corporations. The virus caused <strong>$3–15 billion in damages</strong>, mainly from cleanup and recovery efforts. Its impact led to global changes in cybersecurity practices, public awareness, and legal reforms in the Philippines, where it originated.</p>
<h3 id="heading-spymaxhttpswwwcskgovinalertsspymaxandroidmalwarehtml"><a target="_blank" href="https://www.csk.gov.in/alerts/SpyMax_android_malware.html">SpyMax</a></h3>
<p>A new variant of the Android-based Remote Access Trojan (RAT) <strong>SpyMax</strong> is being spread through <strong>social engineering attacks</strong>, particularly via <strong>fake apps</strong> like Telegram or wedding invitation apps. Cybercriminals are distributing these malicious APKs through messaging platforms such as <strong>WhatsApp</strong> and phishing links. Once installed, the fake app tricks users into granting dangerous permissions that give attackers <strong>full control over the device</strong>. The malware then <strong>steals sensitive data</strong> such as contacts, SMS, OTPs, and notifications, which it sends to a <strong>remote server</strong>. This campaign relies heavily on user trust and deception to bypass security and infect mobile devices.</p>
<h3 id="heading-graphitehttpswwwtheguardiancomtechnology2025jan31whatsapp-israel-spyware"><a target="_blank" href="https://www.theguardian.com/technology/2025/jan/31/whatsapp-israel-spyware">Graphite</a></h3>
<p>In early 2025, WhatsApp revealed that nearly 100 journalists and civil society members were targeted by <strong>Graphite</strong>, a powerful spyware developed by Israeli firm <strong>Paragon Solutions</strong>. The spyware was delivered via <strong>malicious PDF files</strong> in group chats and used <strong>zero-click techniques</strong>, meaning users were infected without clicking anything. Once installed, Graphite granted attackers <strong>full access to devices</strong>, including encrypted messages from apps like WhatsApp and Signal. This covert surveillance campaign fits the definition of <strong>spyware</strong>, as it secretly monitored and reported sensitive user data to remote operators. WhatsApp has since disrupted the campaign and is notifying affected users.</p>
<h3 id="heading-kaleidoscopehttpsthehackernewscom202507mobile-security-alert-352-iconads-fraudhtml"><a target="_blank" href="https://thehackernews.com/2025/07/mobile-security-alert-352-iconads-fraud.html">Kaleidoscope</a></h3>
<p><strong>Kaleidoscope</strong> is a 2025 Android adware campaign that creates two versions of the same app: a <strong>harmless “decoy” on Google Play</strong> and an <strong>“evil twin” distributed through third-party app stores</strong>. The malicious version generates <strong>intrusive full-screen ads</strong> without user interaction, degrading device performance and <strong>fraudulently earning ad revenue</strong>. It evolved from a previous adware scheme called <strong>Konfety</strong> and now uses disguised SDKs like Raccoon and Adsclub. The adware is most prevalent in regions like <strong>India, Türkiye, Egypt, and Latin America</strong>, where third-party app stores are popular. The operation tricks advertisers by serving fake ad impressions under the name of the legitimate app.</p>
<h3 id="heading-safepay-ransomware-attackhttpswwwcpomagazinecomcyber-securitytech-distributor-ingram-micro-experiences-system-outage-due-to-a-ransomware-attack"><a target="_blank" href="https://www.cpomagazine.com/cyber-security/tech-distributor-ingram-micro-experiences-system-outage-due-to-a-ransomware-attack/">SafePay Ransomware Attack</a></h3>
<p>In <strong>July 2025</strong>, tech giant <strong>Ingram Micro</strong> suffered a major <strong>ransomware attack</strong> by the <strong>SafePay</strong> cyber gang, causing widespread system outages and halting operations across its global network. The attack forced the company to take systems offline, disrupted online ordering, and triggered an ongoing investigation involving law enforcement and cyber forensics teams. SafePay, known for its <strong>double extortion tactics</strong>, typically encrypts systems and steals data, threatening public leaks if ransoms are not paid. While Ingram Micro hasn’t confirmed data theft, experts warn it may soon appear on SafePay’s leak site. This incident highlights the growing threat posed by <strong>centralized ransomware groups</strong> targeting major corporations worldwide.</p>
<h3 id="heading-powershell-based-remcos-rat-attackhttpsblogqualyscomvulnerabilities-threat-research20250515fileless-execution-powershell-based-shellcode-loader-executes-remcos-rat"><a target="_blank" href="https://blog.qualys.com/vulnerabilities-threat-research/2025/05/15/fileless-execution-powershell-based-shellcode-loader-executes-remcos-rat">PowerShell-based Remcos RAT attack</a></h3>
<p>In May 2025, researchers at Qualys uncovered a <strong>fileless malware campaign</strong> that used a <strong>PowerShell-based shellcode loader</strong> to execute the <strong>Remcos RAT</strong> entirely in memory. Delivered via malicious LNK files disguised as Office documents, the malware used Windows tools like <code>mshta.exe</code> and PowerShell to load code directly into RAM without writing executable files to disk. It leveraged advanced techniques such as <strong>dynamic API resolution, PEB walking</strong>, and <strong>process hollowing</strong>, making it extremely hard to detect with traditional antivirus tools. Once active, Remcos provided full remote access, enabling spying, keylogging, and data theft.</p>
<h2 id="heading-the-evolving-malware-battlefield"><strong>The Evolving Malware Battlefield</strong></h2>
<p>While historic incidents like ILOVEYOU and recent cases such as SafePay ransomware highlight malware’s destructive potential, the threat landscape is constantly shifting. <a target="_blank" href="https://www.cisecurity.org/insights/blog/top-10-malware-q1-2025">Here</a> are details of some of the malware families that are currently making the biggest impact and how they’re breaching systems.</p>
<p>For a long time now, <strong>SocGholish</strong> leads the pack, responsible for <strong>48% of detections</strong>. Spread via malicious browser update prompts on compromised websites, SocGholish often acts as a <strong>gateway</strong> to more dangerous payloads like NetSupport, AsyncRAT, and even ransomware. Other prevalent threats include:</p>
<ul>
<li><p><strong>ZPHP</strong> – Downloader delivering tools like Lumma Stealer.</p>
</li>
<li><p><strong>CoinMiner</strong> – Cryptocurrency miner spreading via WMI and malspam.</p>
</li>
<li><p><strong>TeleGrab</strong> – Telegram-specific infostealer that hijacks chats and steals history.</p>
</li>
<li><p><strong>VenomRAT</strong> – Open-source Remote Access Trojan with keylogging and data exfiltration features.</p>
</li>
<li><p><strong>Agent Tesla</strong> – A long-running .NET-based RAT sold as malware-as-a-service, used for stealing data, keylogging, and screenshots, often delivered via phishing emails.</p>
</li>
<li><p><strong>Arechclient2</strong> – Remote access tool (RAT) that also contains information stealer capabilities</p>
</li>
<li><p><strong>LandUpdate808</strong> – A JavaScript downloader spread via fake browser updates, installing tools like NetSupport RAT after execution.</p>
</li>
<li><p><strong>DarkGate</strong> – A multifunctional, evasive malware capable of data theft, remote access, and persistence, distributed through phishing and other deceptive methods.</p>
</li>
<li><p><strong>Ratenjay</strong> – A RAT dropped by other malware, enabling remote command execution and keylogging.</p>
</li>
</ul>
<p><strong>Initial Infection Vectors</strong> observed in 2025 are:</p>
<ul>
<li><p><strong>Malvertisement</strong> – The leading vector, used by SocGholish, ZPHP, and LandUpdate808.</p>
</li>
<li><p><strong>Malspam</strong> – Unsolicited emails carrying malicious attachments or links, common for Agent Tesla.</p>
</li>
<li><p><strong>Dropped</strong> – Malware installed by other malware or via exploit kits.</p>
</li>
<li><p><strong>Multiple vectors</strong> – Sophisticated campaigns using two or more delivery methods.</p>
</li>
</ul>
<p>In addition to this, several notorious <a target="_blank" href="https://thehackernews.com/2025/01/top-5-malware-threats-to-prepare.html">malware families</a> continue to evolve:</p>
<ul>
<li><p><strong>Lumma Stealer</strong> – Sold on the Dark Web since 2022, capable of extracting credentials, crypto-wallet data, and installing other malware. Often spread via fake CAPTCHA pages and phishing.</p>
</li>
<li><p><strong>XWorm</strong> – Remote access tool with spying, clipboard hijacking, and credential theft capabilities; frequently delivered via phishing emails with malicious archives.</p>
</li>
<li><p><strong>AsyncRAT</strong> – RAT known for screen recording, keylogging, and persistence; often disguised as pirated software or dropped by other malware.</p>
</li>
<li><p><strong>Remcos RAT</strong> – Initially marketed as legitimate software, now a common espionage tool using VBScript and PowerShell-based attacks.</p>
</li>
<li><p><strong>LockBit Ransomware</strong> – One of the most active ransomware families, leveraging a Ransomware-as-a-Service (RaaS) model and responsible for high-profile global attacks.</p>
</li>
</ul>
<blockquote>
<p>Why this matters:<br />This real-time snapshot shows how old attack techniques keep resurfacing in new forms, making layered defenses, user education, and rapid incident response more critical than ever.</p>
</blockquote>
<h2 id="heading-navigating-the-threat-landscape">Navigating the Threat Landscape</h2>
<p>What lessons do these digital epidemics teach us?</p>
<ul>
<li><p><strong>Keep systems updated</strong>: Apply security patches promptly, use strong unique passwords, and enforce application and system security best practices.</p>
</li>
<li><p><strong>Back up and test restores</strong>: Regularly back up critical data and ensure recovery procedures work to minimize ransomware damage.</p>
</li>
<li><p><strong>Use layered protection</strong>: Deploy firewalls, intrusion prevention systems (IPS), and next-gen endpoint monitoring for defense across devices, email, and DNS.</p>
</li>
<li><p><strong>Educate users</strong>: Train employees to identify phishing attempts and require two-factor authentication to reduce human-related risks.</p>
</li>
<li><p><strong>Segment your network</strong>: Isolate critical systems using network segmentation to limit malware spread during an outbreak.</p>
</li>
<li><p><strong>Secure email channels</strong>: Block malicious attachments, websites, and enforce safe file-sharing practices to stop threats at the entry point.</p>
</li>
<li><p><strong>Monitor with analytics</strong>: Use real-time threat intelligence and advanced traffic monitoring to detect abnormal behavior quickly.</p>
</li>
<li><p><strong>Have an incident response plan</strong>: Prepare IT staff with clear instructions and rehearse how to respond to malware incidents.</p>
</li>
<li><p><strong>Scan and audit systems</strong>: Regularly assess cloud services, microservices, and administrative platforms for vulnerabilities.</p>
</li>
<li><p><strong>Implement zero-trust</strong>: Enforce strict access controls that verify all users, devices, and applications before granting access.</p>
</li>
</ul>
<h2 id="heading-awareness-is-your-best-cyber-armor">Awareness Is Your Best Cyber Armor</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1754737849448/8b7d4fd8-9c98-4e74-816d-6cdc9859666d.png" alt="Cyber Chanacya protecting all from malware attacks " class="image--center mx-auto" /></p>
<p>This exploration reveals a chilling truth: malware is not an abstract threat—it’s a real, continuously evolving menace with vast consequences. From love-letter worms to global ransomware extortion, each chapter underscores the critical importance of cybersecurity vigilance.</p>
<p>May your systems be fortified, your backups secure, and your awareness sharp.</p>
<p><strong>Stay aware. Stay safe.</strong></p>
]]></content:encoded></item><item><title><![CDATA[How to Create a Strong Password in 2025: A Simple Guide to Outsmart Cyber Threats]]></title><description><![CDATA[In 2025, passwords are still a necessary evil.
Despite the rise of passkeys, biometrics, and password-less logins, passwords haven’t gone away and they remain one of the most targeted and vulnerable parts of your digital life. According to the 2025 V...]]></description><link>https://blog.interintender.com/how-to-create-a-strong-password</link><guid isPermaLink="true">https://blog.interintender.com/how-to-create-a-strong-password</guid><category><![CDATA[#StrongPasswords]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[passwords]]></category><category><![CDATA[#onlinesafety]]></category><category><![CDATA[password manager]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Wed, 23 Jul 2025 18:15:38 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1753293937366/083d9a29-14b6-4814-abd2-543530e7b1b3.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In 2025, passwords are still a necessary evil.</p>
<p>Despite the rise of passkeys, biometrics, and <a target="_blank" href="https://www.youtube.com/watch?v=f6LD9sDKQq8">password-less logins</a>, passwords haven’t gone away and they remain one of the most targeted and vulnerable parts of your digital life. According to the <a target="_blank" href="https://www.verizon.com/business/resources/Tea/reports/2025-dbir-data-breach-investigations-report.pdf">2025 Verizon Data Breach Report</a>, only 3% of the total unique passwords meet complexity requirements. So if you're still using "123456" or your pet's name with a few numbers, it's time to level up.</p>
<p>This blog post isn’t just another reminder to "use a strong password." It's your <strong>2025 guide to creating smarter, safer passwords</strong> with practical tips that balance security and convenience.</p>
<h2 id="heading-what-makes-a-password-strong">What Makes a Password Strong?</h2>
<p>A strong password is one that:</p>
<ul>
<li><p>Is at least <strong>12 characters long</strong> (longer = better)</p>
</li>
<li><p>Includes a mix of <strong>uppercase and lowercase letters, numbers, and special characters</strong></p>
</li>
<li><p>Is <strong>not based on personal information</strong> (like birthdays or pet names)</p>
</li>
<li><p>Is <strong>unique for each account</strong></p>
</li>
<li><p>Has <strong>no connection to previous passwords or dictionary words</strong></p>
</li>
<li><p>Is <strong>unpredictable</strong>, something a hacker, AI, or brute-force script cannot guess.</p>
</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1753294053502/e570cd47-ce14-45c6-8b86-05a16bcdc927.png" alt="For Powerful Ways to Create Strong Passwords read the blog by Cyber Chanacya" class="image--center mx-auto" /></p>
<h2 id="heading-easy-yet-powerful-ways-to-create-strong-passwords">Easy Yet Powerful Ways to Create Strong Passwords</h2>
<p>Here are <strong>novel but practical methods</strong> you can use starting today:</p>
<ol>
<li><strong>Turn a Personal Sentence into a Password</strong></li>
</ol>
<p>Think of a sentence that only you would know, then take the first letters and mix in numbers or symbols.</p>
<blockquote>
<p><em>“My first trip to Goa was in 2015 and it was amazing!”</em><br />→ <code>MfT2Gwi15&amp;iwa!</code></p>
</blockquote>
<p>This is easy to remember but extremely hard to crack.</p>
<ol start="2">
<li><strong>Use Passphrases Instead of Passwords</strong></li>
</ol>
<p>A <a target="_blank" href="https://csrc.nist.gov/glossary/term/passphrase"><strong>passphrase</strong></a> is a string of random but memorable words. Example:</p>
<blockquote>
<p><code>Banana_Hiking%Orange@Book!</code><br />This is 24+ characters and super secure — but still memorable.</p>
</blockquote>
<ol start="3">
<li><strong>Use Emoji Style Emoticons</strong></li>
</ol>
<p>While emojis themselves don’t work in most password fields, <strong>emoticons</strong> do!</p>
<p>Example:</p>
<blockquote>
<p><code>Happy:)Rainy:(Day!#2025</code></p>
</blockquote>
<p>These add a personal flair and randomness that basic passwords don’t have.</p>
<ol start="4">
<li><strong>Use a Dictionary Remix Trick</strong></li>
</ol>
<p>Pick four random, unrelated words and sprinkle in numbers/symbols.</p>
<p>Example:</p>
<blockquote>
<p><code>Tiger^Echo7Lamp$Coffee</code></p>
</blockquote>
<p>Now it’s long, complex, and doesn't rely on personal data.</p>
<ol start="5">
<li><strong>Add Site-Specific Tags to a Base Password</strong> <em>(with caution)</em></li>
</ol>
<p>If you have a base strong password, add a creative tag for each site.</p>
<p>Example:</p>
<blockquote>
<p>Base: <code>!nsideMy#C4stle0fC0des</code><br />Email: <code>!nsideMy#C4stle0fC0des@Mail</code><br />Amazon: <code>!nsideMy#C4stle0fC0des@AZN</code></p>
</blockquote>
<p><strong>Note:</strong> Don’t use predictable tags. If one password leaks, others may still be guessable.</p>
<h2 id="heading-how-to-store-and-protect-your-passwords">How to Store and Protect Your Passwords</h2>
<p>Creating strong passwords is <strong>half the job</strong> — keeping them safe is the rest. Here’s how:</p>
<p>✅ <strong>Use a trusted password manager</strong></p>
<p>✅ <strong>Don’t reuse passwords</strong> across accounts</p>
<p>✅ <strong>Enable Two-Factor Authentication (2FA)</strong> wherever possible</p>
<p>✅ <strong>Avoid saving passwords in browsers</strong> or local files</p>
<p>✅ Don’t ignore <strong>password update reminders</strong></p>
<p>✅ <strong>Monitor breaches</strong> with tools like <a target="_blank" href="https://haveibeenpwned.com/">HaveIBeenPwned.com</a></p>
<h2 id="heading-final-checklist-your-password-safety-in-2025">Final Checklist: Your Password Safety in 2025</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>✔️ <strong>Step</strong></td><td><strong>Status</strong></td></tr>
</thead>
<tbody>
<tr>
<td>All passwords 12+ characters</td><td>✅</td></tr>
<tr>
<td>Mix of letters, numbers, symbols</td><td>✅</td></tr>
<tr>
<td>Each account has a unique password</td><td>✅</td></tr>
<tr>
<td>Using a password manager</td><td>✅</td></tr>
<tr>
<td>2FA enabled on all accounts</td><td>✅</td></tr>
</tbody>
</table>
</div><h2 id="heading-closing-thought">Closing Thought</h2>
<p>Passwords are your <strong>first line of defense</strong> in the digital world. While we work toward a password-less future, the smartest move you can make in 2025 is to <strong>create strong, unique passwords</strong> and use a password manager to remember them for you.</p>
<p>Security doesn’t have to be complicated.<br />It just needs to be intentional.</p>
<p><strong>Stay aware. Stay safe.</strong></p>
]]></content:encoded></item><item><title><![CDATA[“It sounded exactly like him…”: How UK Engineering Giant Arup Lost £20 Million to a Deepfake Scam]]></title><description><![CDATA[In early 2024, the finance worker in Hong Kong thought nothing unusual about the video call. Their UK-based chief financial officer needed urgent approval for a confidential acquisition, and several familiar colleagues joined to discuss details. Afte...]]></description><link>https://blog.interintender.com/understanding-deepfake-in-2025</link><guid isPermaLink="true">https://blog.interintender.com/understanding-deepfake-in-2025</guid><category><![CDATA[deepfakescams2025]]></category><category><![CDATA[AI-generated-fraud]]></category><category><![CDATA[real deepfake incidents]]></category><category><![CDATA[cyber security India]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Wed, 16 Jul 2025 10:34:26 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1752660376348/3262b8b2-8c1a-44e0-8d38-d58500d973ca.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In early <a target="_blank" href="https://www.weforum.org/stories/2025/07/why-detecting-dangerous-ai-is-key-to-keeping-trust-alive/">2024</a>, the finance worker in Hong Kong thought nothing unusual about the video call. Their UK-based chief financial officer needed urgent approval for a confidential acquisition, and several familiar colleagues joined to discuss details. After thorough discussion, the employee authorized 15 transfers totalling $25.5 million. Only weeks later did the devastating truth emerge: every person on that call, except the victim, was an AI-generated deepfake. The tricksters had cloned the voices and likenesses of senior executives—including the CFO—and staged a high-stakes video conference. Arup later <a target="_blank" href="https://www.theguardian.com/technology/article/2024/may/17/uk-engineering-arup-deepfake-scam-hong-kong-ai-video">confirmed</a>: “fake voices and images were used” and no technical systems were breached—they fell for “technology‑enhanced social engineering”.</p>
<p>The incident, they say, is a wake-up call for the corporate world. But this was not the first time deepfake was used for financial fraud. In <a target="_blank" href="https://www.forbes.com/sites/jessedamiani/2019/09/03/a-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000/">2019</a>, scammers used AI to mimic a UK energy company's CEO’s voice, directing a €243,000 transfer. At the <a target="_blank" href="https://www.wired.com/story/deepfake-audio-keir-starmer/">2023</a> UK Labour Conference, a deepfake audio clip falsely portrayed Keir Starmer abusing his staff. According to a 2025 report, deepfakes of public figures like Martin Wolf, Taylor Swift, Elon Musk have bettered investment scams and false promotions across <a target="_blank" href="https://www.ft.com/content/fcbdc88f-bbfd-4338-915a-9ef7970b2123">social media</a>.</p>
<h2 id="heading-what-are-deepfakes">What Are Deepfakes?</h2>
<p><a target="_blank" href="https://unisa.edu.au/connect/enterprise-magazine/articles/2024/what-are-deepfakes-and-should-we-be-worried/">Deepfakes</a> are synthetic media — images, audio, or video — generated or manipulated using AI technologies like neural networks and <a target="_blank" href="https://aws.amazon.com/what-is/gan/">GANs</a>.</p>
<blockquote>
<p>GAN or Generative Adversarial Networks are a deep learning architecture where two neural networks — the generator and the discriminator — compete against each other: the generator creates new data from a training set, while the discriminator tries to distinguish it from real data, leading to increasingly realistic outputs until the fake data becomes indistinguishable from the original.</p>
</blockquote>
<p>The term deepfake comes from “deep learning” and “fake.” While early deepfakes focused on entertainment or celebrity impersonations, in the 2020s they’ve become a tool for fraud, political manipulation, cyberbullying, and more. Deepfake fraud cases <a target="_blank" href="https://www.eftsure.com/statistics/deepfake-statistics/">surged</a> to 1740% in North America between 2022-23, with financial losses exceeding $200 million in <a target="_blank" href="https://variety.com/2025/digital/news/deepfake-fraud-caused-200-million-losses-1236372068/">2025</a> alone.</p>
<h2 id="heading-why-deepfakes-are-fooling-people-today">Why Deepfakes Are Fooling People Today</h2>
<p>Deepfakes aren’t just a technological marvel — they’re a psychological exploit, a corporate threat, and a security blind spot. Here's why they’re so dangerously effective:</p>
<ol>
<li><p><strong>Asymmetry Between Generation and Detection Technologies</strong></p>
<p> There’s a dangerous imbalance in the cyber battlefield where deepfake videos are growing at an estimated 900% annually. Detection tools, both manual and automated, struggle to keep pace, often flagging false positives or failing against subtle, high-quality forgeries. This leads to what experts call a "trust gap". Traditional cues—recognizing a face, hearing a familiar voice, noting behavioral patterns—are no longer reliable indicators of authenticity in the age of generative AI.</p>
</li>
<li><p><strong>Psychological Trust in Sight and Sound</strong></p>
<p> Humans are hardwired to <a target="_blank" href="https://www.adaptivesecurity.com/blog/arup-deepfake-scam-attack">trust</a> what they see and hear. When someone appears on video or sounds like a known authority figure — like a CEO or CFO — our cognitive defenses weaken. This innate trust is precisely what fraudsters exploit in high-stakes impersonation scams like the Arup incident.</p>
</li>
<li><p><strong>Accessible AI Tools</strong></p>
<p> Creating deepfakes no longer requires specialized labs or powerful servers. Just <a target="_blank" href="https://www.weforum.org/stories/2025/07/why-detecting-dangerous-ai-is-key-to-keeping-trust-alive/">20–30 seconds</a> of someone’s speech is enough to build a convincing synthetic voice and open-source platforms can generate facial mimicry in under an hour with modest computing power. The barrier to entry is so low that even amateur attackers can generate believable impersonations with minimal data. Research <a target="_blank" href="https://unisa.edu.au/connect/enterprise-magazine/articles/2024/what-are-deepfakes-and-should-we-be-worried/">shows</a> that state-of-the-art automated detection systems experience 45-50% accuracy drops when confronted with real-world deepfakes compared to laboratory conditions.</p>
</li>
<li><p><strong>Corporate Vulnerabilities</strong></p>
<p> Modern businesses have complex workflows and financial hierarchies, but often lack proper verification protocols. In multi-tiered organizations it is not unusual for an executive to remotely authorize large transactions. Scammers exploit this by impersonating executives over deepfake video or calls, knowing that employees hesitate to challenge higher-ups.</p>
</li>
</ol>
<h2 id="heading-how-to-spot-a-deepfake">How to Spot a Deepfake</h2>
<p>Here are some ways to <a target="_blank" href="https://www.theguardian.com/us-news/article/2024/jun/07/how-to-spot-a-deepfake">spot</a> a deepfake.</p>
<h3 id="heading-audio-deepfakes"><strong>Audio Deepfakes</strong></h3>
<ol>
<li><p><strong>Flat tone</strong>: AI-generated voices often sound monotone and robotic, lacking emotional depth.</p>
</li>
<li><p><strong>Lack of natural pauses</strong>: You may not hear proper breathing sounds before speech starts.</p>
</li>
<li><p><strong>Unnatural pacing</strong>: The rhythm can feel too even or artificial, unlike natural human speech.</p>
</li>
<li><p><strong>Background noise anomalies</strong>:</p>
<ul>
<li><p>Sometimes <strong>completely silent</strong>, even when noise is expected.</p>
</li>
<li><p>Other times, <strong>excessive ambient noise</strong> is added unnaturally to make it feel “real.”</p>
</li>
</ul>
</li>
</ol>
<h3 id="heading-image-based-deepfakes-ai-generated-photos"><strong>Image-Based Deepfakes (AI-Generated Photos)</strong></h3>
<ol>
<li><p><strong>Zoom in on inconsistencies</strong>:</p>
<ul>
<li><p>Crooked or melting buildings</p>
</li>
<li><p>Hands with too many or fused fingers</p>
</li>
<li><p>Asymmetrical or malformed facial features</p>
</li>
</ul>
</li>
<li><p><strong>Visual oddities</strong>:</p>
<ul>
<li><p>Hair may look “painted” or unnaturally clumped.</p>
</li>
<li><p>Shadows might fall in <strong>impossible directions</strong> or be missing altogether.</p>
</li>
<li><p>Glossy, <strong>plastic-like skin tones</strong> are common.</p>
</li>
</ul>
</li>
<li><p><strong>Lighting mismatches</strong>: Illumination across the subject may feel <strong>flat or uneven</strong>, unlike how real light behaves.</p>
</li>
</ol>
<h3 id="heading-video-deepfakes"><strong>Video Deepfakes</strong></h3>
<ol>
<li><p><strong>Eye blinking</strong>: Unnatural or <strong>infrequent blinking</strong> is a major giveaway.</p>
</li>
<li><p><strong>Facial edge artifacts</strong>:</p>
<ul>
<li><p>Edges of the face or head may appear <strong>jagged or pixelated</strong>.</p>
</li>
<li><p>Some areas may flicker slightly or misalign with the background.</p>
</li>
</ul>
</li>
<li><p><strong>Lip-sync issues</strong>:</p>
<ul>
<li><p>Mouth movements may not match the spoken words.</p>
</li>
<li><p>For sounds requiring closed lips (like “B” or “P”), the mouth might remain slightly open.</p>
</li>
<li><p>Tongue and teeth positioning often looks <strong>off or blurred</strong>.</p>
</li>
</ul>
</li>
<li><p><strong>Speech mismatches</strong>: AI usually alters <strong>just the mouth</strong>; the rest of the face remains static, making expressions feel hollow or disconnected.</p>
</li>
</ol>
<h3 id="heading-guide-to-identifying-deepfakes"><strong>Guide to Identifying Deepfakes</strong></h3>
<p>These eight <a target="_blank" href="https://www.media.mit.edu/projects/detect-fakes/overview/">questions</a> are intended to help guide people looking through Deepfakes.</p>
<ol>
<li><p>Pay attention to the <strong>face</strong>. High-end Deepfake manipulations are almost always facial transformations. </p>
</li>
<li><p>Pay attention to the <strong>cheeks and forehead</strong>. Does the skin appear too smooth or too wrinkly? Is the agedness of the skin similar to the agedness of the hair and eyes? Deepfakes may be incongruent on some dimensions.</p>
</li>
<li><p>Pay attention to the <strong>eyes and eyebrows</strong>. Do shadows appear in places that you would expect? Deepfakes may fail to fully represent the natural physics of a scene. </p>
</li>
<li><p>Pay attention to the <strong>glasses</strong>. Is there any glare? Is there too much glare? Does the angle of the glare change when the person moves? Once again, Deepfakes may fail to fully represent the natural physics of lighting.</p>
</li>
<li><p>Pay attention to the <strong>facial hair</strong> or lack thereof. Does this facial hair look real? Deepfakes might add or remove a mustache, sideburns, or beard. But, Deepfakes may fail to make facial hair transformations fully natural.</p>
</li>
<li><p>Pay attention to <strong>facial moles</strong>.  Does the mole look real? </p>
</li>
<li><p>Pay attention to <strong>blinking</strong>. Does the person blink enough or too much? </p>
</li>
<li><p>Pay attention to the <strong>lip movements</strong>. Some deepfakes are based on lip syncing. Do the lip movements look natural?</p>
</li>
</ol>
<h2 id="heading-defense-against-deepfakes">Defense against Deepfakes</h2>
<h3 id="heading-for-organizations">For Organizations</h3>
<ul>
<li><p><strong>Multi-channel authentication</strong>: Always verify high-value requests via at least one separate channel.</p>
</li>
<li><p><strong>Segregation of duties</strong>: No single person should hold all the authority for large transfers.</p>
</li>
<li><p><strong>Simulation training</strong>: Include deepfake scenarios in cybersecurity drills.</p>
</li>
<li><p><strong>AI detection tools</strong>: Invest in software that analyzes media for manipulation artifacts—and update as deepfake tech evolves.</p>
</li>
</ul>
<h3 id="heading-for-individuals">For Individuals</h3>
<ul>
<li><p><strong>Increase awareness</strong>: Understand that video/audio can be fabricated.</p>
</li>
<li><p><strong>Verify prominently</strong>: If it seems urgent or demand-only came via audio/video, pause and call back.</p>
</li>
<li><p><strong>Be critical online</strong>: Don’t trust authoritative videos on social media without reputable corroboration — check and verify via official sites or reports.</p>
</li>
</ul>
<h2 id="heading-the-road-ahead">The Road Ahead</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1752661657291/1e8d264e-d1cc-496b-a1eb-d9248d5b0931.png" alt="Chanacya advising trust but verify" class="image--center mx-auto" /></p>
<p>Deepfake technology is advancing at lightning speed. As platforms struggle to keep pace, the burden falls on users and businesses to <em>think critically and verify</em>. Only with better tech tools, updated policies, and <em>deepfake awareness training</em> can we hope to mitigate this insidious risk.</p>
<p>Artificial voices and faces no longer guarantee authenticity. The Arup £20 million scam is a stark warning: even top firms can be floored by convincingly false audio and video. In 2025 and beyond, <strong>trust but verify</strong> must be the motto—especially when technology is weaponized against us.</p>
<p><strong>Stay aware. Stay safe.</strong></p>
]]></content:encoded></item><item><title><![CDATA[India’s RBI Leverages DoT’s Fraud Risk Indicator: A Milestone in Cyber–Financial Security]]></title><description><![CDATA[On June 30, 2025, the Reserve Bank of India (RBI) issued a directive for all Scheduled Commercial, Small Finance, Payments, and Co‑operative Banks to integrate the Financial Fraud Risk Indicator (FRI)—developed by the Department of Telecommunications...]]></description><link>https://blog.interintender.com/fraud-risk-indicator</link><guid isPermaLink="true">https://blog.interintender.com/fraud-risk-indicator</guid><category><![CDATA[#DoTIndia]]></category><category><![CDATA[fri]]></category><category><![CDATA[RBI]]></category><category><![CDATA[CybersecurityIndia ]]></category><category><![CDATA[digitalpayments]]></category><category><![CDATA[fraud prevention]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Sun, 06 Jul 2025 14:16:59 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1751809863505/7f01c9c3-d88a-47a5-bf82-228443bc8b5e.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On <strong>June 30, 2025</strong>, the <strong>Reserve Bank of India (RBI)</strong> <a target="_blank" href="https://www.pib.gov.in/PressReleasePage.aspx?PRID=2141616">issued</a> a directive for all Scheduled Commercial, Small Finance, Payments, and Co‑operative Banks to integrate the <strong>Financial Fraud Risk Indicator (FRI)</strong>—developed by the <strong>Department of Telecommunications (DoT)</strong>—into their transaction monitoring systems.</p>
<h2 id="heading-what-is-the-financial-fraud-risk-indicator">What Is the Financial Fraud Risk Indicator?</h2>
<ul>
<li><p><strong>Launch &amp; purpose</strong>: Released in <strong>May 2025</strong> by the DoT’s <strong>Digital Intelligence Unit (DIU)</strong>, FRI is a <strong>risk-classification metric</strong> that assigns mobile phone numbers a status of <strong>Medium</strong>, <strong>High</strong>, or <strong>Very High</strong> risk, based on their linkage to financial fraud.</p>
</li>
<li><p><strong>Data sources</strong>: This classification is an outcome of inputs obtained from various stakeholders including reporting on</p>
<ul>
<li><p><strong>National Cybercrime Reporting Portal (NCRP)</strong> by Indian Cyber Crime Coordination Centre (“I4C”)</p>
</li>
<li><p>DoT’s <strong>Chakshu platform</strong></p>
</li>
<li><p>Intelligence from banks, NBFCs, UPI providers, and telecom operators.</p>
</li>
</ul>
</li>
<li><p><a target="_blank" href="https://www.trai.gov.in/sites/default/files/2024-08/Approved_FAQ_09092020_0.pdf"><strong>Mobile Number Revocation List</strong></a> <strong>(MNRL)</strong>: DIU also issues a list of phone numbers revoked due to cybercrime links, failed re-verification, or misuse—all strongly tied to fraud.</p>
</li>
</ul>
<h2 id="heading-how-fri-works-in-practice">How FRI Works in Practice</h2>
<p>Banks and fintech platforms integrate FRI into their systems via <strong>API-based real-time querying</strong>—directly connecting their transaction engines to the DoT’s <strong>Digital Intelligence Platform (DIP)</strong> ensuring real-time queries, instant feedback, and ongoing model improvement.</p>
<p>Upon a transaction attempt:</p>
<ul>
<li><p><strong>Medium‑risk</strong>: prompts additional verification or customer notifications</p>
</li>
<li><p><strong>High/Very High‑risk</strong>: can result in transaction blocking, delays, or manual review.</p>
</li>
</ul>
<p>Early adopters—<strong>PhonePe, Punjab National Bank, HDFC Bank, ICICI Bank, Paytm,</strong> and <strong>India Post Payments Bank</strong>—have already implemented FRI to strengthen fraud prevention efforts.</p>
<h2 id="heading-why-this-is-revolutionary">Why This Is Revolutionary</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1751810325713/53a64e4d-2a88-44c1-8dfd-a4d38ac9d8cf.png" alt="Why This Is Revolutionary" class="image--center mx-auto" /></p>
<ol>
<li><p><strong>Seamless Agency Collaboration</strong><br /> Integrating telecom intelligence into banking systems marks a new level of inter-agency coordination—laying the foundation for real-time fraud response.</p>
</li>
<li><p><strong>Proactive Intelligence Gathering</strong><br /> FRI flags suspicious mobile numbers <em>before</em> crimes occur, using signals from cybercrime databases, telecom data, and reported incidents.</p>
</li>
<li><p><strong>Real-Time Fraud Interception</strong><br /> As transactions happen, they are screened <a target="_blank" href="https://www.businesstoday.in/personal-finance/banking/story/rbi-pushes-banks-to-adopt-dots-financial-fraud-risk-indicator-to-tackle-cyber-threats-482801-2025-07-02">instantly</a>—sidelining traditional manual detection and enabling swift protective action.</p>
</li>
<li><p><strong>Minimal Fraud Impacts</strong><br /> The automation enables immediate, data-driven decisions—reducing the time window for fraud to succeed and minimizing financial losses.</p>
</li>
<li><p><strong>Protection at Scale</strong><br /> As UPI and mobile payments surge, FRI helps shield <a target="_blank" href="https://economictimes.indiatimes.com/wealth/save/rbi-acts-tough-against-cyber-frauds-directs-all-banks-to-use-dots-fri-technology-to-protect-bank-customers/articleshow/122263356.cms">millions</a> of users from phishing, SIM-swap, and impersonation attacks across the nation.</p>
</li>
<li><p><strong>Continuous Feedback Loops</strong><br /> API-powered integration allows banks and the FRI system to learn from each transaction, evolving in real time to adapt to new fraud patterns.</p>
</li>
</ol>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Group</td><td>Impact</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Consumers</strong></td><td>May receive warnings or transaction holds; increased transparency in high-risk transactions</td></tr>
<tr>
<td><strong>Banks &amp; Fintechs</strong></td><td>Gain access to an automated, layered fraud shield—allowing quicker decisioning and lower losses</td></tr>
<tr>
<td><strong>Regulators</strong></td><td>Bolster financial-sector integrity via standardized, real-time detection frameworks</td></tr>
</tbody>
</table>
</div><h2 id="heading-conclusion">Conclusion</h2>
<p>The RBI’s mandate to integrate DoT’s FRI marks a <strong>defensive breakthrough</strong> in India’s digital finance ecosystem. It shifts the paradigm from <strong>reactive fraud control</strong> to <strong>proactive, risk-informed action at transaction time</strong>, protecting citizens in a realm increasingly defined by mobile and digital transactions.</p>
<p><strong>Stay aware. Stay safe.</strong></p>
]]></content:encoded></item><item><title><![CDATA[Why Cyber Security matters in 2025?]]></title><description><![CDATA[Introduction
In a world where our lives are increasingly digital—our memories stored in the cloud, our money transferred through apps, and our identities verified with a fingerprint—one critical question emerges: Who is protecting all of this?
Cybers...]]></description><link>https://blog.interintender.com/why-cyber-security-matters-in-2025</link><guid isPermaLink="true">https://blog.interintender.com/why-cyber-security-matters-in-2025</guid><category><![CDATA[#CyberChanacya]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[ethicalhacking]]></category><category><![CDATA[CyberEducation]]></category><category><![CDATA[Career Journey]]></category><category><![CDATA[infosec]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Fri, 04 Jul 2025 18:18:36 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1751651085835/5d16ad09-51a6-4c02-9e7d-89febf03657b.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-introduction">Introduction</h2>
<p>In a world where our lives are increasingly digital—our memories stored in the cloud, our money transferred through apps, and our identities verified with a fingerprint—one critical question emerges: <strong><em>Who is protecting all of this?</em></strong></p>
<p>Cybersecurity is no longer the exclusive domain of IT professionals; it has become a foundational pillar of modern society. For me, it has also become a personal mission, rooted in a journey that began far from data centers and digital code.</p>
<h2 id="heading-my-unconventional-journey-into-the-world-of-cyber-security">My Unconventional Journey into the world of Cyber Security</h2>
<p>My career began in the mechanical realm. With a diploma in Automobile Engineering, I joined Popular Vehicles &amp; Services as a Service Advisor. The roar of engines, the rhythm of machines — this world was tangible and grounded. But a part of me longed for more: the logic, creativity, and innovation found in the digital space.</p>
<p>That inner spark led me to programming. Self-taught and deeply curious, I transitioned into the tech industry. About three years in software development, I evolved from developer to leading teams, contributing to healthcare projects across the US and UK. I interviewed candidates and optimized systems — but I always felt there was a larger battlefield.</p>
<p>With four years prior experience in Kung Fu, I decided to immerse myself in martial arts for some time, where I was training and teaching Kalaripayattu, one of India’s oldest martial traditions. I performed on stages like TEDx and IEEE, and served as an assistant to the CEO of Agasthyam Foundation, a renowned Kalaripayattu institute in Kerala. The institute was headed by the Indian Martial Arts Guru, Gurukkal Dr. S. Mahesh. I was also leading their prestigious residential program. These experiences refined not only my discipline and focus but also my sense of duty.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1751652512861/59518913-46cc-401e-9980-ff2c68922bde.png" alt="Kalari performance at IEEE and TedX - Amal P Vatayam" class="image--center mx-auto" /></p>
<p>Yet through it all, one vision remained clear:</p>
<blockquote>
<p>💡<strong>To become an ethical hacker.</strong></p>
</blockquote>
<p>Today, I am living that purpose. As a cybersecurity student focused on ethical hacking, I am channeling everything I’ve learned into protecting what truly matters.</p>
<h2 id="heading-what-is-cybersecurity">What Is Cybersecurity?</h2>
<p>Cybersecurity is the practice of defending computers, networks, systems, and data from malicious attacks. It safeguards everything from your smartphone to critical infrastructure like power grids and hospitals.</p>
<p>But beyond technology, cybersecurity is fundamentally about <strong>trust</strong>. Every click, every transaction, and every stored file relies on unseen guardians.</p>
<p><strong>Key Domains of Cybersecurity:</strong></p>
<ul>
<li><p><strong>Network Security</strong>: Securing internal networks from unauthorized access.</p>
</li>
<li><p><strong>Application Security</strong>: Ensuring apps are secure from threats during and after development.</p>
</li>
<li><p><strong>Cloud Security</strong>: Protecting data stored in cloud environments.</p>
</li>
<li><p><strong>Endpoint Security</strong>: Safeguarding user devices like phones and laptops.</p>
</li>
<li><p><strong>Operational Security (OpSec)</strong>: Managing permissions and user behavior securely.</p>
</li>
<li><p><strong>Disaster Recovery &amp; Continuity</strong>: Maintaining resilience after breaches or failures.</p>
</li>
<li><p><strong>Identity &amp; Access Management (IAM)</strong>: Controlling who can access what.</p>
</li>
</ul>
<h2 id="heading-ethical-hacking-hacking-with-a-purpose">Ethical Hacking: Hacking with a Purpose</h2>
<p>Ethical hackers, or <strong>white-hat hackers</strong>, use their skills to identify and fix vulnerabilities before malicious actors (black-hat hackers) can exploit them.</p>
<p>They simulate real-world attacks to:</p>
<ul>
<li><p>Conduct <strong>penetration tests</strong> (pen-tests)</p>
</li>
<li><p>Run <strong>vulnerability assessments</strong></p>
</li>
<li><p>Evaluate systems against <strong>social engineering tactics</strong></p>
</li>
</ul>
<p>This proactive approach helps organizations avoid catastrophic data breaches and reinforces security hygiene.</p>
<blockquote>
<p>"To beat a hacker, you must think like one."</p>
</blockquote>
<h2 id="heading-cybersecurity-terms-everyone-should-know">Cybersecurity Terms Everyone Should Know</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Term</td><td>Meaning</td></tr>
</thead>
<tbody>
<tr>
<td><strong>Phishing</strong></td><td>Fake messages that trick users into revealing sensitive info.</td></tr>
<tr>
<td><strong>Malware</strong></td><td>Harmful software like viruses or ransomware.</td></tr>
<tr>
<td><strong>Zero-Day Exploit</strong></td><td>A security flaw not yet known to developers but exploited by hackers.</td></tr>
<tr>
<td><strong>Firewall</strong></td><td>Filters incoming/outgoing network traffic based on security rules.</td></tr>
<tr>
<td><strong>Multi-Factor Authentication (MFA)</strong></td><td>Adds a second layer to login (e.g., password + OTP).</td></tr>
<tr>
<td><strong>Encryption</strong></td><td>Converts data into unreadable code without the correct decryption key.</td></tr>
<tr>
<td><strong>Botnet</strong></td><td>A network of compromised devices controlled remotely.</td></tr>
<tr>
<td><strong>DDoS Attack</strong></td><td>Overloading a service to make it unavailable to users.</td></tr>
</tbody>
</table>
</div><h2 id="heading-why-cybersecurity-matters-more-than-ever-in-2025">Why Cybersecurity Matters More Than Ever in 2025</h2>
<p><strong>1. Digital Dependency</strong></p>
<p>Our work, education, healthcare, and even relationships depend on digital platforms. A single vulnerability can impact millions.</p>
<p><strong>2. Rising Cybercrime</strong></p>
<p>Cybercriminals no longer target just banks or governments. From deepfake scams to ransomware-as-a-service, threats are evolving fast. <a target="_blank" href="https://www.ibm.com/reports/data-breach">IBM's 2024 report</a> cites the average cost of a breach at $4.9 million.</p>
<p><strong>3. AI &amp; IoT Risks</strong></p>
<p>With AI-powered tools and Internet of Things (IoT) devices proliferating, every new gadget becomes a potential target.</p>
<p><strong>4. Data is the New Currency</strong></p>
<p>Everything from your medical records to your daily routine is data. Losing control of it isn’t just inconvenient—it's dangerous.</p>
<h2 id="heading-who-needs-cybersecurity-skills">Who Needs Cybersecurity Skills?</h2>
<p>Cybersecurity awareness isn't just for tech professionals. In 2025, it's a vital skillset for:</p>
<ul>
<li><p><strong>Developers</strong> – to write secure code and understand exploit patterns</p>
</li>
<li><p><strong>Business owners</strong> – to protect customer data and business continuity</p>
</li>
<li><p><strong>Students</strong> – to stay safe while learning and exploring online</p>
</li>
<li><p><strong>Everyday users</strong> – anyone with a phone, social media, or bank account</p>
</li>
</ul>
<h2 id="heading-how-to-stay-cyber-aware-in-2025">How to Stay Cyber Aware in 2025</h2>
<ul>
<li><p>🔐 <strong>Use strong, unique passwords</strong></p>
</li>
<li><p>🏠 <strong>Enable MFA everywhere</strong></p>
</li>
<li><p>🚫 <strong>Avoid suspicious links or downloads</strong></p>
</li>
<li><p>♻️ <strong>Regularly update your apps and OS</strong></p>
</li>
<li><p>🌐 <strong>Be cautious on public Wi-Fi (use VPNs)</strong></p>
</li>
<li><p>📈 <strong>Stay updated with reliable sources:</strong></p>
<ul>
<li><p><a target="_blank" href="https://www.cert-in.org.in">CERT-In</a></p>
</li>
<li><p><a target="_blank" href="https://krebsonsecurity.com/">Krebs on Security</a></p>
</li>
<li><p><a target="_blank" href="https://thehackernews.com/">The Hacker News</a></p>
</li>
</ul>
</li>
</ul>
<h2 id="heading-final-thoughts-from-passion-to-purpose">Final Thoughts: From Passion to Purpose</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1751652123397/9f4af7a8-2330-459e-9d62-f11a4e885d37.jpeg" alt="I love Kali Linux" class="image--center mx-auto" /></p>
<p>Every phase of my life—from fixing engines to writing PHP, from TEDx stages to Kali Linux sessions—has shaped my philosophy:</p>
<blockquote>
<p><strong>Cybersecurity is the Kalaripayattu of the Digital world</strong></p>
</blockquote>
<p>Just as martial arts trains the body to anticipate and react, cybersecurity trains the mind to protect and prevent.</p>
<p>Today, as Cyber Chanacya, I don’t just code or scan for vulnerabilities—I observe, I analyze, and I advocate for digital wisdom.</p>
<p>Because in 2025 and beyond, <strong>awareness is your firewall</strong>, and <strong>ethics is your greatest weapon.</strong></p>
<p><em>If this journey resonates with you or sparks curiosity, let it be a reminder:<br />The digital world needs defenders. And your first step is awareness.</em></p>
<p><strong>Have questions or starting your own journey in cybersecurity? Drop a comment or message me—let’s grow together.</strong></p>
]]></content:encoded></item><item><title><![CDATA[Think Your Phone Is Listening? Here’s What’s Really Happening]]></title><description><![CDATA[Introduction
Have you ever casually mentioned something—like planning a Goa trip or buying a treadmill—only to see eerily accurate ads pop up on Instagram or YouTube moments later? You’re not alone. Millions globally share the suspicion that their sm...]]></description><link>https://blog.interintender.com/think-your-phone-is-listening</link><guid isPermaLink="true">https://blog.interintender.com/think-your-phone-is-listening</guid><category><![CDATA[TargetedAds]]></category><category><![CDATA[PhonePrivacy]]></category><category><![CDATA[#PrivacyMatters"]]></category><category><![CDATA[#DigitalSurveillance]]></category><category><![CDATA[#cyberawareness]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Sat, 28 Jun 2025 19:05:34 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1751135497016/417b2e77-052b-4524-bac1-5f7b1f7a6883.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-introduction"><strong>Introduction</strong></h2>
<p>Have you ever casually mentioned something—like planning a Goa trip or buying a treadmill—only to see eerily accurate ads pop up on Instagram or YouTube moments later? You’re not alone. Millions globally share the suspicion that their smartphones are silently eavesdropping on them. While companies like Google, Apple, and Meta deny using passive voice surveillance for ad targeting, the truth lies somewhere between perception and sophisticated prediction.</p>
<p>Voice assistants and predictive algorithms now shape our digital choices, often without us even noticing. New laws like India’s Digital Personal Data Protection Act, 2023 are in place, but enforcement and public understanding lag behind. The <strong>line between convenience and consent</strong> is blurred, especially for users unaware of what permissions they’ve granted. But you can regain control—by understanding how these systems work and where to draw the line.</p>
<h2 id="heading-when-apps-take-more-than-they-give">When Apps Take More Than They Give</h2>
<p>In a widely cited 2018 <a target="_blank" href="https://recon.meddle.mobi/papers/panoptispy18pets.pdf">study</a> by Northeastern University and Imperial College London, researchers analyzed 17,260 Android apps and discovered that:</p>
<ul>
<li><p>Several apps leak <strong>content recorded from the camera and the screen</strong> over the internet, and in ways that are either undisclosed or unexpected given the purpose of the app.</p>
</li>
<li><p>Third-party libraries <strong>record a video</strong> of a user’s interaction with an app, including at times sensitive input fields, without any permissions or notification to the user.</p>
</li>
<li><p>Several apps <strong>share users’ photos and other media over the internet</strong> without explicitly indicating this to the user.</p>
</li>
<li><p>There is <strong>poor correlation</strong> between the permissions that an app <strong>requests</strong> and the permissions that an app <strong>needs</strong> to successfully run its code.</p>
</li>
</ul>
<p>In <a target="_blank" href="https://www.nytimes.com/2021/01/13/business/flo-privacy.html">2021</a>, a period- and fertility-tracking app used by more than 100 million women named, Flo, was found to have misled users about its data-handling practices by sharing their intimate health details with Facebook and Google despite repeatedly promising that it would protect their data.</p>
<p>A study report in <a target="_blank" href="https://nordvpn.com/research-lab/mobile-app-research/">2023</a> revealed that 87% percent of Android apps and 60% of iOS apps requested permissions that were not needed for their functions. Out of 103 different apps, 16 Android and 18 iOS apps collected more unnecessary data than necessary data. On average, about 20% of requested permissions were not needed for the app’s functionality.</p>
<h2 id="heading-how-targeted-ads-actually-work-without-reading-your-mind"><strong>How Targeted Ads Actually Work (Without Reading Your Mind)</strong></h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1751135957957/08a695a0-8edb-421c-80c4-b71d7b571809.png" alt="How Targeted Ads Actually Work (Without Reading Your Mind)" class="image--center mx-auto" /></p>
<p>Your phone doesn’t necessarily need to "listen" to you to know what you’re thinking about.</p>
<p>Here’s how it works:</p>
<ol>
<li><h3 id="heading-behavioral-profiling"><strong>Behavioral Profiling</strong></h3>
</li>
</ol>
<p><strong>Behavioral profiling</strong> involves observing your patterns over time and using these stored records of interactions to model typical behavior and deviations from that behavior.</p>
<ul>
<li><p>Every scroll, like, click, and hesitation is logged.</p>
</li>
<li><p>Algorithms then identify when your behavior matches key ad triggers (e.g., "interested in travel" or "fitness goals").</p>
</li>
<li><p>Sometimes, this is augmented with data from outside databases.</p>
</li>
<li><p>It is performed through data mining, a process that ranges from data selection and preparation to post processing and includes the interpretation of the emerging results.</p>
</li>
</ul>
<p>This is <strong>not just about what you did</strong>—it’s about what you’re likely to do next.</p>
<ol start="2">
<li><h3 id="heading-cross-app-and-cross-device-tracking"><strong>Cross-App and Cross-Device Tracking</strong></h3>
</li>
</ol>
<p>Your activity doesn’t stop at one device—or even one app.</p>
<ul>
<li><p><strong>Cross-app tracking</strong> <a target="_blank" href="https://www.pureprivacy.com/blog/tracker-blocker/stop-cross-app-tracking-on-android/">allows</a> to track people's activity across different apps and collects user preferences and information through them (e.g., what you searched on a browser and what you scrolled through on Instagram).</p>
</li>
<li><p><strong>Cross-device tracking</strong> <a target="_blank" href="https://www.adjust.com/glossary/cross-device-tracking/">refers</a> to the set of technologies and methods used to track users across multiple devices by matching activity across these devices to the same user who performs them by using shared identifiers, such as sign-in data.</p>
</li>
</ul>
<p>Result: <strong>You become one continuous user across platforms</strong>, and the ads follow you everywhere.</p>
<ol start="3">
<li><h3 id="heading-third-party-data-brokers"><strong>Third-Party Data Brokers</strong></h3>
</li>
</ol>
<p>A <a target="_blank" href="https://www.techtarget.com/whatis/definition/data-broker-information-broker">data broker</a>, also called an information broker or information reseller, is a business that collects large amounts of personal information about consumers from a wide range of public and nonpublic sources.</p>
<ul>
<li><p><strong>First-party data</strong> comes from apps and services that offer their products and services for <a target="_blank" href="https://www.avast.com/c-data-brokers">free in exchange</a> for collecting your data (e.g., a weather app you gave location access to). These are known as <strong>first-party data brokers</strong>, because they have a direct relationship with you as their customer.</p>
</li>
<li><p><strong>Third-party data brokers</strong> buy your data, merge it with other sources (public records, purchases, browsing habits), and sell it to advertisers.</p>
</li>
</ul>
<blockquote>
<p>In other words, you’re not just sharing data with one app—you may be unknowingly sharing it with <strong>hundreds of third parties</strong>.</p>
</blockquote>
<p>Data brokers thrive in a world where services appear “free,” but your <strong>attention and identity are the actual products.</strong> In some cases, data brokers gather personal information through browser cookies, either purchasing the information from a web service or deploying the cookies themselves.</p>
<ol start="4">
<li><h3 id="heading-proximity-based-targeting"><strong>Proximity-Based Targeting</strong></h3>
</li>
</ol>
<p>Ever received an offer from a café just as you walk by?</p>
<p>That’s <a target="_blank" href="https://www.knorex.com/blog/2023/04/24/proximity-targeting/">proximity targeting</a> or hyperlocal marketing in action—powered by your phone’s GPS, Bluetooth, or WiFi data.</p>
<ul>
<li><p><strong>Location-based targeting</strong> uses broader GPS data to show ads relevant to your city or travel history.</p>
</li>
<li><p><strong>Proximity targeting</strong> goes deeper—pinpointing your exact location (like inside a mall or near a shop) and sending hyper-local ads.</p>
</li>
</ul>
<p>Combine that with your purchase history and browsing patterns, and the system knows <strong>what you want, where you are, and when to sell to you</strong>.</p>
<ol start="5">
<li><h3 id="heading-smart-assistant-activations"><strong>Smart Assistant Activations</strong></h3>
</li>
</ol>
<p>Voice assistants like <strong>Alexa, Siri, or Google Assistant</strong> are always listening for "wake words" like “Hey Siri” or “OK Google.” Manufacturers often design devices in a way that leaves users unclear whether and when data collection and processing takes place. So, they sometimes misfire.</p>
<ul>
<li><p>Devices and sensors are active all the time and, therefore, also collect data most of the time.</p>
</li>
<li><p>Devices occasionally activate <strong>accidentally</strong> and record snippets that may be sent to servers for analysis.</p>
</li>
<li><p>Even non-voice sensors (like temperature or light sensors in IoT devices) can help infer your daily routines.</p>
</li>
<li><p>Independent of their function and their sensors, all these smart devices <a target="_blank" href="https://link.springer.com/article/10.1007/s00146-025-02182-4">collect and share</a> some kind of data about their environments.</p>
</li>
<li><p>Everyday behavior patterns of users or keywords from their conversations could be derived through the process of “Inferencing” where new information is inferred from existing data by processing and linking these data in new ways.</p>
</li>
</ul>
<p>This leads to what experts call <strong>predictive privacy</strong>:</p>
<blockquote>
<p>The process of <strong>deriving new personal information</strong>—even things you never shared—by analyzing the data you <em>did</em> share.</p>
</blockquote>
<p>In rare cases, even anonymized data can be <strong>de-anonymized</strong> when cross-referenced with other datasets.</p>
<h2 id="heading-how-to-protect-yourself"><strong>How to Protect Yourself</strong></h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1751137173406/470a8c59-0d2a-4763-b3a1-5dbff110edce.png" alt="How to Protect Yourself" class="image--center mx-auto" /></p>
<ol>
<li><p><strong>Review App Permissions</strong>: Go to your phone settings and revoke microphone access from apps that don’t need it.</p>
</li>
<li><p><strong>Limit Ad Personalization</strong>: Opt out of Google and Facebook ad personalization from your account settings.</p>
</li>
<li><p><strong>Disable Always-On Voice Assistants</strong>: Unless essential, turn off "Hey Siri" or "OK Google" features.</p>
</li>
<li><p><strong>Read the Privacy Policy</strong>. Many apps request access to device functions that are unrelated to their performance. Always consider whether the app really needs your data to do its job before you tap “Accept.”</p>
</li>
<li><p><strong>Some categories are more intrusive:</strong> Social networking, health and lifestyle, and navigation apps consistently top the charts for overall and unnecessary requests. Be cautious when installing and using apps in these categories.</p>
</li>
</ol>
<h2 id="heading-conclusion-its-not-mind-readingits-data-mastery"><strong>Conclusion: It’s Not Mind Reading—It’s Data Mastery</strong></h2>
<blockquote>
<p>India’s <a target="_blank" href="https://www.meity.gov.in/static/uploads/2024/06/2bf1f0e9f04e6fb4f8fef35e82c42aa5.pdf"><strong>Digital Personal Data Protection (DPDP) Act, 2023</strong></a> is designed to give users more control over how their personal data is collected, stored, and shared. It mandates <strong>clear consent</strong>, <strong>data minimization</strong>, and penalties for unauthorized data transfers. While promising on paper, enforcement is still evolving—and many apps continue to overreach or exploit vague permissions. <a target="_blank" href="https://assets.kpmg.com/content/dam/kpmgsites/in/pdf/2023/08/decoding-the-digital-personal-data-protection-act-2023.pdf.coredownload.inline.pdf">Understanding your rights under this law</a> is the first step in reclaiming your privacy.</p>
</blockquote>
<p>Your phone may not literally read your thoughts, but it doesn’t have to. With enough behavioral data, modern AI <strong>can predict your needs, desires, and vulnerabilities</strong> better than most humans can. That’s why understanding data collection, app permissions, and digital hygiene is no longer optional—it’s a core part of your personal cybersecurity.</p>
<p>This isn’t just about targeted ads. It’s about <strong>who controls your attention</strong>, <strong>your decisions</strong>, <strong>and your identity</strong> in the digital world.</p>
<p><strong>Stay aware. Stay safe.</strong></p>
]]></content:encoded></item><item><title><![CDATA[💡 How I Discovered “Amal’s First Switch Equation” – A New Way to Think About FizzBuzz with Switch-Case]]></title><description><![CDATA[What if you had to solve FizzBuzz using only switch-case — no if, no ternary operators?

Most of us have solved FizzBuzz using if-else. It's one of the most common programming exercises taught to beginners, and often used in interviews to test logica...]]></description><link>https://blog.interintender.com/amals-first-switch-equation</link><guid isPermaLink="true">https://blog.interintender.com/amals-first-switch-equation</guid><category><![CDATA[FizzBuzzReimagined]]></category><category><![CDATA[AmalsSwitchEquation]]></category><category><![CDATA[CodingWithoutIfElse]]></category><category><![CDATA[SwitchCaseHack]]></category><category><![CDATA[CodeCreatively]]></category><category><![CDATA[TheCyberChanakya]]></category><category><![CDATA[interview questions]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Thu, 26 Jun 2025 11:02:19 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1750933840245/f40d1631-cd35-43d6-b43f-98f404d6240e.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote>
<p>What if you had to solve FizzBuzz using only <code>switch-case</code> — no <code>if</code>, no ternary operators?</p>
</blockquote>
<p>Most of us have solved <a target="_blank" href="https://en.wikipedia.org/wiki/Fizz_buzz">FizzBuzz</a> using <code>if-else</code>. It's one of the most common programming exercises taught to beginners, and often used in interviews to test logical thinking.</p>
<p>Yesterday, during a coding session, our mentor gave us that exact challenge. It sounded simple but turned into a deep exploration that led me to something surprising — something I now call:</p>
<h2 id="heading-amals-first-switch-equation">Amal’s First Switch Equation</h2>
<p>It’s a simple way to map <strong>multiple true/false conditions</strong> into a <strong>single key</strong> — using <strong>powers of 2</strong>, using <strong>binary logic</strong> used in <a target="_blank" href="https://www.geeksforgeeks.org/dsa/what-is-bitmasking/">bit-masking</a> — so we can use <code>switch-case</code> elegantly without branching.</p>
<blockquote>
<p><strong>Key = (result % x1== 0)*2⁰ + (result % x2 == x2)*2¹+………+(result % xn== 0)*2^n-1</strong></p>
</blockquote>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1750943485411/11d5ff2b-bc06-46e1-bf7f-187ff39e2f37.jpeg" alt class="image--center mx-auto" /></p>
<h3 id="heading-explanation">Explanation</h3>
<ol>
<li><p>If there are 'n' numbers, then first of all, we can find the <strong>key</strong> by taking powers of 2 up to 2^n-1 in the respective order, starting from 2^0.</p>
</li>
<li><p>Then, when all '(𝘳𝘦𝘴𝘶𝘭𝘵 % x1​==0) to (𝘳𝘦𝘴𝘶𝘭𝘵 % x𝘯​==0)' conditions gets true, then the total sum would be the <strong>number of cases</strong>.</p>
</li>
</ol>
<h3 id="heading-example">Example</h3>
<p>Consider numbers 3 and 5.</p>
<ul>
<li><p>n=2</p>
</li>
<li><p>Key = (result%3==0) x 2^0 + (result%5==0) x 2^2-1</p>
<p>  \= (result%3==0) x 1 + (result%5==0) x 2</p>
</li>
<li><p>Now, to find the number of cases,<br />  Max true value will be 1 x 1 + 1 x 2 = 1 + 2 = 3<br />  So there will be 3 cases* [case 1: Fizz, case 2: Buzz, case 3: FizzBuzz]<br />  * this is except 'default' case.</p>
</li>
</ul>
<h2 id="heading-why-this-is-useful">Why This Is Useful</h2>
<ul>
<li><p>Avoids nested <code>if-else</code> chains</p>
</li>
<li><p>Makes logic scalable — easily add more conditions</p>
</li>
<li><p>Gives a clean <code>switch-case</code> structure</p>
</li>
<li><p>Introduces beginners to the power of bit-masking</p>
</li>
</ul>
<h2 id="heading-conclusion">Conclusion</h2>
<p>I did not come across this key in a book or tutorial. It was born from pure experimentation and the limitations set by my instructor: "Don’t use if-else. Try using only switch." That constraint led me to think differently. I spent time rewriting the logic, breaking combinations, and eventually the switch-case became viable again with one powerful key.</p>
<p>I call it <strong>Amal’s First Switch Equation</strong> not out of ego, but as a reminder that <strong>discoveries often come from trying new paths</strong>. Anyone can find something unique when they <strong>push boundaries</strong>.</p>
]]></content:encoded></item><item><title><![CDATA[Digital Battlegrounds: How Cybercrime Rewrote the Rules of Modern Warfare]]></title><description><![CDATA[Introduction
In Mission: Impossible – Final Reckoning (2025), we saw how the global intelligence agencies are thrown into chaos when a cyberweapon goes rogue—capable of rewriting nuclear launch sequences, disabling satellite networks, and triggering ...]]></description><link>https://blog.interintender.com/cybercrime-in-modern-warfare</link><guid isPermaLink="true">https://blog.interintender.com/cybercrime-in-modern-warfare</guid><category><![CDATA[CyberSafety2025]]></category><category><![CDATA[CyberPeace]]></category><category><![CDATA[cyber warfare]]></category><category><![CDATA[#CyberChanakya]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Sun, 22 Jun 2025 16:06:34 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1750579575573/e10e5098-a66e-433a-afe0-974d028002b3.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-introduction">Introduction</h2>
<p>In <a target="_blank" href="https://en.wikipedia.org/wiki/Mission:_Impossible_%E2%80%93_The_Final_Reckoning"><em>Mission: Impossible – Final Reckoning (2025)</em></a>, we saw how the global intelligence agencies are thrown into chaos when a cyberweapon goes rogue—capable of rewriting nuclear launch sequences, disabling satellite networks, and triggering economic collapse. The film dramatizes a terrifying future where <strong>sovereignty is no longer protected by borders, but by firewalls.</strong></p>
<p>This cinematic prophecy has already begun to mirror reality.</p>
<p>In today's world, war is no longer just fought on battlefields—it is waged silently across <strong>digital borders</strong>. Gone are the days when tanks and missiles were the only weapons of destruction. In 2025, <strong>cybercrime has evolved into one of the deadliest tools of modern conflict</strong>—a weapon that can destabilize nations, collapse economies, and manipulate entire populations without firing a single bullet.</p>
<p>In this blog, we explore <strong>the rise of cybercrime during wartime, how it's being used as a geopolitical weapon, and what we can do to survive and resist this modern invisible war</strong>.</p>
<h2 id="heading-cybercrime-as-a-weapon-the-arsenal-of-modern-conflict">Cybercrime as a Weapon: The Arsenal of Modern Conflict</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1750605924625/9857ef6c-7137-4443-83cc-568fd9db8f7f.png" alt="Cybercrime as a Weapon" class="image--center mx-auto" /></p>
<p>Cyberwarfare is no longer about simple website defacements or email hacks. It includes a <strong>sophisticated toolkit of digital aggression</strong> used for both direct sabotage and psychological manipulation:</p>
<ul>
<li><p><a target="_blank" href="https://cybernews.com/cyber-war/israel-under-onslaught-of-ddos-attacks/"><strong>DDoS attacks</strong></a>: Bringing down websites, banking systems, or emergency response portals.</p>
</li>
<li><p><a target="_blank" href="https://www.techtarget.com/searchsecurity/tip/The-biggest-ransomware-attacks-in-history"><strong>Ransomware</strong></a>: Encrypting critical infrastructure—like hospital systems or airports—and demanding crypto-based ransoms.</p>
</li>
<li><p><a target="_blank" href="https://economictimes.indiatimes.com/news/international/us/china-russia-trust-erodes-as-beijings-hackers-go-rogue-launch-cyberattacks-to-steal-ukraine-war-secrets/articleshow/121976975.cms"><strong>Phishing campaigns</strong></a>: Impersonating as government communications to steal citizen data.</p>
</li>
<li><p><a target="_blank" href="https://csis-website-prod.s3.amazonaws.com/s3fs-public/2025-06/250610_Significant_Cyber_Incidents.pdf"><strong>Data breaches</strong></a>: Exposing confidential intelligence, military movement plans, or civilian IDs.</p>
</li>
<li><p><a target="_blank" href="https://www.brookings.edu/wp-content/uploads/2023/01/FP_20230105_deepfakes_international_conflict.pdf"><strong>AI-enhanced deepfakes</strong></a>: Creating fake political speeches or war crime footage to distort truth.</p>
</li>
<li><p><a target="_blank" href="https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/"><strong>Malware in supply chains</strong></a>: Infecting systems at the hardware or firmware level.</p>
</li>
</ul>
<p>These tools are used not only to destroy but to <strong>cause chaos, confusion, and fear</strong>—which are themselves weapons in modern geopolitics.</p>
<h2 id="heading-the-iran-israel-cyber-conflict-20242025">The Iran-Israel Cyber Conflict (2024–2025)</h2>
<p>The <a target="_blank" href="https://www.euronews.com/next/2025/06/19/hacking-crypto-and-destroying-data-how-the-israel-iran-conflict-is-developing-in-cyberspac">Iran-Israel confrontation</a> is one of the <strong>clearest case studies of cyber warfare in real time</strong>. As both nations rely heavily on digital infrastructure for military and civilian operations, cyberspace has become one of the most critical modern battlefields. A <a target="_blank" href="https://www.radware.com/security/threat-advisories-and-attack-reports/cyberattacks-hacktivism-and-disinformation-in-the-2025-israel-iran-war/">700% increase</a> in cyberattacks was reported this year against Israel in the first two days of the war, compared to the time period before June 12. Since the conflict began, it was observed that roughly 30 DDoS attack claims targeted Israel per day. A coordinated campaign of cyberattacks targeting the United States, the United Kingdom, and Israel were also announced.</p>
<h3 id="heading-stuxnet-the-origin-of-modern-cyberwarfare">Stuxnet: The Origin of Modern Cyberwarfare</h3>
<p>Cyber hostilities between Israel and Iran date back at least to 2010 with the discovery of the <a target="_blank" href="https://spectrum.ieee.org/the-real-story-of-stuxnet">Stuxnet worm</a>, widely regarded as the first cyberweapon that succeeded in destroying industrial infrastructure in an intelligence operation. Stuxnet is a 500-kilobyte computer worm (<em>unlike a virus that needs victim to install it, a worm spreads on its own, often over a computer network</em>) that infected the software of at least 14 industrial sites in Iran, including a uranium-enrichment plant. By altering the centrifuge rotation speeds, the malware caused equipment failures that significantly disrupted Iran’s nuclear program.</p>
<h3 id="heading-rise-of-unit-8200-israels-cyber-powerhouse">Rise of Unit 8200: Israel’s Cyber Powerhouse</h3>
<p>Unit 8200 is the largest single military unit in the Israel Defence Forces, descended from early codebreaking and intelligence units formed at the birth of the state of Israel in 1948. Alleged operations include:</p>
<ul>
<li><p>2005–2010: Involvement in the Stuxnet deployment.</p>
</li>
<li><p>2017: Cyberattack on Lebanon's Ogero telecoms.</p>
</li>
<li><p>2018: Foiled ISIS plot on an Australia–UAE flight using cyber intelligence.</p>
</li>
</ul>
<h3 id="heading-irans-cyber-retaliation">Iran’s Cyber Retaliation</h3>
<p>After the Stuxnet attack, Iran rapidly developed its cyber capabilities and began launching <a target="_blank" href="https://www.unitedagainstnucleariran.com/sites/default/files/UPDATE%20-%20The%20Iranian%20Cyber%20Threat.pdf">retaliatory cyber operations</a>, initially targeting Western and Gulf infrastructure.</p>
<ul>
<li><p>2012: Major DDoS attacks on U.S. banks.</p>
</li>
<li><p>2020–2025: Groups like <a target="_blank" href="https://www.radware.com/security/threat-advisories-and-attack-reports/heightened-cyberthreat-amidst-israel-iran-conflict/">APT35, MuddyWater, and CyberAv3ngers</a> pivoted focus to Israel, targeting water systems, healthcare networks, and surveillance infrastructure.</p>
</li>
</ul>
<h3 id="heading-predatory-sparrow-and-the-israeli-cyber-response">Predatory Sparrow and the Israeli Cyber Response</h3>
<p>The anti-Iranian hacking group with possible ties to Israel, <a target="_blank" href="https://x.com/darandegonjeshk">Gonjeshke Darande</a>, or “Predatory Sparrow,” claimed several high-profile operations:</p>
<ul>
<li><p>2022: Cyberattacks on Iranian steel plants.</p>
</li>
<li><p>2025: Breach of Bank Sepah and Nobitex, Iran’s largest crypto exchange, calling it “a tool for financing terrorism and violating sanctions.” The hackers threatened to publish Nobitex’s source code and internal data within 24 hours, warning users to remove any remaining funds. Blockchain <a target="_blank" href="https://cointelegraph.com/news/iranian-crypto-exchange-nobitex-exploited-for-73m-zachxbt">investigators later confirmed</a> <a target="_blank" href="https://cointelegraph.com/news/iranian-crypto-exchange-nobitex-exploited-for-73m-zachxbt">that approximately $81.7 mill</a>ion in digital assets were stolen from Nobitex’s wallets during the breach.</p>
</li>
</ul>
<h3 id="heading-iranian-clampdowns-and-digital-censorship">Iranian Clampdowns and Digital Censorship</h3>
<p>Lately, the <a target="_blank" href="https://time.com/7295424/iran-urges-residents-delete-whatsapp-israel-privacy/">Iranian government</a> has asked people to delete the social messaging app WhatsApp and has begun internet blackouts that have taken the country offline for “over 12 hours” due to “Israel’s alleged ‘misuse’ of the network for military purposes.</p>
<h3 id="heading-disinformation-campaigns-and-civil-panic-in-israel">Disinformation Campaigns and Civil Panic in Israel</h3>
<p>Israeli media <a target="_blank" href="https://www.jpost.com/israel-news/article-857969">reported</a> people receiving fraudulent text messages claiming to come from the Israeli Defence Forces (IDF) Home Front Command that warned of attacks on bomb shelters. The messages from OREF Alert were identified as fake by the Israeli authorities, who claim pro-Iranian groups are behind it as a way to sow panic during the operation against the Iranian military, called Operation Rising Lion. Another fake message circulated that said fuel supplies would be suspended for 24 hours.</p>
<h3 id="heading-ai-on-the-battlefield">AI on the Battlefield</h3>
<p>Israeli forces use AI systems that can watch over 1,000 live video and signal feeds at the same time and make decisions in seconds. Iran also uses AI to analyze satellite images and detect movements of troops and planes by training their computers with many images.</p>
<p>This escalating cyber conflict shows that war in 2025 is being waged not only with bombs and drones—but with algorithms, malware, and misinformation at scale.</p>
<h2 id="heading-india-under-cyber-siege">India Under Cyber Siege</h2>
<p>India and Pakistan, two nuclear-armed neighbors with a history of geopolitical friction, have seen their rivalry spill over into cyberspace over decades. The first Pakistani hacker group, Pakistani Hackers Club, was formed by two hacktivists with the pseudonyms ‘Doctornuker’ and ‘Mr. Sweet’.</p>
<p>Here's how the cyber front has intensified during key flashpoints.</p>
<h3 id="heading-1998-hacking-bhabha">1998 Hacking Bhabha</h3>
<p>In <a target="_blank" href="https://timesofindia.indiatimes.com/india/indo-pak-war-raging-in-cyberspace/articleshow/380255744.cms">1998</a>, Pakistani hackers named ‘Milw0rm’ hacked the website of Indian Bhabha Atomic Research Centers, the primary nuclear research facility of India for political reasons like anti-nuclear weapons agenda.</p>
<h3 id="heading-2008-mumbai-terrorist-attack">2008 Mumbai terrorist attack</h3>
<p>Indian hackers have defaced Pakistani websites in retaliation, and began organized defacement campaigns in response to the <a target="_blank" href="https://www.cnbc.com/2019/02/27/india-pakistan-online-war-includes-hacks-social-media.html">Mumbai</a> terrorist attacks. As a tit for tat, <a target="_blank" href="https://timesofindia.indiatimes.com/india/indian-pak-hackers-deface-govt-websites/articleshow/3759424.cms">Pakistan Cyber Army</a> later defaced of Indian Oil and Natural Gas Company as a reaction of Pakistani websites defacement.</p>
<h3 id="heading-2016-uri-attack-fallout">2016 Uri Attack Fallout</h3>
<p>In the year <a target="_blank" href="https://ojs.jdss.org.pk/journal/article/view/1280/1197">2016</a>, following the terrorist attack on the Indian Army base in Uri, India accused Pakistan of orchestrating cyber assaults on key Indian government websites, including, the Ministry of Defence and the Indian Army website. These attacks were aimed at disrupting military operations and confusing intelligence networks during escalating tensions.</p>
<h3 id="heading-2019-pulwama-amp-cyber-retaliation">2019 Pulwama &amp; Cyber Retaliation</h3>
<p>After the Pulwama terror attack in 2019, cyber retaliation followed almost immediately, wherein, <a target="_blank" href="https://timesofindia.indiatimes.com/gadgets-news/pulwama-attack-pakistani-websites-hacked-heres-the-list/articleshow/68042727.cms">Indian hacker groups</a> launched attacks on Pakistani government and news websites, including the websites of Pakistan's Foreign Ministry and Army.</p>
<h3 id="heading-2020-attacks-on-critical-infrastructure">2020 Attacks on Critical Infrastructure</h3>
<p>In <a target="_blank" href="https://cio.economictimes.indiatimes.com/news/digital-security/pakistan-based-hackers-targeting-critical-infrastructure-psus-in-india/84259947">2020</a>, reports surfaced of Pakistan-based APTs (Advanced Persistent Threats) targeting India’s power infrastructure. These attacks were suspected to be a cyber espionage campaign by Pakistan-backed groups, aimed at collecting sensitive information to gain a competitive advantage against India.</p>
<h3 id="heading-2025-cyber-escalation-during-operation-sindoor">2025 Cyber Escalation During Operation Sindoor</h3>
<p>Amid renewed tensions in May 2025, following the Operation Sindoor counter-terrorist initiative, a significant spike in <a target="_blank" href="https://www.orfonline.org/expert-speak/operation-sindoor-and-india-s-cyber-threat-landscape">cyberattacks</a> was recorded.</p>
<ul>
<li><p>Symbolic Defacements and Disinformation: In April, the IOK Hacker (Internet of Khilafah) was reported to have tried and failed to access critical infrastructure and shifted focus to defacing child welfare platforms and spreading digital propaganda. Groups like HOAX1337 and National Cyber Crew made a series of <a target="_blank" href="https://www.hindustantimes.com/india-news/pak-hackers-attempt-to-hack-army-sites-after-pahalgam-attack-efforts-foiled-by-india-101746184904847.html">unsuccessful attempts to breach</a> Indian digital platforms linked to welfare, healthcare, and education like the Army Institute of Hotel Management, Indian Air Force veterans' services, Welfare portals for ex-servicemen and school websites like APS Srinagar and APS Ranikhet.</p>
</li>
<li><p>Phishing and Infrastructure Attacks: State police in Tamil Nadu and Himachal Pradesh flagged a spike in phishing attacks. Another <a target="_blank" href="https://timesofindia.indiatimes.com/technology/tech-news/pakistani-hackers-attacked-1-5-million-plus-indian-websites-after-operation-sindoor-failure-rate-names-of-7-pakistani-hacker-groups-techniques-used-and-more/articleshow/121128592.cms">report</a> recorded that over 1.5 million cyberattack attempts happened during this period leading to at least 150 successful breaches, including, DDoS attacks, malware infiltrations and GPS spoofing. The report also highlighted rise in malicious cyber activities originating from Bangladesh, Indonesia, Morocco etc.</p>
</li>
<li><p>Malware and Espionage: APT-36 (aka Transparent Tribe / Earth Karkaddan) continued campaigns using Crimson RAT malware targeting government officials, military personnel and defense contractors.</p>
</li>
</ul>
<p>Alongside cyberattacks, many Pakistan-based threat actors and social media handles also engaged in intense coordinated anti-India disinformation and propaganda campaigns. They have claimed that Operation Sindoor targeted civilians, Pahalgam attack was a false flag, Indian military installations suffered massive damage and even claims that Indian critical infrastructure, power grids and communication networks were breached.</p>
<p>India’s cybersecurity landscape now sits at a precarious intersection of geopolitics, warfare, and emerging technologies. From power grid attacks to psychological manipulation, the India-Pakistan cyberwar theatre has escalated from symbolic to potentially catastrophic.</p>
<h2 id="heading-advise-for-digital-citizens">Advise for Digital Citizens</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1750607259685/0ba26d9f-6b71-49db-a3b2-f7200de92a59.png" alt="Chancya's Advise for Digital Citizens" class="image--center mx-auto" /></p>
<p>Unlike traditional war, where citizens are protected behind military lines, <strong>cyberwarfare pushes every smartphone user into the war zone</strong>, by depriving them of basic services (power, water, communication) or becoming victims of identity theft and social engineering scams, exposing them to AI-crafted lies and deepfakes that fuel fear and misinformation etc. In war, fear spreads faster than fire and cyberattacks feed on that fear.</p>
<p>As responsible digital citizens of 2025, we should,</p>
<ol>
<li><p><strong>Verify every alert in a time of fear.</strong></p>
<ul>
<li><p>Fake emergency alerts spread panic.</p>
</li>
<li><p>Always double-check via official sources.</p>
</li>
<li><p>Regularly follow CERT-In, RBI, and PIB Fact Check for verified security updates.</p>
</li>
</ul>
</li>
<li><p><strong>In chaos, speak only with truth.</strong></p>
<ul>
<li><p>Avoid forwarding sensational content. Share only verified information.</p>
</li>
<li><p>Report incidents quickly in <a target="_blank" href="https://cybercrime.gov.in/">National Cybercrime Portal</a> or Cyber Helpline (Dial 1930).</p>
</li>
</ul>
</li>
<li><p><strong>The greatest betrayal is self-inflicted.</strong></p>
<ul>
<li><p>Clicking unknown links, installing suspicious apps, or sharing OTPs—these are modern acts of self-sabotage.</p>
</li>
<li><p>Enable two-factor authentication (2FA) on all critical platforms.</p>
</li>
<li><p>Avoid using third-party apps for banking; rely on government-endorsed apps like BHIM and DigiLocker.</p>
</li>
</ul>
</li>
<li><p><strong>Wisdom is the shield no malware can breach.</strong></p>
<ul>
<li>Digital literacy is now national defense. Educate family members on frauds, phishing, and deepfakes.</li>
</ul>
</li>
</ol>
<h2 id="heading-conclusion-rise-of-the-digital-warrior">Conclusion: Rise of the Digital Warrior</h2>
<p>Cybercrime in war is no longer hypothetical—it is here, active, and dangerously effective. In this new war theater, malware is the missile, misinformation is the fog, and fear is the fuel. To survive this age of digital destruction, we must Be skeptical. Be informed. Be alert.</p>
<p>Let us not just protect our passwords—but preserve our truth, our peace, and our people.</p>
<p><strong>Stay aware. Stay safe.</strong></p>
]]></content:encoded></item><item><title><![CDATA[🏦 Banking Frauds in 2025: How to Outsmart Digital Thieves]]></title><description><![CDATA[Introduction
In 2025, India stands at the forefront of digital banking innovation. From Unified Payments Interface (UPI) 2.0 to biometric authentication and voice-command banking, convenience has taken a quantum leap. Rural regions, urban millennials...]]></description><link>https://blog.interintender.com/banking-frauds-in-2025-how-to-outsmart-digital-thieves</link><guid isPermaLink="true">https://blog.interintender.com/banking-frauds-in-2025-how-to-outsmart-digital-thieves</guid><category><![CDATA[BankingFraud2025]]></category><category><![CDATA[DigitalSecurityIndia]]></category><category><![CDATA[UPIFraud]]></category><category><![CDATA[FinancialCyberCrime]]></category><category><![CDATA[RBIAlert]]></category><category><![CDATA[ScamPrevention]]></category><category><![CDATA[DigitalIndiaSecure]]></category><category><![CDATA[#cyberawareness]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Thu, 19 Jun 2025 07:10:13 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1750315634201/d0299272-d9df-43a5-b61a-9e8f1fc0944c.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-introduction">Introduction</h2>
<p>In 2025, India stands at the forefront of digital banking innovation. From Unified Payments Interface (UPI) 2.0 to biometric authentication and voice-command banking, convenience has taken a quantum leap. Rural regions, urban millennials, and senior citizens alike are now integrated into the digital finance ecosystem.</p>
<p>But with great convenience comes great vulnerability. <strong>Banking frauds</strong> are no longer crude tricks—they are <strong>psychological operations, social engineering attacks,</strong> and <strong>AI-powered manipulations</strong> designed to bypass not just firewalls, but human judgment.</p>
<p>In this blog, lets dissect the evolving fraud landscape and offer strategic wisdom to empower everyday users.</p>
<h2 id="heading-the-modern-banking-fraud-landscape">The Modern Banking Fraud Landscape</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1750316012645/9a4c13d2-054b-48a8-a207-5aa7add98ca8.png" alt="The Modern Banking Fraud Landscape" class="image--center mx-auto" /></p>
<p>Here are the different types of financial frauds as <a target="_blank" href="https://rbi.org.in/commonman/Upload/english/Content/PDFs/English%20BEAWARE.pdf">reported by RBI</a>. There are Banking financial company (1-14) and Non-Banking financial company (NBFC) (15-20) transactions.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Type</strong></td><td><strong>Modus Operandi</strong></td><td><strong>Note</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>1. QR Code Scams</strong></td><td>Fraudsters trick customers into <strong>scanning Quick Response (QR) codes</strong> using the apps on the customers’ phone. Customers may thus, unknowingly authorize the fraudsters to withdraw money from their account.</td><td>To receive money you do not require scanning barcodes / QR codes or entering mobile banking Personal Identification Number (m-PIN), passwords, etc. Never scan any QR code to receive money. <strong>QR codes have account details embedded in them to transfer money to a particular account.</strong></td></tr>
<tr>
<td><strong>2. Phishing* links</strong></td><td>Fraudsters create a third-party phishing <strong>website which looks like an existing genuine website, and links to these websites are circulated</strong> through Short <strong>Message</strong> Service (SMS) / social media / email / Instant Messenger, etc. Many customers click on the link without checking the detailed Uniform Resource Locator (URL) and enter secure credentials such as PIN, One Time Password (OTP), Password, etc., which are captured and used by the fraudsters.</td><td><strong>Always</strong> <strong>go to the official website</strong> of your bank / service provider. Carefully verify the website details especially where it requires entering financial credentials. <strong>Check</strong> URLs and domain names received in these messages <strong>for spelling errors</strong>.</td></tr>
<tr>
<td><strong>3. Vishing*</strong> <strong>calls</strong></td><td>Imposters <strong>approach the customers through calls / social media</strong> posing as bankers / company executives / insurance agents / government officials, etc. and even share a few customer details such as the customer’s name or date of birth. In some cases, imposters pressurize / <strong>trick customers into sharing confidential details</strong> such as passwords / OTP / PIN / Card Verification Value (CVV) etc., by <strong>citing an urgency</strong>, like, need to block an unauthorized transaction.</td><td>Bank officials / financial institutions / RBI / any <strong>genuine entity never ask customers to share confidential information</strong> such as username / password / card details / CVV / OTP.</td></tr>
<tr>
<td><strong>4. Online sales platform</strong></td><td>Fraudsters <strong>pretend to be buyers</strong> on online sales platforms and show an interest in seller’s products. Instead of paying money to the seller, <strong>they use the “request money” option</strong> through the UPI app and insist that the seller approve the request by entering UPI PIN. Once the seller enters the PIN, money is transferred to the fraudster’s account.</td><td>If UPI or any other app requires you to enter PIN to complete a transaction, it means you will be sending money instead of receiving it. Always remember that <strong>there is no need to enter PIN / password anywhere to receive money</strong>.</td></tr>
<tr>
<td><strong>5. Unknown / unverified mobile apps</strong></td><td>Fraudsters <strong>circulate certain app links</strong>, masked to appear similar to the existing apps of authorized entities. As customer click on such links, it <strong>results in downloading of unknown / unverified apps</strong> on the customer’s mobile / laptop / desktop, etc. Once the malicious application is downloaded, the fraudster gains complete access to the customer’s device.</td><td><strong>Never download an application from any unverified / unknown sources</strong> or on being asked/ guided by an unknown person. Before downloading an app, <strong>check on the publishers / owners</strong> of the app as well as its <strong>user ratings</strong> etc. While downloading an application, <strong>check the permission/s and the access to your data it seeks</strong>, such as contacts, photographs, etc. Only give those permissions which are absolutely required to use the desired application.</td></tr>
<tr>
<td><strong>6. ATM card skimming</strong></td><td>Fraudsters install <strong>skimming devices in ATM</strong> machines and steal data from the customer’s card. Fraudsters may also install a <strong>dummy keypad or a small / pinhole camera</strong>, well-hidden from plain sight to capture ATM PIN. Sometimes, fraudsters <strong>pretending to be other customer</strong> standing near-by gain access to the PIN when the customer enters it in an ATM machine. This data is then used to create a duplicate card and withdraw money from the customer’s account.</td><td>Always <strong>check that there is no extra device attached</strong>, near the card insertion slot or keypad of the ATM machine, before making a transaction. <strong>Cover the keypad</strong> with your other hand while entering the PIN. <strong>NEVER write the PIN</strong> on your ATM card. <strong>Do NOT</strong> enter the <strong>PIN</strong> in the presence of any <strong>unknown person</strong> standing close to you. Do NOT give your ATM card to anyone for withdrawal of cash. Do NOT follow the <strong>instructions given by any unknown person or take assistance</strong> from strangers at the ATMs. If cash is not dispensed at the ATM, <strong>press the ‘Cancel’ button and wait</strong> for the home screen to appear before leaving the ATM.</td></tr>
<tr>
<td><strong>7. Screen sharing app / Remote access</strong></td><td>Fraudsters trick the customer to <strong>download a screen sharing app</strong>. Using such app, the fraudsters can watch / control the customer’s mobile / laptop and gain access to the financial credentials of the customer.</td><td>If your device faces any technical glitch and you need to download any screen sharing app, <strong>deactivate / log out of all payment related apps</strong> from your device. Download such apps only when you are advised through the <strong>official Toll-free number of the company as appearing in its official website</strong>. Do not download such apps in case an executive of the company contacts you through his / her personal contact number. As soon as the work is completed, <strong>ensure that the screen sharing app is removed from your device</strong>.</td></tr>
<tr>
<td><strong>8. SIM swap / SIM cloning</strong></td><td>Fraudsters <strong>gain access to the customer’s</strong> Subscriber Identity Module (<strong>SIM</strong>) card or may obtain a duplicate SIM card (including electronic-SIM) for the registered mobile number connected to the customer’s bank account <strong>and use the OTP received</strong> on such duplicate SIM to carry out unauthorized transactions. Fraudsters generally collect the personal / identity details from the customer by posing as a telephone / mobile network staff and request the customer details in the name of offers like upgrading the SIM.</td><td><strong>Never share identity credentials pertaining to your SIM card</strong>. Be watchful regarding mobile network access in your phone. <strong>If there is no mobile network in your phone for a considerable amount of time in a regular environment, immediately contact the mobile operator</strong> to ensure that no duplicate SIM is being / has been issued for your mobile number.</td></tr>
<tr>
<td><strong>9. Frauds through search engine results</strong></td><td>Customers use search engines to obtain contact details / customer care numbers of their bank, insurance company, Aadhaar updation centre, etc. These <strong>contact details on search engines often do NOT belong to the respective entity</strong> but are made to appear as such by fraudsters. Customers may end up contacting unknown / unverified contact numbers of the fraudsters displayed as bank / company’s contact numbers on search engine. Once the customers call on these contact numbers, the imposters ask the customers to share their card credentials / details for verification. Assuming the fraudster to be a genuine representative of the entity, customers share their secure details and thus fall prey to frauds.</td><td>Always <strong>obtain the customer care contact details from the official websites of banks / companies</strong>. Do not call the numbers directly displayed on the search engine results page as these are often camouflaged by fraudsters. Please also note that <strong>customer care numbers are never in the form of mobile numbers</strong>.</td></tr>
<tr>
<td><strong>10. Impersonation on social media</strong></td><td>Fraudsters <strong>create fake accounts</strong> using details of the users of social media platforms such as Facebook, Instagram, Twitter, etc. Fraudsters <strong>then send a request to the users’ friends asking for money</strong> for urgent medical purposes, payments, etc. Fraudsters, using fake details, also contact users and gain users’ trust over a period of time. When the users’ share their personal or private information, the fraudsters use such information to blackmail or extort money from the users.</td><td>Always <strong>verify the genuineness of a fund request</strong> from a friend / relative by <strong>confirming through a phone call / physical meeting</strong> to be sure that the profile is not impersonated. Do not make payments to unknown persons online. Do not share personal and confidential information on social media platforms.</td></tr>
<tr>
<td><strong>11. Juice jacking</strong></td><td>Fraudsters use <strong>public charging ports to transfer malware</strong> to customer <strong>phones</strong> connected there and take control / access / steal data sensitive data such as emails, SMS, saved passwords, etc. from the customers’ mobile phones. The charging port of a mobile can be used to transfer files / data.</td><td>Avoid using public / unknown charging ports / cables.</td></tr>
<tr>
<td><strong>12. Lottery fraud</strong></td><td>Fraudsters send <strong>emails or make phone calls that a customer has won a huge lottery</strong>. However, in order to receive the money, the fraudsters ask the customers to confirm their identity by entering their bank account / credit card details on a website from which data is captured by the fraudsters. Fraudsters also ask the customers to pay taxes/ forex charges / upfront or pay the shipping charges, processing / handling fee, etc., to receive the lottery / product. Fraudsters in some cases, may also pose as a representative of RBI or a foreign bank / company / international financial institution and ask the customer to transfer a relatively small amount in order to receive a larger amount in foreign currency from that institution. Since the requested money is generally a very small percentage of the promised lottery / prize, the customer may fall into the trap of the fraudster and make the payment.</td><td>Beware of such unbelievable lottery or offers - nobody gives free money, especially such huge amounts of money. <strong>Do not make payments or share secure credentials in response to any lottery calls / emails</strong>. RBI never opens accounts of members of public or takes deposits from them. Such messages are fraudulent. RBI never asks for personal / bank details of members of public. Beware of fake RBI logos and messages. <strong>Never respond to messages offering / promising prize money, government aid and Know Your Customer (KYC) updation to receive prize money</strong> from banks, institutions etc.</td></tr>
<tr>
<td><strong>13. Online job fraud</strong></td><td>Fraudsters create <strong>fake job search websites</strong> and when the <strong>job seekers share secure credentials</strong> of their bank account / credit card / debit card on these websites <strong>during registration</strong>, their accounts are compromised. Fraudsters also <strong>pose as officials of reputed company(s) and offer employment after conducting fake interviews</strong>. The job seeker is then induced to transfer funds for registration, mandatory training program, laptop, etc.</td><td>For any job offer, including from overseas entities, <strong>first confirm the identity and contact details</strong> of the employing company / its representative. Always remember that <strong>a genuine company offering a job will never ask for money for offering the job</strong>. Do not make payments on unknown job search websites.</td></tr>
<tr>
<td><strong>14. Money mules</strong></td><td>Fraudsters contact customers via emails, social media, etc., and <strong>convince them to receive money into their bank accounts</strong> (money mule), <strong>in exchange for attractive commissions</strong>. The money mule is <strong>then directed to transfer the money to another money mule’s account</strong>, starting a chain that ultimately results in the money getting transferred to the fraudster’s account. Alternatively, the fraudster may direct the money mule to withdraw cash and hand it over to someone. When such frauds are reported, the money mule becomes the target of police investigation for money laundering.</td><td>Do not allow others to use your account to receive or transfer money for a fee / payment. Do not respond to emails asking for your bank account details. <strong>Do not get carried away by attractive offers / commissions and give consent to receive unauthorized money and to transfer them to others or withdraw cash and give it out for a handsome fee</strong>. If the source of funds is not genuine, or the rationale for underlying transaction is not proved to authorities, the receiver of money is likely to land in serious trouble with police and other law enforcement agencies.</td></tr>
<tr>
<td><strong>15. Fake advertisements for extending loans</strong></td><td>Fraudsters issue <strong>fake advertisements offering personal loans at very attractive and low rates of interest or easy repayment options or without any requirement of collateral/ security, etc</strong>. They send emails often looking like the emails IDs of senior officials of well-known / genuine NBFCs. The fraudsters then take money from the borrowers in the name of various <strong>upfront charges</strong> like processing fees, Goods and Services Tax (GST), intercity charge, advance Equated Monthly Instalment (EMI), etc., <strong>and abscond without disbursing the loans</strong>. Fraudsters also create fake website links to show up on search engines, when people search for information on loans.</td><td><strong>Loan processing fee</strong> charged by NBFCs / banks <strong>is deducted from the sanctioned loan amount and not demanded upfront</strong> in cash from the borrower. Never pay any processing fee in advance as NBFCs / banks will never ask for an advance fee before the processing of loan application. Do not make payments or enter secure credentials against online offer of loans at low interest rates, etc., without checking / verifying the particulars through genuine sources.</td></tr>
<tr>
<td><strong>16. SMS / Email / Instant Messaging / Call scams</strong></td><td>Fraudsters circulate fake messages in instant messaging apps / SMS / social media platforms <strong>on attractive loans</strong> and use the logo of any known NBFC as profile picture in the mobile number shared by them to induce credibility. They may even share their Aadhaar card / Pan Card and fake NBFC ID card. After sending such bulk messages / SMS / emails, the fraudsters call random people and share fake sanction letters, copies of fake cheques, etc., <strong>and demand various charges</strong>. Once the borrowers pay these charges, the fraudsters abscond with the money.</td><td>Never believe loan offers made by people on their own through telephones / emails, etc. <strong>Never make any payment against such offers or share any personal / financial credentials against such offers without cross-checking that it is genuine through other sources</strong>. Never click on links sent through SMS / emails or reply to promotional SMS / emails. Never open / respond to emails from unknown sources containing suspicious attachment or phishing links.</td></tr>
<tr>
<td><strong>17. OTP based Frauds</strong></td><td>Fraudsters impersonating as NBFCs, send SMS / messages <strong>offering loans or enhancement of credit limit</strong> on NBFC/bank customers’ loan accounts, and <strong>ask the customers to contact them on a mobile number</strong>. When the customers call such numbers, fraudsters ask them to <strong>fill forms</strong> to collect their financial credentials. Fraudsters then induce / convince the customers to <strong>share the OTP or PIN details and carry out unauthorized transfers</strong> from the customers’ accounts.</td><td><strong>Never share</strong> OTP / PIN / personal details, etc., in any form with anyone, including your own friends and family members. <strong>Regularly check</strong> SMS / emails to ensure that no OTP is generated without your prior knowledge. <strong>Always access the official website</strong> of bank / NBFC / e-wallet provider or contact the branch to avail their services and / or seek product and services related information and clarifications.</td></tr>
<tr>
<td><strong>18. Fake loan websites / App frauds</strong></td><td>Fraudsters create unscrupulous <strong>loan apps which offer instant and short-term loans</strong>. These apps dupe the borrowers and may also charge significantly higher interest rates. To attract gullible borrowers, the fraudsters advertise “limited period offers” and ask borrowers to make urgent decisions using pressure tactics.</td><td>Verify if the lender is <strong>registered with the Government / Regulator /authorized agencies</strong>. Check whether the lender has provided a <strong>physical address or contact information</strong> to ensure it is not difficult to contact them later. Beware if the lender appears <strong>more interested in obtaining personal details rather than in checking credit scores</strong>. Remember that any reputed NBFC / bank <strong>will never ask for payment before processing the loan application</strong>. Genuine loan providers <strong>never offer money without verifying documents and other credentials</strong> of the borrowers. Verify if these NBFC-backed loan apps are genuine.</td></tr>
<tr>
<td><strong>19. Money circulation / Ponzi / Multi-Level Marketing (MLM) schemes fraud</strong></td><td>Fraudsters use MLM / Chain Marketing / Pyramid Structure schemes to promise easy or quick money upon enrolment / adding of members. The schemes not only assure high returns but also pay the first few instalments (EMIs) to gain confidence of gullible persons and attract more investors through word of mouth publicity. The schemes encourage addition of more people to the chain / group. <strong>Commission is paid to the enroller for the number of people joining the scheme, rather than for the sale of products</strong>. This model becomes unsustainable after some time when number of persons joining the scheme starts declining. Thereafter, the fraudsters close the scheme and disappear with the money invested by the people till then.</td><td>Returns are proportional to risks. Higher the return, higher is the risk. Any scheme offering <strong>abnormally high returns (40-50% p a) consistently</strong>, could be the first sign of a potential fraud and caution needs to be exercised. Always notice that any payment / commission / bonus / percentage of profit without the actual sale of goods / service is suspicious and may lead to a fraud. <strong>Acceptance of money under Money Circulation / MLM / Pyramid structures is a cognizable offence under the Prize Chits and Money Circulation Schemes (Banning) Act, 1978</strong>. In case of such offers or information of such schemes, a complaint must be immediately lodged with the State Police.</td></tr>
<tr>
<td><strong>20. Fraudulent loans with forged documents</strong></td><td>Fraudsters use <strong>forged documents</strong> to avail services from financial institutions. Fraudsters commit <strong>identity thefts, steal personal information</strong> of customers such as identity cards, bank account details etc., and use this information or credentials to avail benefits from a financial institution. Fraudsters pose as NBFC employees and collect KYC related documents from customers.</td><td>Exercise due care and vigilance while providing KYC and other personal documents, including the National Automated Clearing House (NACH) form for loan sanction / availing of credit facility from any entity, especially individuals posing to be representatives of these entities. Such documents should be shared <strong>only with the entity’s authorized personnel or on authorized email IDs</strong> of the entities. Follow up with the concerned entities to <strong>ensure that the documents shared by you are purged immediately by them in case of non-sanction of loan and/ or post closure of the loan account</strong>.</td></tr>
</tbody>
</table>
</div><blockquote>
<p>*Phishing is the fraudulent practice of sending emails or other messages, whereas, Vishing is the fraudulent practice of making phone calls or leaving voice messages, both, claiming to be from a reputed company to make you reveal your personal information, such as passwords and credit card numbers.</p>
</blockquote>
<h2 id="heading-practical-strategies-to-safeguard-against-fraud">Practical strategies to safeguard against fraud</h2>
<p>Drawing from Chanacya's wisdom, here's a practical set of strategies to safeguard against banking fraud:</p>
<ul>
<li><p>Always verify messages, calls, or emails through official bank numbers or websites.</p>
</li>
<li><p>Never allow unknown persons to screen-share or install apps on your device.</p>
</li>
<li><p>Never act in urgency. Always pause before making payments or sharing details.</p>
</li>
<li><p>Never scan QR codes to receive money. It always means you're paying someone.</p>
</li>
<li><p>Educate your family, especially elders and children, about fraud techniques.</p>
</li>
</ul>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Action</strong></td><td><strong>Description</strong></td></tr>
</thead>
<tbody>
<tr>
<td>Report fraud</td><td>Dial <strong>1930</strong> - National Cybercrime Helpline</td></tr>
<tr>
<td>File online complaint</td><td>Visit <a target="_blank" href="https://cybercrime.gov.in/">Cyber crime portal</a></td></tr>
<tr>
<td>Block scam calls</td><td>Use DND and other filtering tools</td></tr>
<tr>
<td>Download official apps</td><td>Only from Play Store or iOS App Store (never third-party)</td></tr>
<tr>
<td>Verify with RBI/NBFC</td><td>Cross-check licenses of loan apps on <a target="_blank" href="https://rbi.org.in/">RBI platform</a></td></tr>
</tbody>
</table>
</div><h2 id="heading-conclusion">Conclusion</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1750316557515/3500407e-ebfa-44a6-bae9-e86323d02a8d.png" alt="Chanacya reminding your mind is your firewall" class="image--center mx-auto" /></p>
<p>Banking frauds in 2025 are intelligent, invasive, and deeply personal. In the age of AI, deepfakes, and instant payments, <strong>your mind is your firewall</strong>. You must protect your digital kingdom with awareness and caution.</p>
<p>Remember: <strong>Fraudsters don’t break in—they fool you into handing over the key.</strong> Stay alert, educate your family, and help spread digital dharma.</p>
<p><strong>Stay aware. Stay safe.</strong></p>
]]></content:encoded></item><item><title><![CDATA[Don’t Let Fraudulent Messages Chase You: Decode Before You Click]]></title><description><![CDATA[⚠️ Every day, millions of Indians are targeted by fake SMS messages—some claiming urgent bank alerts, others impersonating government bodies. But what if there's a way to identify authentic messages just by reading their sender ID?

Welcome to your f...]]></description><link>https://blog.interintender.com/dont-let-fraudulent-messages-chase-you-decode-before-you-click</link><guid isPermaLink="true">https://blog.interintender.com/dont-let-fraudulent-messages-chase-you-decode-before-you-click</guid><category><![CDATA[#DecodeBeforeYouClick]]></category><category><![CDATA[#CyberSafetyIndia]]></category><category><![CDATA[#SmishingAwareness]]></category><category><![CDATA[#TRAI2025Update]]></category><category><![CDATA[#SenderIDExplained]]></category><category><![CDATA[#CyberChanakya]]></category><category><![CDATA[Devops]]></category><category><![CDATA[sms]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[CyberSec]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Mon, 16 Jun 2025 05:08:50 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1749980182445/16507876-5a8c-4966-9e33-a6b28d220a4b.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote>
<p>⚠️ <em>Every day, millions of Indians are targeted by fake SMS messages—some claiming urgent bank alerts, others impersonating government bodies. But what if there's a way to identify authentic messages just by reading their sender ID?</em></p>
</blockquote>
<p>Welcome to your <strong>first line of defense</strong> in SMS-based scams: understanding <strong>Sender ID suffixes</strong>—a powerful filter enabled by India’s DLT-based telecom regulations.</p>
<h2 id="heading-what-are-sender-ids-and-how-does-india-regulate-them"><strong>What Are Sender IDs and How Does India Regulate Them?</strong></h2>
<p>In India, bulk and commercial SMS messages (like OTPs, promotions, alerts) are <strong>governed by the</strong> <a target="_blank" href="https://trai.gov.in/sites/default/files/2025-01/RegulationUcc19072018.pdf"><strong>Telecom Commercial Communications Customer Preference Regulations, 2018</strong></a> <strong>(TCCCPR 2018)</strong>, issued by the <strong>Telecom Regulatory Authority of India (TRAI)</strong>.</p>
<p>To tackle spam, phishing, and fraud, TRAI introduced <strong>DLT (Distributed Ledger Technology)</strong>–based platforms across all major telecom operators (e.g., Jio, Airtel, Vodafone Idea). Under this:</p>
<ul>
<li><p>Every sender (like a bank, school, or business) must <strong>register their message templates and sender ID</strong>.</p>
</li>
<li><p>Sender IDs follow a specific format, including a <strong>2-character prefix and a classification suffix</strong>.</p>
</li>
<li><p>This suffix helps identify <strong>who is sending the message and why</strong>.</p>
</li>
</ul>
<p><a target="_blank" href="https://www.trai.gov.in/sites/default/files/2024-09/Detail_Header_Prefixes_16062020_0.pdf"><strong>Structure of Sender ID</strong></a><strong>:</strong></p>
<pre><code class="lang-plaintext">XY-ABCDEF
|   |
|   └─ Sender’s custom name(header assigned to the Principal Entity)
└──── Telecom header(Originating Access Providers + License Service Area of OAP)
</code></pre>
<p>☆ Find the TRAI Compiled list of SMS Headers <a target="_blank" href="https://www.trai.gov.in/node/7411">here</a>.</p>
<h2 id="heading-trai-recognized-classification-of-sender-id-suffixes">TRAI-Recognized Classification of Sender ID Suffixes</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749986725326/3c9b317d-3963-4fc3-b71f-bee2bc55c98f.png" alt="TRAI-Recognized Classification of Sender ID Suffixes" class="image--center mx-auto" /></p>
<p>TRAI has announced a new compliance requirement under the <a target="_blank" href="https://www.trai.gov.in/sites/default/files/2025-02/Regulation_12022025.pdf"><strong>TCCCPR 2025 Amendment</strong></a>, mandating that all SMS headers (Sender IDs) include a <strong>message-type suffix</strong>. This update, effective from <strong>May 6, 2025</strong>, aims to enhance transparency and help mobile users identify the nature of messages they receive. Accordingly, Sender IDs fall into different categories based on their purpose.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Suffix (Last Character)</strong></td><td><strong>Category</strong></td><td><strong>Purpose</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>-P</strong></td><td>Promotional</td><td>Marketing offers, ads, festival messages</td></tr>
<tr>
<td><strong>-S</strong></td><td>Service</td><td>Service-related updates (e.g., reminders, info alerts)</td></tr>
<tr>
<td><strong>-T</strong></td><td>Transactional</td><td>OTPs, banking/payment alerts, transaction confirmations</td></tr>
<tr>
<td><strong>-G</strong></td><td>Government</td><td>Official notices from TRAI‑exempted government bodies</td></tr>
</tbody>
</table>
</div><blockquote>
<p><strong>Example</strong>:<br />Sender ID: <code>VM-FEDBNK-S</code></p>
<ul>
<li><p>"VM" = Vodafone, Maharashtra</p>
</li>
<li><p>"FEDBNK" = Federal Bank</p>
</li>
<li><p>“-S” = signifying a service</p>
</li>
</ul>
</blockquote>
<h2 id="heading-why-this-knowledge-matters">Why This Knowledge Matters</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749987530772/847f08c3-cf14-4cb6-a811-05809efbe217.png" alt="Chanacya teaching about sender IDs and suffix" class="image--center mx-auto" /></p>
<ul>
<li><p>Sender ID suffixes are not just technical tags. They are <strong>government-enforced indicators</strong> of the message’s <strong>purpose and intent</strong>, <strong>added automatically</strong> through the DLT system.</p>
</li>
<li><p>The <strong>type of content must match the sender ID’s suffix</strong>. When it doesn’t, it’s a red flag.</p>
</li>
<li><p>Legitimate brands are generally not allowed to send OTPs or urgent service alerts using promotional headers. So if a <strong>promotional message</strong> (“-P”) asks for an OTP, payment, or personal information, it could be fraudulent.</p>
</li>
<li><p>If you receive a <strong>transactional message</strong> (“-T”) message from an unknown sender or brand you’ve never dealt with, treat it with suspicion, it may be an attempt to impersonate a legitimate entity.</p>
</li>
<li><p><strong>Service messages</strong> (“-S”) may include links, but they should not contain OTPs or ask for payments. If they do, it could be a compromised or spoofed header.</p>
</li>
<li><p><strong>Government messages</strong> (“-G”) are used exclusively by authorized government departments. These messages are informational in nature, and payment instructions or web links should only point to official “.gov.in” domains. Any message claiming to be from a government department that ends in anything other than “-G”, or uses a suspicious URL, should be reported.</p>
</li>
</ul>
<p>This simple awareness can help every mobile user in India—whether tech-savvy or not—instantly filter suspicious messages without relying on third-party apps. It's a <strong>low-tech, high-impact method</strong> of scam filtering that doesn’t require an app—just <strong>attention</strong>.</p>
<h2 id="heading-tips-to-protect-yourself-from-sms-scams">Tips to Protect Yourself from SMS Scams</h2>
<p>Use the suffix method as your <strong>first filter</strong>, and combine it with these practical habits:</p>
<ol>
<li><p>Investigate before trusting.</p>
</li>
<li><p>Always verify links. Legitimate government links usually end in “<strong>.gov.in</strong>“.</p>
</li>
<li><p>Never enter personal or bank details on unfamiliar URLs.</p>
</li>
<li><p>You may download and use the <a target="_blank" href="https://www.trai.gov.in/portals-apps/trai-apps">TRAI DND app</a> to report spam SMS instantly.</p>
</li>
<li><p>You may also use Spam Protection Tools. Most smartphones have built-in SMS spam filters—turn them on.</p>
</li>
</ol>
<p>In a world full of digital noise, scammers exploit the tiniest details—like sender IDs—to trick you. But now you know how to read those hidden signs. Next time an SMS asks you to “verify your bank account urgently” or “update KYC,” stop. <strong>Look at the suffix. Check the link. Stay alert.</strong></p>
<p>Let’s make India cyber-aware, one message at a time.</p>
<p><strong>Have you encountered any fake SMS recently? Drop a comment or share your experience. It might help someone else!</strong></p>
<p><strong>Stay aware. Stay safe.</strong></p>
]]></content:encoded></item><item><title><![CDATA[Legal Implications of Cyber Impersonation and Data Misuse under Indian Laws (Part II)]]></title><description><![CDATA[Introduction
In the digital age, where most of our personal and professional lives are entwined with online platforms, the risk of cybercrimes has significantly increased. A recent example, in our last blog, involving a student named Ravi highlights ...]]></description><link>https://blog.interintender.com/legal-implications-of-cyber-impersonation-and-data-misuse-under-indian-laws-part-ii</link><guid isPermaLink="true">https://blog.interintender.com/legal-implications-of-cyber-impersonation-and-data-misuse-under-indian-laws-part-ii</guid><category><![CDATA[#ImpersonationAlert]]></category><category><![CDATA[#PhishingScam]]></category><category><![CDATA[#IndiaCyberLaw]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[#onlinesafety]]></category><category><![CDATA[digital rights]]></category><category><![CDATA[digitalsafety]]></category><category><![CDATA[Internet fraud]]></category><category><![CDATA[#cyberawareness]]></category><category><![CDATA[data privacy]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Sat, 14 Jun 2025 12:48:58 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1749901605207/eb5b730d-4685-492f-88d1-d60d76e95227.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-introduction"><strong>Introduction</strong></h2>
<p>In the digital age, where most of our personal and professional lives are entwined with online platforms, the risk of cybercrimes has significantly increased. A recent example, in our last blog, involving a student named Ravi highlights a growing concern: <strong>cyber impersonation</strong>. Ravi unknowingly submitted his personal information to a fake website that closely resembled the official portal of a government educational institution. This led to unauthorized use of his data and a barrage of unsolicited marketing calls. Incidents like these are not just deceptive; they are illegal under Indian law.</p>
<p>Let us explore the legal landscape that governs such digital misconduct.</p>
<h2 id="heading-understanding-domain-impersonation"><strong>Understanding Domain Impersonation</strong></h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749902034759/3d3d11c7-eaa2-4e23-8d91-097fb7294fb9.png" alt="Domain impersonation" class="image--center mx-auto" /></p>
<p><a target="_blank" href="https://www.zoho.com/eprotect/glossary/domain-impersonation.html">Domain impersonation</a> (or <strong>domain spoofing</strong>), a type of <strong>Cyber impersonation</strong>, is a cyberattack method where fake websites are created to closely resemble legitimate ones, tricking users into sharing sensitive information like passwords, financial details, or personal data.</p>
<p>For example, if the legitimate website is “interintender.com”, attackers might use:</p>
<ul>
<li><p>Misspellings (e.g., inderintender.com, interindenter.com)</p>
</li>
<li><p>Character substitutions (e.g., Interintender.com, int€rintender.com)</p>
</li>
<li><p>Adding or removing characters (e.g., interintend.com, interintenderr.com)</p>
</li>
<li><p>Homoglyphs (e.g., interintender.com with "r", ｉnterintender.com with "ｉ")</p>
</li>
<li><p>Alternative TLDs (e.g., interintender.net, interintender.org)</p>
</li>
<li><p>Subdomain spoofing (e.g., blog.interintender-official.com, interintender.officialwebsite.com)</p>
</li>
</ul>
<p>Victims are taken to the fake domain through phishing emails, malicious links, or ads that often offer services or urgent requests. Once users interact with the site (by logging in, filling out forms, or making transactions), the attackers collect sensitive data such as credentials, financial information, or personal details. This information could then be used for identity theft, financial fraud or further cyberattacks.</p>
<h2 id="heading-relevant-legal-provisions-under-indian-laws"><strong>Relevant Legal Provisions Under Indian Laws</strong></h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749902690454/b764c3b8-181b-4ae9-b963-30ff31aa313e.png" alt="Legal books on a table" class="image--center mx-auto" /></p>
<p>The following legal provisions may offer recourse or apply in the context of your situations.</p>
<h3 id="heading-fundamental-right-to-privacy">Fundamental Right to Privacy</h3>
<p>The Right to Privacy is a fundamental right under Article 21 of the Indian Constitution, as affirmed by the Supreme Court in the landmark <a target="_blank" href="https://www.scobserver.in/reports/k-s-puttaswamy-right-to-privacy-judgment-of-the-court-in-plain-english-i/"><em>Justice K.S. Puttaswamy (Retd.) vs. Union of India</em></a> judgment (2017). This ruling recognized that every individual has the <strong>right to make autonomous decisions regarding personal matters</strong> including, the right to exercise control over their personal information. Misuse or unauthorized sharing of personal data—such as phone numbers or email addresses obtained without informed consent—directly violates this right. Any entity or platform that collects and uses personal information under false pretenses not only undermines public trust but also violates the constitutionally guaranteed right of privacy.</p>
<h3 id="heading-information-technology-act-2000httpswwwindiacodenicinbitstream123456789131161itact2000updatedpdf"><a target="_blank" href="https://www.indiacode.nic.in/bitstream/123456789/13116/1/it_act_2000_updated.pdf">Information Technology Act, 2000</a></h3>
<ol>
<li><p><strong>Section 43A</strong> is about a company’s liability of compensation for <strong>failure to protect data while possessing or handling sensitive personal information</strong> in a computer resource. According to this section, the company should maintain reasonable security practices and procedures to protect the data and avoid any negligence. The Information Technology (reasonable Security Practices And Procedures And Sensitive Personal Data Or Information) Rules, 2011 defines sensitive personal data or information of a person as</p>
<p> <strong>“</strong><code>such personal information which consists of information relating to;—</code></p>
<p> <code>(i) password;</code></p>
<p> <code>(ii) financial information such as Bank account or credit card or debit card or other payment instrument details ;</code></p>
<p> <code>(iii) physical, physiological and mental health condition;</code></p>
<p> <code>(iv) sexual orientation;</code></p>
<p> <code>(v) medical records and history;</code></p>
<p> <code>(vi) Biometric information;</code></p>
<p> <code>(vii) any detail relating to the above clauses as provided to body corporate for providing service; and</code></p>
<p> <code>(viii) any of the information received under above clauses by body corporate for processing, stored or processed under lawful contract or otherwise:</code></p>
<p> <code>provided that, any information that is freely available or accessible in public domain or furnished under the Right to Information Act, 2005 or any other law for the time being in force shall not be regarded as sensitive personal data or information for the purposes of these rules.</code><strong>"</strong></p>
</li>
<li><p><strong>Section 66C</strong> of the Act deals with punishment for <strong>identity theft</strong>, that punishes someone who fraudulently or dishonestly make use of your <strong>electronic signature, password or any other unique identification feature</strong>. Punishment is either imprisonment to maximum 3 years and a fine which may extend to 1 lakh rupees.</p>
</li>
<li><p><strong>Section 66D</strong> is about punishment for <strong>cheating by personation</strong> by using computer resource. Punishment is either an imprisonment for a term which may extend to 3 years and fine of maximum one lakh rupees.</p>
</li>
<li><p><strong>Section 72A</strong> deals with the punishment for <strong>disclosure of information</strong> in breach of lawful contract. As per the section, if any person (including an intermediary) gets access to your personal information while providing a service (as part of a legal agreement), they are not allowed to share it with anyone else without your consent. If they do share it without your permission, and it causes harm or unfair benefit to someone, they can be punished with up to three years in jail, a fine of up to 5 lakhs rupees, or both.</p>
</li>
</ol>
<h3 id="heading-indian-penal-code-ipchttpswwwindiacodenicinrepealedfileopenrfilenamea1860-45pdf"><a target="_blank" href="https://www.indiacode.nic.in/repealedfileopen?rfilename=A1860-45.pdf">Indian Penal Code (IPC)</a></h3>
<ol>
<li><p><strong>Cheating</strong>: Section 415 of the IPC identifies <strong>dishonest concealment of facts</strong> as cheating and Section 416 defines cheating by personation as when <strong>someone pretends or represents to be another person</strong>. According to Section 417, it is punished with imprisonment of either a term of maximum one year, or with fine, or with both.</p>
</li>
<li><p><strong>Forgery</strong>: According to Section 463, forgery happens when someone <strong>creates a false document or electronic record</strong> with the <strong>intent to deceive</strong> or cause harm, <strong>or to make someone enter into a contract,</strong> part with property, <strong>or act on false information</strong>. Section 468 deals with <strong>forgery for the purpose of cheating</strong>, where someone <strong>creates</strong> a fake document or <strong>fake electronic record</strong> <strong>to cheat someone</strong>. The punishment for this can be up to 7 years in jail and a fine.</p>
</li>
</ol>
<h3 id="heading-consumer-protection-act-2019httpsncdrcnicinbareactscpa2019pdf"><a target="_blank" href="https://ncdrc.nic.in/bare_acts/CPA2019.pdf">Consumer Protection Act, 2019</a></h3>
<p>As per Section 2(42) of the Act, a “service” includes any kind of service (includes <strong>providing</strong> news or <strong>any kind of information</strong>) that is available to <strong>potential users</strong>. This <strong>excludes</strong> services that are <strong>fully free</strong> or are provided under <strong>personal service contracts</strong>.</p>
<ul>
<li><p>Deficiency in service: There is "<strong>deficiency</strong>" in service as per section 2(11) when there is any <strong>inadequacy in the performance of a service</strong>, including when the service provider does any act that <strong>causes loss or injury</strong> (any harm whatever illegally caused to any person, in body, mind or property: Sec. 2(23)) to the consumer or when there is <strong>deliberate withholding of relevant information</strong> by the service provider to the consumer.</p>
</li>
<li><p>Unfair trade practice: When a trade practice is used to sell a service that is <strong>dishonest, misleading, or deceptive</strong> it is defined as <strong>unfair trade practice</strong> as per Section 2(47) of the Act. This includes <strong>any kind of false or misleading statement</strong> made to the public <strong>pretending</strong> that the business is <strong>officially linked</strong> with a brand or organization when it’s not or <strong>convincing</strong> people they <strong>need</strong> a product or service when they actually don’t need it. It is explicitly mentioned in Section 2(47)(ix) that <strong>disclosing someone’s private data without their consent</strong> is an unfair trade practice.</p>
</li>
</ul>
<h3 id="heading-digital-personal-data-protection-act-2023-dpdp-acthttpswwwmeitygovinstaticuploads2024062bf1f0e9f04e6fb4f8fef35e82c42aa5pdf"><a target="_blank" href="https://www.meity.gov.in/static/uploads/2024/06/2bf1f0e9f04e6fb4f8fef35e82c42aa5.pdf">Digital Personal Data Protection Act, 2023 (DPDP Act)</a></h3>
<p>This recent law regulates the processing of digital personal data in a manner that recognizes both the right of individuals to protect their personal data and the need to process such data for lawful purposes. It mandates that <strong>consent must be freely given, specific, informed, and unambiguous</strong>. Organizations collecting data must implement reasonable security safeguards to prevent data breaches and unauthorized use. Violation of this Act can lead to significant penalties and is overseen by the Data Protection Board of India. Currently, the Ministry of Electronics and Information Technology has drafted the <a target="_blank" href="https://www.pib.gov.in/PressReleasePage.aspx?PRID=2090048#:~:text=Ministry%20of%20Electronics%20and%20Information%20Technology%20has,Personal%20Data%20Protection%20Act%2C%202023%20\(DPDP%20Act\).&amp;text=Ministry%20of%20Electronics%20and%20Information%20Technology%20has,Personal%20Data%20Protection%20Act%2C%202023%20\(DPDP%20Act\).">Digital Personal Data Protection Rules, 2025</a> to facilitate the implementation of the Act.</p>
<h2 id="heading-what-can-you-do-if-you-are-a-victim">What Can You Do If You Are a Victim?</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749904310840/89c2c94f-7306-4463-b57d-b4c6aa2ba9aa.png" alt="Chanacya seeking your attention" class="image--center mx-auto" /></p>
<p>If you find yourself in a situation like Ravi’s, you can:</p>
<ol>
<li><p><strong>Preserve Evidence</strong></p>
<ul>
<li><p>Take screenshots of the fake website, emails, or messages.</p>
</li>
<li><p>Save call logs and SMS records.</p>
</li>
</ul>
</li>
<li><p><strong>Notify the Impersonated Institution</strong></p>
<ul>
<li>Inform the real organization that its brand identity has been misused so they can issue warnings.</li>
</ul>
</li>
<li><p><strong>File a Cyber Crime Complaint</strong></p>
<ul>
<li><p>Visit the official <a target="_blank" href="https://cybercrime.gov.in/">National Cyber Crime Reporting Portal</a></p>
</li>
<li><p>You may report the incident under the category of "Online Financial Fraud" or "Online Cyber Harassment."</p>
</li>
</ul>
</li>
<li><p><strong>Approach Local Police or Cyber Cell</strong></p>
<ul>
<li>File an FIR for violation of your legal rights.</li>
</ul>
</li>
<li><p><strong>Raise Awareness</strong></p>
<ul>
<li>Share your experience to help others avoid similar traps. Educating peers is part of responsible digital citizenship.</li>
</ul>
</li>
</ol>
<h2 id="heading-conclusion"><strong>Conclusion</strong></h2>
<p>Online impersonation and data misuse are not minor glitches in the system; they are serious cyber offenses with profound legal consequences. With increasing digital activity in India, it is crucial for users to <strong>stay vigilant, understand the technology and be aware of their legal rights</strong>. Legal frameworks in India are equipped to tackle such crimes, but <strong>public awareness and prompt action</strong> are key to enforcing them effectively.</p>
<p><strong>Stay safe. Stay informed.</strong></p>
]]></content:encoded></item><item><title><![CDATA[When a Website Wears a Mask: A Student's Cautionary Tale of Cyber Impersonation (Part I)]]></title><description><![CDATA[Introduction
In the digital era, where government portals and educational institutions are shifting most of their services online, cybercriminals are also finding smarter ways to trick users. One such rising threat is website impersonation, where att...]]></description><link>https://blog.interintender.com/when-a-website-wears-a-mask-a-students-cautionary-tale-of-cyber-impersonation-part-i</link><guid isPermaLink="true">https://blog.interintender.com/when-a-website-wears-a-mask-a-students-cautionary-tale-of-cyber-impersonation-part-i</guid><category><![CDATA[Online Impersonation]]></category><category><![CDATA[Spoofed Websites]]></category><category><![CDATA[CERT-IN]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[phishing]]></category><category><![CDATA[data privacy]]></category><category><![CDATA[social engineering]]></category><category><![CDATA[#internetsafety]]></category><category><![CDATA[#cyberawareness]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Tue, 10 Jun 2025 19:08:36 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1749580271715/59bf3428-3ecd-45ed-a509-416739211585.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-introduction"><strong>Introduction</strong></h3>
<p>In the digital era, where government portals and educational institutions are shifting most of their services online, cybercriminals are also finding smarter ways to trick users. One such rising threat is <strong>website impersonation</strong>, where attackers build websites mimicking official institutions to collect personal data or deceive users. These scams often look convincing, using logos, branding, and even domain names that seem authentic at first glance.</p>
<h3 id="heading-a-realistic-scenario-ravis-story"><strong>A Realistic Scenario: Ravi's Story</strong></h3>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749580746471/40307c40-26fe-40c9-9f20-4911a1414529.png" alt="Student searching online for certification courses" class="image--center mx-auto" /></p>
<p>Ravi, a final-year undergraduate student, was exploring certification courses to boost his employability. While searching for a reputed government educational institution's program, he landed on what looked like their official website. It had the institution's name in the URL, displayed its emblem proudly, and even had a course inquiry form.</p>
<p>Without suspecting any foul play, Ravi filled in his details—name, phone number, and email ID. However, in a matter of hours, he began receiving incessant promotional calls and emails from unknown educational service providers. Confused, Ravi double-checked the website and realized it had no privacy policy, no terms and conditions, and lacked HTTPS encryption.</p>
<p>Ravi had unknowingly become a victim of phishing and online impersonation, leading to data misuse.</p>
<h3 id="heading-understanding-the-threats-involved"><strong>Understanding the Threats Involved</strong></h3>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749581245076/8a330e41-6289-4c18-ae5d-0c5ab58dc029.png" alt="Cyber Impersonation" class="image--center mx-auto" /></p>
<p>This type of cyber scam falls under several cybersecurity threats:</p>
<ul>
<li><p><strong>Phishing</strong>: Ravi was misled into believing the fake site was legitimate and willingly gave up personal information.</p>
</li>
<li><p><strong>Data Misuse</strong>: His data was shared or sold to marketing firms without his consent.</p>
</li>
<li><p><strong>Online Impersonation</strong>: The fake website used visual elements and domain tricks to impersonate an official government entity.</p>
</li>
</ul>
<p>According to a <a target="_blank" href="https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES02&amp;VLCODE=CIAD-2023-0015">CERT-IN advisory</a>, threat actors increasingly create spoofed portals to collect sensitive information from unsuspecting users. Such impersonation tactics have been flagged multiple times across sectors, including education.</p>
<h3 id="heading-how-to-spot-a-fake-website"><strong>How to Spot a Fake Website</strong></h3>
<p>To avoid falling into similar traps, here are a few key checks:</p>
<ol>
<li><p><strong>Verify the Domain</strong>: Official Indian government domains <em>usually</em> end in <strong>.gov.in</strong>, <strong>.ac.in</strong> or are listed on government directories.</p>
</li>
<li><p><strong>Check for HTTPS</strong>: A secure site should always have the padlock icon and HTTPS in its URL.</p>
</li>
<li><p><strong>Inspect the Privacy Policy</strong>: Legitimate websites always include a privacy policy and terms of service.</p>
</li>
<li><p><strong>Search Independently</strong>: Don’t trust promoted links. Search for the institution on Google and compare the URLs.</p>
</li>
<li><p><strong>Use Domain Lookup Tools</strong>: Services like <a target="_blank" href="https://www.whois.com/whois/">Whois</a> can show the domain registration date and owner details.</p>
</li>
</ol>
<h3 id="heading-conclusion"><strong>Conclusion</strong></h3>
<p>Ravi’s story is a stark reminder that <strong>not every website wearing an official badge is genuine</strong>. As users, we must stay vigilant and learn to spot red flags in digital interactions. In our next blog post, we’ll discuss the <strong>legal implications</strong> of such impersonation and data misuse under the <strong>Indian law</strong> and how users like Ravi can seek redress.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749581997592/df1a2b19-387f-4cbc-8a37-961851b245e7.png" alt="Chanacya protecting users like Ravi" class="image--center mx-auto" /></p>
<p><strong>Stay informed. Stay safe.</strong></p>
]]></content:encoded></item><item><title><![CDATA[🛡️ 3 Cybersecurity Threats Rising in 2025 — And Free Tools to Fight Them]]></title><description><![CDATA[Cybersecurity in 2025 is more critical than ever. With the rapid evolution of technology, new threats emerge, targeting individuals and organizations alike. Let's explore the top three rising threats and the free tools you can use to defend against t...]]></description><link>https://blog.interintender.com/3-cybersecurity-threats-rising-in-2025-and-free-tools-to-fight-them</link><guid isPermaLink="true">https://blog.interintender.com/3-cybersecurity-threats-rising-in-2025-and-free-tools-to-fight-them</guid><category><![CDATA[2025 Threats]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[infosec]]></category><category><![CDATA[tools]]></category><category><![CDATA[ethicalhacking]]></category><category><![CDATA[#cyberawareness]]></category><dc:creator><![CDATA[Amal P]]></dc:creator><pubDate>Fri, 06 Jun 2025 14:01:23 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1749209767320/5a2998ad-360e-48e4-9509-1bfe1b6f56af.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Cybersecurity in 2025 is more critical than ever. With the rapid evolution of technology, new threats emerge, targeting individuals and organizations alike. Let's explore the top three rising threats and the free tools you can use to defend against them.</p>
<h3 id="heading-1-ai-enhanced-phishing-attacks"><strong>⚠️ 1. AI-Enhanced Phishing Attacks</strong></h3>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749210855906/33091734-628a-477b-ad0b-26d9f04f19f0.png" alt="AI-Enhanced Phishing Attacks" class="image--center mx-auto" /></p>
<p><strong>What’s happening?</strong></p>
<p>Phishing attacks have become more sophisticated with the integration of Artificial Intelligence (AI). Cyber criminals now use AI to craft highly personalized and convincing phishing emails, making them harder to detect.</p>
<ul>
<li><p><strong>Statistics:</strong></p>
<ul>
<li><p>82.6% of phishing emails analyzed between September 2024 and February 2025 exhibited some use of AI. (The Phishing Threat Trends Report, Vol. 5)</p>
</li>
<li><p>AI-generated phishing emails have a click-through rate of 54%, matching that of human-crafted emails. (Fred Heiding et. al., 2024)</p>
</li>
</ul>
</li>
</ul>
<p><strong>Free Tools to Defend:</strong></p>
<ul>
<li><p><a target="_blank" href="https://www.phishtank.com/"><strong>PhishTank</strong></a><strong>:</strong> A community-based platform where users can submit and verify suspected phishing URLs.</p>
</li>
<li><p><a target="_blank" href="https://haveibeenpwned.com/"><strong>Have I Been Pwned</strong></a><strong>:</strong> Check if your email or phone number has been part of a data breach.</p>
</li>
<li><p><strong>Email Header Analysis:</strong> Use your email client's "Show Original" or "View Source" feature to inspect email headers for SPF, DKIM, and DMARC authentication results.</p>
</li>
</ul>
<p><strong>Chanacya Tip:</strong></p>
<p>Always verify the sender's email address and avoid clicking on suspicious links. When in doubt, contact the sender through a trusted channel.</p>
<h3 id="heading-2-qr-code-phishing-quishing"><strong>⚠️ 2. QR Code Phishing (Quishing)</strong></h3>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749214403612/4349aab2-6b88-4fff-9417-7fbf01c40ef4.png" alt="Quishing" class="image--center mx-auto" /></p>
<p><strong>What’s happening?</strong></p>
<p>QR codes are being exploited for phishing attacks, known as "quishing." Cybercriminals replace legitimate QR codes with malicious ones, leading users to phishing websites or prompting them to download malware.</p>
<ul>
<li><p><strong>Statistics:</strong></p>
<ul>
<li><p>QR code phishing attacks are set to surge to 5.3 billion in 2025 (<a target="_blank" href="https://wealthandfinance.digital/with-qr-code-redemption-set-to-surge-to-5-3-billion-in-2025-cybercriminals-will-increase-their-quishing-attacks/">See more</a>).</p>
</li>
<li><p>In a study, it was observed that only 36% of recipients successfully identified and reported simulated quishing attacks (<a target="_blank" href="https://hoxhunt.com/blog/insights-hoxhunt-cybersecurity-human-risk-benchmark-challenge">Hoxhunt Challenge 2023</a>).</p>
</li>
</ul>
</li>
</ul>
<p><strong>Free Tools to Defend:</strong></p>
<ul>
<li><p><a target="_blank" href="https://www.kaspersky.com/qr-scanner"><strong>Kaspersky QR Scanner</strong></a><strong>:</strong> Scans QR codes and alerts you to potential threats.</p>
</li>
<li><p><a target="_blank" href="https://www.virustotal.com/"><strong>VirusTotal</strong></a><strong>:</strong> Analyze URLs and files for viruses, worms, trojans, and other kinds of malicious content.</p>
</li>
<li><p><strong>QR Code Scanner Apps:</strong> Use trusted QR code scanner apps that preview the URL before opening it.</p>
</li>
</ul>
<p><strong>Chanacya Tip:</strong></p>
<p>Be cautious when scanning QR codes in public places. Always verify the source and avoid scanning codes from unknown or suspicious origins.</p>
<h3 id="heading-3-cloud-misconfigurations-leading-to-data-breaches"><strong>⚠️ 3. Cloud Misconfigurations Leading to Data Breaches</strong></h3>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749217133303/8dabe45a-6df2-4880-8618-473d274beffc.png" alt="Cloud misconfiguration" class="image--center mx-auto" /></p>
<p><strong>What’s happening?</strong></p>
<p>Misconfigured cloud settings remain a significant cause of data breaches. Improper configurations can expose sensitive data to unauthorized access.</p>
<ul>
<li><p><strong>Statistics:</strong></p>
<ul>
<li><p>It was observed that in 2024, 85% of security failures across cloud platforms will be traceable to customer misconfigurations. (<a target="_blank" href="https://www.researchgate.net/profile/Taiwo-Olorunlana/publication/392079431_Securing_the_Global_Cloud_Addressing_Data_Sovereignty_Cross-Border_Compliance_and_Emerging_Threats_in_a_Decentralized_World/links/683310dcdf0e3f544f59053a/Securing-the-Global-Cloud-Addressing-Data-Sovereignty-Cross-Border-Compliance-and-Emerging-Threats-in-a-Decentralized-World.pdf">Taiwo Justice Olorunlana, 2025</a>)</p>
</li>
<li><p>The average cost resulting from a data breach in the cloud environment is somewhere around $5.09 million. (<a target="_blank" href="https://www.researchgate.net/profile/Taiwo-Olorunlana/publication/392079431_Securing_the_Global_Cloud_Addressing_Data_Sovereignty_Cross-Border_Compliance_and_Emerging_Threats_in_a_Decentralized_World/links/683310dcdf0e3f544f59053a/Securing-the-Global-Cloud-Addressing-Data-Sovereignty-Cross-Border-Compliance-and-Emerging-Threats-in-a-Decentralized-World.pdf">Taiwo Justice Olorunlana, 2025 on Cost of a Data Breach Report from IBM, 2023 [p. 1396]</a>)</p>
</li>
</ul>
</li>
</ul>
<p><strong>Free Tools to Defend:</strong></p>
<ul>
<li><p><a target="_blank" href="https://github.com/nccgroup/ScoutSuite"><strong>ScoutSuite</strong></a><strong>:</strong> An open-source multi-cloud security-auditing tool.</p>
</li>
<li><p><a target="_blank" href="https://cloudsploit.com/"><strong>CloudSploit</strong></a><strong>:</strong> Offers cloud security configuration monitoring.</p>
</li>
<li><p><a target="_blank" href="https://www.shodan.io/"><strong>Shodan</strong></a><strong>:</strong> Search engine for Internet-connected devices, useful for identifying exposed assets.</p>
</li>
</ul>
<p><strong>Chanacya Tip:</strong></p>
<p>Regularly audit your cloud configurations and implement strict access controls. Utilize tools that provide visibility into your cloud environment to detect and remediate misconfigurations promptly.</p>
<h2 id="heading-final-thoughts-from-chanacya"><strong>🧠 Final Thoughts from Chanacya</strong></h2>
<p>Cybersecurity is not just about technology; it's about awareness and proactive defense. By understanding the evolving threats and utilizing the right tools, you can protect yourself and your organization from potential cyberattacks.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1749217428024/1dfb2347-4cb4-4ff8-af20-4ac3c6b46647.png" alt="Chanakya protecting all from cyber attacks" class="image--center mx-auto" /></p>
<p><em>In the realm of cybersecurity, knowledge is the shield, and vigilance is the sword.</em></p>
<p><strong><em>Stay informed, stay secure.</em></strong></p>
]]></content:encoded></item></channel></rss>