u/Single-Cap-4500

▲ 2 r/ScamCenter+1 crossposts

Government impersonation Scam

Government Impersonation

Scammers posing as IRS, CRA, police, or other government officials demanding payment or personal information.

How This Scam Works

  1. 1You receive a call, email, or letter claiming to be from a government agency
  2. 2They claim you owe taxes, have legal issues, or your benefits are at risk
  3. 3They demand immediate payment via gift cards, wire transfer, or crypto
  4. 4They threaten arrest, deportation, or benefit cancellation if you don't pay

Red Flags to Watch For

  • Government agencies never demand payment via gift cards or crypto
  • Threats of immediate arrest
  • Requests to keep the matter secret
  • Caller ID showing a government number (can be spoofed)
  • Pressure to act immediately without time to verify

What to Do If You're a Victim

  • Hang up and call the agency directly using their official number
  • Never give personal information to unexpected callers
  • Report to FTC (US), CAFC (Canada), or cybercrime.gov.in (India)

For details on other scam categories - scamalert.run

reddit.com
u/Single-Cap-4500 — 11 hours ago
▲ 3 r/ScamCenter+1 crossposts

The Call That Cost a Lifetime of Savings

How a retired engineer lost ₹1.6 crore to an official-sounding voice on the phone

The Call That Cost a Lifetime of Savings

Rajesh Sharma (name changed) had spent 35 years building his life carefully. The retired engineer from Nashik had raised two children, paid off his home, and accumulated modest savings—the kind of security that lets you sleep at night. At 62, he was looking forward to grandchildren and morning walks, not to answering a phone call that would unravel everything.

It started ordinarily enough. A man's voice, crisp and official-sounding, introduced himself as a customs officer. Rajesh felt a flutter of confusion—he hadn't imported anything, hadn't done anything wrong. But the caller's tone was so assured, so bureaucratic, that doubt crept in. "Sir, we have detected your name in a money laundering case," the voice said. "Your bank accounts are flagged."

Rajesh's stomach tightened. This can't be real, he thought. But what if it was?

The caller explained he was under "digital arrest"—a term Rajesh had never heard, but which sounded terrifyingly official. "You are not to leave your house or contact anyone," the man said. "If you speak to your family, the case will worsen. Do you understand?"

Fear overwhelmed logic. Rajesh found himself nodding into the phone, agreeing not to tell his wife, his children, anyone. The caller stayed on the line—hours stretched into days. He video-called, showing Rajesh fabricated arrest warrants and official seals. Sometimes, multiple men posed as different government officials, each reinforcing the nightmare scenario. The isolation intensified Rajesh's panic. Without outside perspective, without anyone to reality-check the madness unfolding, he could only believe what he was being told.

"You need to transfer funds to a government verification account," the voice explained. "This is how we clear your name." It made a strange kind of sense to Rajesh's frightened mind. He transferred ₹5 lakhs. Then 10 lakhs. Then more.

Days blurred together. Each time Rajesh transferred money, the relief was momentary. Within hours, the caller would find a new problem. "Investigation fees." "Clearance charges." "Documentation costs." The cycle became a trap—each payment a temporary respite from the threat of arrest, each respite followed by a new demand.

Rajesh withdrew cash, made bank transfers, emptied accounts he'd spent decades filling. Around ₹1.6 crore was gone before something shifted. A moment of clarity—perhaps exhaustion, perhaps the accumulation of inconsistencies—made him question. He called his son.

His son's response was immediate and devastating: "Dad, this is a scam."

The realization hit like a physical blow. Not only had he lost his savings; he had been complicit in his own victimization, isolated by shame and fear. The "officials" disappeared once he hung up, leaving only a dial tone and emptied accounts.

Rajesh reported the scam to his local police and filed a complaint with India's Cyber Crime Cell. He contacted his bank. Months later, no money has been recovered, but he has recovered something else: his voice. He speaks to friends, family, community groups about what happened. Other elderly people share their own close calls, moments when they almost fell into the same trap.

The damage extends beyond finances. Rajesh struggles with the knowledge that he ignored every instinct telling him something was wrong, that fear had overridden reason. But he has learned something too: scammers succeed because they're skilled at exploiting human psychology, not because victims are foolish.

Red Flags to Watch For

  • Unsolicited call from someone claiming to be government official
  • Pressure to keep call secret from family
  • Repeated requests for money to 'verify identity' or 'clear charges'
  • Threats of arrest, asset freezing, or legal consequences
  • Video calls with fake documents and multiple impersonated officials
  • Demand for immediate action without time to verify claims
  • Insistence on isolation from normal communication
reddit.com
u/Single-Cap-4500 — 4 days ago

Quantum Annealing for the Rest of Us: From PhD Papers to Guided Projects

The Quantum Computing Gatekeeping Problem

Quantum computing has a marketing problem. Every article starts with qubits, superposition, and wave function collapse. By paragraph three, you've decided this is for physicists, not for you.

Here's what those articles don't say: you don't need to understand quantum mechanics to use quantum annealing. You need to understand optimization. And if you've ever trained a machine learning model, you already do.

What Quantum Annealing Actually Does

Forget qubits for a moment. Think about this problem: you have 30 features in a dataset, and you need to pick the best 8. That's a feature selection problem — and it's combinatorially explosive. There are over 5 million possible combinations of 8 features from 30. At 1,000 features, the number of subsets exceeds the atoms in the universe.

Traditional approaches handle this with greedy algorithms. They pick the best single feature, then the best pair, then the best triple — never reconsidering earlier choices. It works, but it misses combinations where individually weak features become powerful together.

Quantum annealing takes a different approach. You encode your entire problem — what makes a feature "good," what makes two features "redundant," how many you want — into a single mathematical object called a QUBO matrix. Then you let the annealer explore the solution space simultaneously, settling into low-energy states that represent good solutions.

The analogy: imagine shaking a tray of marbles on a bumpy surface. The marbles settle into the lowest valleys. Quantum annealing does this for optimization problems, except the "bumpy surface" is your QUBO matrix and the "valleys" are good feature subsets.

The QUBO Formulation — It's Just a Spreadsheet

QUBO stands for Quadratic Unconstrained Binary Optimization. Intimidating name, simple concept. You're filling in a matrix where:

  • Diagonal entries represent how good each feature is on its own (measured by mutual information with your target variable)
  • Off-diagonal entries represent how redundant two features are together (measured by correlation)
  • A cardinality constraint gently pushes the solution toward selecting exactly K features

The energy function looks like this:

E(x) = -α × Σ[relevance_i × x_i] + β × Σ[redundancy_ij × x_i × x_j] + γ × (Σ[x_i] - k)²

Three knobs. Alpha controls how much you value relevant features. Beta controls how much you penalize redundant pairs. Gamma controls how strictly you enforce "pick exactly K." That's the entire formulation.

No quantum mechanics. No Hilbert spaces. Just a matrix of numbers and three weights.

From Formulation to Solution — Two Lines Apart

Here's what makes quantum annealing practical today: the same QUBO matrix works with both classical and quantum solvers. You can develop and test locally with simulated annealing (runs on your laptop), then swap to real quantum hardware with a one-line change.

D-Wave offers free access to their quantum computers — one minute of computation per month, no credit card required. That's enough for hundreds of optimization runs. The code to switch between classical and quantum is literally changing use_dwave=False to use_dwave=True.

This means you can learn, experiment, and validate locally, then run the exact same problem on actual quantum hardware to compare results.

Read on at academy.alset.app

reddit.com
u/Single-Cap-4500 — 6 days ago

State of Scams report for April-May in North America and India

ScamAlert Quarterly Fraud Intelligence Report

EXECUTIVE SUMMARY

This inaugural report from ScamAlert covers our first five weeks of operation (April 1 - May 7, 2026), during which we tracked 28,151 scam reports across 33 fraud categories. Since launching in April 2026, ScamAlert has established itself as a comprehensive fraud intelligence platform, aggregating data from multiple sources to provide real-time insights into the evolving threat landscape.

Phishing attacks dominated the threat landscape, accounting for 79.6% (22,395) of all reported scams. This overwhelming prevalence reflects both the low barrier to entry for cybercriminals and the continued effectiveness of social engineering tactics. Cryptocurrency fraud, while representing only 1.5% of reports by volume, generated the highest average losses at $194.9 million per incident, highlighting the severity of crypto-related schemes targeting high-value victims.

Regional patterns reveal distinct threat profiles. India experienced significant losses from "digital arrest" scams—a sophisticated social engineering attack where fraudsters impersonate law enforcement to coerce victims into transferring money under false legal threats. North American victims primarily fell to traditional phishing, job scams, and identity theft schemes. The global impact is staggering: using conservative extrapolation models, we estimate these reported scams represent \$326 million in total economic damage when accounting for underreporting.

Emerging threats require immediate attention. The sophistication of impersonation attacks has increased dramatically, with scammers leveraging official-sounding titles, fake government agencies, and psychological manipulation tactics. The rise of platform-specific scams—particularly those exploiting messaging apps like WhatsApp and professional platforms like Microsoft Teams—demonstrates criminals' ability to adapt quickly to new communication channels.

For rest of the article refer to : https://scamalert.run/reports/q2-2026

reddit.com
u/Single-Cap-4500 — 7 days ago

State of Scams report for April-May in North America and India

ScamAlert Quarterly Fraud Intelligence Report

EXECUTIVE SUMMARY

This inaugural report from ScamAlert covers our first five weeks of operation (April 1 - May 7, 2026), during which we tracked 28,151 scam reports across 33 fraud categories. Since launching in April 2026, ScamAlert has established itself as a comprehensive fraud intelligence platform, aggregating data from multiple sources to provide real-time insights into the evolving threat landscape.

Phishing attacks dominated the threat landscape, accounting for 79.6% (22,395) of all reported scams. This overwhelming prevalence reflects both the low barrier to entry for cybercriminals and the continued effectiveness of social engineering tactics. Cryptocurrency fraud, while representing only 1.5% of reports by volume, generated the highest average losses at $194.9 million per incident, highlighting the severity of crypto-related schemes targeting high-value victims.

Regional patterns reveal distinct threat profiles. India experienced significant losses from "digital arrest" scams—a sophisticated social engineering attack where fraudsters impersonate law enforcement to coerce victims into transferring money under false legal threats. North American victims primarily fell to traditional phishing, job scams, and identity theft schemes. The global impact is staggering: using conservative extrapolation models, we estimate these reported scams represent \$326 million in total economic damage when accounting for underreporting.

Emerging threats require immediate attention. The sophistication of impersonation attacks has increased dramatically, with scammers leveraging official-sounding titles, fake government agencies, and psychological manipulation tactics. The rise of platform-specific scams—particularly those exploiting messaging apps like WhatsApp and professional platforms like Microsoft Teams—demonstrates criminals' ability to adapt quickly to new communication channels.

For rest of the article refer to : https://scamalert.run/reports/q2-2026

reddit.com
u/Single-Cap-4500 — 7 days ago

Love in the Time of Lies: How a Soldier's Photo Became a Scammer's Weapon

Sarah (name changed) was lonely. After her divorce, she'd thrown herself into building a new life in the UK—her career was stable, her flat was lovely—but something felt incomplete. So one quiet evening, she downloaded a dating app.

That's where she met "James." (name changed)

He was handsome in that catalog-perfect way—sharp jawline, military dress uniform, warm smile. His profile said he was a US Army officer stationed overseas, but temporarily unable to meet in person due to deployment. Sarah found this oddly reassuring. No awkward first dates. No pressure. Just conversations that unfolded slowly, like chapters in a book she couldn't put down.

For four months, James was everything. He messaged her throughout the day, asked about her work, remembered details about her family. He called her beautiful. He said he was falling in love with her. Sarah felt seen in a way she hadn't in years. She began imagining a future with him—what their first real meeting would look like, where they'd travel together, how their lives might intertwine.

Then came the first request.

James had been arrested in a bar fight (he claimed) and needed bail money. Would she wire £2,000? Sarah hesitated—her rational mind flickered with doubt—but James's messages became increasingly frantic. He needed her. She sent the money.

Days later, there was another crisis. The US Army was charging him a discharge fee. The amount kept growing. And then James introduced her to an investment opportunity: a cryptocurrency trading platform where she could "help him rebuild" the money. He showed her screenshots of supposed profits. He was so grateful. He loved her so much.

Sarah began borrowing from friends and family. Colleagues noticed her distraction. Her mother asked gentle questions that Sarah deflected. She was too ashamed to admit she was sending money to a man she'd never met. Too invested—emotionally and financially—to stop.

By the time Sarah began searching James's photos online, she'd lost approximately £10,000 to £13,000.

What she discovered made her stomach drop. The same photograph appeared across dozens of dating profiles, each with identical biographical details. On a Reddit forum dedicated to scam reports, she found his face again—and again—each time paired with a new victim's story.

There was no James. There had never been a James.

The realization came with a wave of shame so intense it nearly consumed her. But underneath that shame, something else emerged: clarity. Sarah immediately blocked all contact, reported the fake accounts to the dating platform, and filed a report with Action Fraud. She told her family the truth. She began therapy.

The money is likely gone. The scammer was never caught. But Sarah has become something unexpected: an advocate. She speaks openly about her experience, warning others that romance scams thrive on genuine human desire for connection—not stupidity. She's learned that loneliness isn't a character flaw. And she's learned something else: that rebuilding trust, starting with herself, is possible.

Her story isn't about how she fell. It's about how she got back up.

reddit.com
u/Single-Cap-4500 — 7 days ago

The Tool Use Pattern: How AI Agents Actually Work

Agents Are Just Loops

Strip away the hype and an AI agent is a simple pattern: a language model that can call functions. The model doesn't execute code. It doesn't access databases. It outputs a structured request — "call this function with these arguments" — and your code does the rest.

Here's the core loop:

User sends a message

Model receives the message plus a list of available tools (JSON Schema definitions)

Model decides: respond with text, or call a tool

If tool call: your code executes the function, sends the result back

Model sees the result, decides next action

Repeat until the model responds with text (no more tool calls)

That's it. Every AI agent — from simple chatbots to complex autonomous systems — runs some variation of this loop.

Why JSON Schema Matters

The tool definitions you give the model are JSON Schema objects. They describe the function name, parameters, types, and constraints. The model uses these schemas to generate valid function calls.

{

"name": "search_customers",

"description": "Search the CRM by name, email, or account ID",

"parameters": {

"type": "object",

"properties": {

"query": { "type": "string" },

"field": {

"type": "string",

"enum": ["name", "email", "account_id"]

},

"limit": { "type": "integer", "default": 10 }

},

"required": ["query", "field"]

}

}

The quality of your schema directly determines the quality of the agent. Vague descriptions produce wrong tool calls. Missing constraints produce invalid arguments. Your tool schema is the interface contract between the model and your system.

Schema Design Principles

Be specific in descriptions. "Search customers" is worse than "Search the CRM by name, email, or account ID. Returns matching customer records with their subscription status."

Use enums for constrained choices. Don't let the model guess valid values.

Mark required fields explicitly. Models will omit optional parameters when unsure.

Keep parameter count low. More than 5-6 parameters per tool and accuracy drops. Split into multiple tools instead.

For full article please see the comments link on the Alset Academy platform

reddit.com
u/Single-Cap-4500 — 7 days ago

The Architecture Behind AI Support Agents That Actually Work

The $400 Billion Problem

Customer support costs enterprises roughly $400 billion per year globally. The industry average for resolving a single Tier 1 ticket — password reset, billing question, "where's my order" — is $15-25. Meanwhile, 60-70% of these tickets are repetitive. The same questions, the same answers, day after day.

AI support agents promise to fix this. Gartner predicts 40% of enterprise applications will have embedded AI agents by 2027. Zendesk, Intercom, and Salesforce are racing to ship AI-first support. But the gap between "we added AI to our helpdesk" and "our AI actually resolves tickets" is enormous.

The difference? Architecture. Not the LLM you choose — the engineering around it.

Why Most AI Support Bots Fail

The naive approach is straightforward: take customer messages, feed them to an LLM, return the response. It works in demos. It fails in production for three reasons:

  • No grounding. The LLM hallucinates answers about your product. It confidently tells customers about features that don't exist or processes that were deprecated six months ago.
  • No escalation. The bot tries to handle every question, including ones that require human judgment — billing disputes, account security, edge cases the knowledge base doesn't cover.
  • No observability. When a customer gets a bad answer, nobody knows. There's no confidence scoring, no audit trail, no feedback loop. The system degrades silently.

These aren't AI problems. They're engineering problems. And they have known solutions. Continue reading at - https://academy.alset.app/blog/ai-customer-support-agents-architecture

reddit.com
u/Single-Cap-4500 — 8 days ago

Love in the Time of Lies: How a Soldier's Photo Became a Scammer's Weapon

Sarah (name changed) was lonely. After her divorce, she'd thrown herself into building a new life in the UK—her career was stable, her flat was lovely—but something felt incomplete. So one quiet evening, she downloaded a dating app.

That's where she met "James." (name changed)

He was handsome in that catalog-perfect way—sharp jawline, military dress uniform, warm smile. His profile said he was a US Army officer stationed overseas, but temporarily unable to meet in person due to deployment. Sarah found this oddly reassuring. No awkward first dates. No pressure. Just conversations that unfolded slowly, like chapters in a book she couldn't put down.

For four months, James was everything. He messaged her throughout the day, asked about her work, remembered details about her family. He called her beautiful. He said he was falling in love with her. Sarah felt seen in a way she hadn't in years. She began imagining a future with him—what their first real meeting would look like, where they'd travel together, how their lives might intertwine.

Then came the first request.

James had been arrested in a bar fight (he claimed) and needed bail money. Would she wire £2,000? Sarah hesitated—her rational mind flickered with doubt—but James's messages became increasingly frantic. He needed her. She sent the money.

Days later, there was another crisis. The US Army was charging him a discharge fee. The amount kept growing. And then James introduced her to an investment opportunity: a cryptocurrency trading platform where she could "help him rebuild" the money. He showed her screenshots of supposed profits. He was so grateful. He loved her so much.

Sarah began borrowing from friends and family. Colleagues noticed her distraction. Her mother asked gentle questions that Sarah deflected. She was too ashamed to admit she was sending money to a man she'd never met. Too invested—emotionally and financially—to stop.

By the time Sarah began searching James's photos online, she'd lost approximately £10,000 to £13,000.

What she discovered made her stomach drop. The same photograph appeared across dozens of dating profiles, each with identical biographical details. On a Reddit forum dedicated to scam reports, she found his face again—and again—each time paired with a new victim's story.

There was no James. There had never been a James.

The realization came with a wave of shame so intense it nearly consumed her. But underneath that shame, something else emerged: clarity. Sarah immediately blocked all contact, reported the fake accounts to the dating platform, and filed a report with Action Fraud. She told her family the truth. She began therapy.

The money is likely gone. The scammer was never caught. But Sarah has become something unexpected: an advocate. She speaks openly about her experience, warning others that romance scams thrive on genuine human desire for connection—not stupidity. She's learned that loneliness isn't a character flaw. And she's learned something else: that rebuilding trust, starting with herself, is possible.

Her story isn't about how she fell. It's about how she got back up. See more at https://scamalert.run/stories

reddit.com
u/Single-Cap-4500 — 10 days ago

State of Scams report for April-May in North America and India

ScamAlert Quarterly Fraud Intelligence Report

EXECUTIVE SUMMARY

This inaugural report from ScamAlert covers our first five weeks of operation (April 1 - May 7, 2026), during which we tracked 28,151 scam reports across 33 fraud categories. Since launching in April 2026, ScamAlert has established itself as a comprehensive fraud intelligence platform, aggregating data from multiple sources to provide real-time insights into the evolving threat landscape.

Phishing attacks dominated the threat landscape, accounting for 79.6% (22,395) of all reported scams. This overwhelming prevalence reflects both the low barrier to entry for cybercriminals and the continued effectiveness of social engineering tactics. Cryptocurrency fraud, while representing only 1.5% of reports by volume, generated the highest average losses at $194.9 million per incident, highlighting the severity of crypto-related schemes targeting high-value victims.

Regional patterns reveal distinct threat profiles. India experienced significant losses from "digital arrest" scams—a sophisticated social engineering attack where fraudsters impersonate law enforcement to coerce victims into transferring money under false legal threats. North American victims primarily fell to traditional phishing, job scams, and identity theft schemes. The global impact is staggering: using conservative extrapolation models, we estimate these reported scams represent \$326 million in total economic damage when accounting for underreporting.

Emerging threats require immediate attention. The sophistication of impersonation attacks has increased dramatically, with scammers leveraging official-sounding titles, fake government agencies, and psychological manipulation tactics. The rise of platform-specific scams—particularly those exploiting messaging apps like WhatsApp and professional platforms like Microsoft Teams—demonstrates criminals' ability to adapt quickly to new communication channels.

For rest of the article refer to : https://scamalert.run/reports/q2-2026

reddit.com
u/Single-Cap-4500 — 14 days ago

Description

A Swedish-Finnish man was arrested in Pattaya, Thailand for operating an online fraud scheme that targeted hotel guests with fraudulent damage billing claims.

**How the Scam Works: according to scamlert.run"

The fraudster exploited the hotel guest system by generating fake damage bills and presenting them to unsuspecting hotel guests. The scam appears to involve:

  1. Identifying guests staying at hotels in Pattaya

  2. Creating false damage charge invoices

  3. Demanding payment from guests for alleged room or property damage they did not cause

  4. Likely using online communication or in-person contact to pressure payment

**Specific Red Flags:**

Unexpected damage charges presented by staff or third parties

Pressure to pay immediately before checkout

Bills for damage you didn't cause or wasn't documented at check-in

Requests for payment outside normal hotel billing procedures

Inability to verify charges with hotel management or main reception

Charges appearing after you've already settled your bill

Communication from individuals claiming to represent the hotel but acting suspiciously

Requests for payment via non-official hotel channels (direct transfer, cash, etc.)

**Who Is at Risk:**

Tourists and business travelers staying at hotels in Thailand and potentially other Southeast Asian destinations are vulnerable to this scam, particularly those unfamiliar with local practices or language barriers.

**What to Do if Targeted:**

Do not pay any unexpected damage charges without verification

Ask for written documentation and itemized details

Contact the hotel's main reception or management directly

Request to speak with a supervisor or manager

Verify all charges through official hotel channels before payment

Take photos of the room condition at check-in

Keep all receipts and documentation

Report suspicious billing to local tourism authorities

**If You're a Victim:**

Contact your credit card company immediately if charged

Report to local police in the jurisdiction where the hotel is located

Contact your country's embassy or consulate

Report to tourist police hotlines in Thailand (1155)

Document all communications and billing records

File disputes with your bank/payment provider

**Additional Protection:**

Document room condition with photos/video at check-in and check-out

Use hotel safes and avoid leaving valuables visible

Keep your room key secure

Request an itemized bill before checkout

Verify all charges match your room type and duration of stay

reddit.com
u/Single-Cap-4500 — 21 days ago

Description

## How the Scam Works

Attackers are exploiting a commonly trusted business process—password resets—to gain unauthorized access to user accounts and corporate systems. This scam targets the helpdesk or IT support teams within organizations by impersonating legitimate employees requesting password resets.

## Step-by-Step Attack Process

  1. **Initial Contact**: The attacker calls or emails the helpdesk/IT support team posing as an employee who has "forgotten their password" or claims they "cannot access their account."

  2. **Social Engineering**: The attacker uses publicly available information (names from LinkedIn, company directories, or previous data breaches) to sound credible. They may reference real departments, projects, or colleagues to build trust.

  3. **Bypassing Verification**: The attacker attempts to bypass security verification questions by:

Claiming they don't remember answers

Rushing the helpdesk agent ("I'm in a meeting, this is urgent")

Creating urgency around business-critical tasks

  1. **Password Reset Execution**: Once the helpdesk agent resets the password without proper verification, the attacker receives a temporary password or reset link.

  2. **Full Account Compromise**: The attacker logs in, changes the password permanently, and gains full access to the legitimate user's account, email, and connected systems.

  3. **Lateral Movement**: From the compromised account, attackers can access sensitive data, install malware, or pivot to other accounts with higher privileges.

## Red Flags to Watch For

Callers who are vague about why they need a password reset

Requests from people claiming to be employees but with inconsistent information

Callers who pressure helpdesk staff to bypass normal verification procedures

Requests outside normal business hours or from unusual locations

Callers who refuse to use standard verification methods

Generic greetings or difficulty providing employee-specific details

Requests to send temporary passwords via unsecured channels (SMS, email)

## Protection Steps

**For Employees:**

Never provide personal details to unsolicited callers claiming to be from helpdesk

Use multi-factor authentication (MFA) on all accounts

Verify password reset requests through alternative communication channels

Report suspicious calls to your IT department immediately

**For Organizations:**

Implement strict identity verification protocols for password resets

Require callers to answer security questions only they would know

Use callback verification (call the employee back using verified contact info)

Enforce mandatory multi-factor authentication

Train helpdesk staff on social engineering tactics

Log and audit all password resets

Never send temporary passwords via email or SMS

## Report This Activity

If you experience or suspect this scam:

**US**: Report to FBI at ic3.gov or FTC at reportfraud.ftc.gov or scamalert.run

**India**: Contact local cybercrime cell or file complaint at cybercrime.gov.in

**Your Organization**: Immediately notify your IT security team

reddit.com
u/Single-Cap-4500 — 22 days ago
▲ 2 r/ScamCenter+1 crossposts

Description

A mining company in Jaipur fell victim to a sophisticated WhatsApp impersonation scam that resulted in a loss of ₹5.30 crore (approximately $635,000 USD). This scam targets business executives and company decision-makers by impersonating senior management through fake WhatsApp accounts.

**How the Scam Works:**

  1. **Profile Spoofing**: Scammers create fake WhatsApp accounts using the profile picture (DP - Display Picture) and name of legitimate company executives, often the managing director, CEO, or finance head. The fake account mimics the real executive's identity as closely as possible.

  2. **Contact Targeting**: The fraudsters identify key employees who handle financial transactions, such as accountants, finance managers, or administrative staff who have authority to approve payments.

  3. **Urgent Communication**: The fake account contacts the target with seemingly legitimate business requests, typically framed as urgent and confidential. Messages may claim to be from the company's top leadership requesting immediate fund transfers.

  4. **Social Engineering**: The scammers establish trust by referencing real company details, projects, or past transactions. They create urgency by claiming the matter is sensitive and should not be discussed with others in the company.

  5. **Payment Diversion**: The victim is instructed to transfer funds to a specific bank account or UPI ID, often claimed to be for vendor payments, business acquisitions, or urgent operational expenses.

  6. **Exploitation of Trust**: Since the message appears to come from company leadership (via the spoofed WhatsApp account with their DP), employees are more likely to comply without verification.

**Red Flags to Watch For:**

WhatsApp messages from executives requesting urgent fund transfers

Requests to keep communications private or secret

Pressure to act quickly without normal approval procedures

Slight variations in the contact name (e.g., extra space, different spelling)

Requests to use unusual payment methods or unfamiliar bank accounts

Messages asking you to ignore normal company verification procedures

The "verified" checkmark is missing from the WhatsApp account

Requests for transfers to new or unfamiliar beneficiary accounts

Executives suddenly requesting payments via WhatsApp instead of official channels

**What Victims Should Do:**

  1. **Immediately Report**: File an FIR (First Information Report) with local cybercrime police and provide all transaction details, screenshots, and WhatsApp chat records.

  2. **Contact Your Bank**: Report the fraudulent transaction immediately to freeze accounts and attempt recovery of transferred funds.

  3. **Verify Through Official Channels**: Always verify large payment requests by calling the executive directly using verified company phone numbers (not numbers provided in the message).

  4. **Report to WhatsApp**: Report the fake account to WhatsApp directly through the app's reporting feature.

  5. **Alert Company IT**: Notify your company's IT and security teams about the impersonation attempt. Also report on scamalert.run

**In India**: Report to Cyber Crime Helpline - 1930 or visit your local Cyber Police Station.

**Important Prevention Measure**: Organizations should implement a strict policy requiring verbal or in-person verification for all fund transfers above a certain threshold, regardless of who the request appears to come from.

u/Single-Cap-4500 — 21 days ago