Missed Call से Scammer कर रहे आपका Bank Account खाली ? | Cyber Expert Amit Dubey | TRP | @RJRaunac

Missed Call से Scammer कर रहे आपका Bank Account खाली ? | Cyber Expert Amit Dubey | TRP | @RJRaunac

TLDR;

This video explains a real-life cybercrime case where money was stolen from someone's account through a seemingly innocuous missed call. The investigation revealed that a video editing app with SMS access was installed and uninstalled on the victim's phone. The perpetrator was eventually identified as the victim's child, who was tricked into installing the app by a gaming acquaintance in exchange for Rox Points, a gaming currency. The case highlights the importance of comprehensive security measures and awareness of potential vulnerabilities, even within one's own household.

  • Money was stolen through a missed call, without OTP or link clicks.
  • A video editing app with SMS access was the entry point.
  • The victim's child installed the app for gaming currency (Rox Points).
  • Rox Points are being used for money laundering, raising government concerns.
  • Security requires awareness and caution, even within the family.

Introduction: The Case of the Missing Money [0:00]

The video starts by introducing a peculiar case of cybercrime where money was deducted from an individual's account after they received a missed call. Unlike typical fraud cases involving OTPs or malicious links, this incident involved no direct action from the victim. The presenter emphasizes the importance of understanding this case to stay safe and informed about evolving cyber threats.

Initial Investigation and Suspicions [0:14]

Initially, the authorities were skeptical, believing it would be too complex and costly to execute such a crime through a missed call. The victim reported neither receiving an OTP nor any suspicious alerts. The investigation began by exploring the possibility of a malicious application on the victim's phone that could intercept and delete SMS messages. Investigators considered that the app might have been uninstalled before the investigation started.

Identifying the Malicious Application [0:56]

The investigation revealed that a video editing application had been installed on the victim's phone on a Thursday and uninstalled on the following Sunday evening. This app had access to SMS permissions, making it a prime suspect for intercepting OTPs. Investigators then focused on determining who installed and uninstalled the application.

Excluding the Wife as a Suspect [2:10]

The initial suspicion fell on the victim's wife. To investigate without directly questioning her, the investigators checked her phone activity logs via her Gmail account, which was logged into a home laptop. They found that she was watching OTT content on her phone during the installation and was not at home during the uninstallation, effectively ruling her out as a suspect.

The Involvement of the Child [3:08]

With the wife ruled out, the focus shifted to the child. Due to the sensitive nature of questioning a minor, investigators examined all electronic devices in the house. They discovered an application called "Disk" on the child's tablet, which allowed anonymous communication. The child had been communicating with someone who convinced him to install the malicious application on his father's phone in exchange for 200 Rox Points.

Rox Points and Modern Cybercrime [4:11]

Rox Points are a gaming currency used in many games played by children. The presenter notes that Rox Points are increasingly being used for money laundering, prompting government scrutiny. He warns viewers to be cautious when dealing with Rox Points to avoid becoming entangled in potential investigations.

Lessons Learned and Security Awareness [5:04]

The presenter concludes by emphasizing the unusual nature of the case and the valuable lessons it offers. He reiterates that security cannot be achieved in isolation and that users must be aware of potential vulnerabilities, even within their own households. The case underscores the importance of comprehensive security measures and vigilance to protect against evolving cyber threats.

Watch the Video

Date: 9/25/2025 Source: www.youtube.com
Share

Stay Informed with Quality Articles

Discover curated summaries and insights from across the web. Save time while staying informed.

© 2024 BriefRead