Skip to main content

Tax scams targeting Mobile Users

 


Recently the I.T department has noticed the new type of cybercrime. The tax scam is one of them. Cyber criminals have targeted mobile users for tax scams. Income tax return filing dates have become the tax scam season for cyber criminals & this shows that there is still not enough E- literacy among netizens.

 

What is a Tax Scam?

As per the report published by The Hindu[1], the messages sent out by the imposters to people right around the deadline for filing Income tax returns. Those messages contain –‘the person’s income tax refund has been approved and mentions a random bank account number next to it.’

Clicking on the link more, opens a website that appears just like I-T Department’s official website. When the target enters his login credentials on that website, subsequent step needs the target to enter checking account details, which can currently be simply accessible to the scammer, who sent the message.

 


In starting, scammers will simply use it to transfer the I-T refund to a different bank account. But they can also change the target’s cell phone number in the I-T department s records, so they cannot be notified about the changes.

 

How Tax Scam Works?

      There are numerous modes used by the Scammers. Some of them are:

  • Phishing- A scam typically carried out with the help of unsolicited email or a fake website posing as a legitimate site to lure in potential victims.
  • Offers Tax Refund.
  • Identity Theft- By obtaining the personal or financial information of another person for the sole purpose of making transactions or purchases.
  • Fake Phone Calls- Here imposter fraudulently calls and threats you in the name of a legal notice.
  • Ransomware- By designing malicious software that exposes unwitting customers to data breaches or prevents you from accessing your data.


Recently, the tax department had proclaimed that it would issue refunds of up to Rs Five lakh straightaway to assist the taxpayers to keep going financial emergencies caused by the nationwide lockdown. However, several taxpayers having outstanding tax demand from the previous year that was due was needed to be adjusted against the tax refund. Hence, the tax department has been sending emails to such taxpayers communicating to them regarding such adjustment and asking them to respond to such email.[2]This has been done before also i.e. IRDA[3], RBI.[4]

 


      Preventive Measures


  • The income tax authority of India has notified the official E-mail id for the communication check of the domain of such mails.
  • Do not open any attachments. Attachments could contain malicious code which may infect your computer.
  • Do not enter confidential information like bank account, credit card details, in case mistakenly clicked on links in a suspicious phishing website or email.
  • If you think your e-Filing account may have been compromised or accessed in an unauthorized manner, you may file online complaint/FIR by visiting https://cybercrime.gov.in/

 

Conclusion

India has become the centre of fake calls, messages, and emails. Technology can be a boon or bane to the world, it’s our choice what to choose. We have to be more attentive towards fake calls, messages, emails, etc. It’s like a never-ending chain of crimes that will be more advanced with technology. As a user, it’s also our duty to keep a check on the fraudulent calls and report them so that everyone will be safe from those calls.

-Surbhi Joshi
(Legal Intern)

           For more updates, please visit our website: https://www.worldcybersecurities.com/

Comments

  1. Very well authored and educationg blog. Keep writing👏

    ReplyDelete
  2. This is one of the best article I've read so far. Very informative and very easy to understand as it is written in a very simple way:-)

    ReplyDelete

Post a Comment

Popular posts from this blog

Dark Web: Safe or unsafe? Truth Revealed!

  The dark web is the part of the internet that is not visible to search engines. With the advancement in technology, digitization has resulted in different types of attacks. We can talk to anyone as long as we have an internet connection. The main concern is with privacy and anonymity in mind.  A team of computer scientists and mathematicians working for one branch of the US navy which is known as the Naval Research laboratory (NRL), developed a new technology known as Onion Routing. It allows anonymous communication where the source and destination cannot be determined by the third party. A network using the Onion Routing technique is classified as Darknet. The NRL released the Onion Routing Technique and it became The Onion Router, also known as TOR. Advantages of Dark Web  Humans are allowed to hold privacy and express their views freely. Privacy is considered to be critical for honest persons through the different criminals and stalkers.  The growing tendency of...

Famous Cyber crimes That Targeted People Instead Of Money

  With the emergence in the field of technology, the number of cyber crimes have also emerged. Different types of cyber crimes daily take place such as phishing, email spoofing, data theft, identity theft, bullying, harassment, cyber extortion, ransomware attacks, etc. The majority of the people would opine that the Cyber criminals engage in these activities for the sake of money but there are numerous examples where money wasn’t the only target of the Cyber criminals, rather they targeted people.  The intent of cyber criminals,  targeting the people can differ from case to case. Sometimes it may target a single person or sometimes a large number of persons. Various examples show the instances where the target of the cyber crimes were people, be it belonging to specific religion or age group or sometimes a sole person. Various examples of such crimes are discussed below: Bulli Bai App - This app was created over the platform namely GitHub which is an open software develop...

New Privacy Policy of Twitter

  Twitter is one of the most commonly used social media networking platforms and is very popular amongst celebrities as well. People enjoy uploading tweets and retweets over Twitter. It is a good platform for social messaging, news and marketing, etc. But recently twitter has been in the news for a change in its privacy policy. Just a few weeks after the announcement that Elon Musk was going to acquire that social media platform, Twitter had revamped its privacy policy. Everyone was expecting something big after that announcement and many were curious to know if there will be any changes in that micro-blogging platform. Later on, Twitter introduced the privacy policy to their users by creating a video guide for users so that they can understand the privacy policy. Also, Twitter has said that its new privacy policy is much more simplified and organized under three new heads namely data use, data sharing, and data collection. The new version of twitter’s privacy policy will take effe...