Skip to main content

Tax scams targeting Mobile Users

 


Recently the I.T department has noticed the new type of cybercrime. The tax scam is one of them. Cyber criminals have targeted mobile users for tax scams. Income tax return filing dates have become the tax scam season for cyber criminals & this shows that there is still not enough E- literacy among netizens.

 

What is a Tax Scam?

As per the report published by The Hindu[1], the messages sent out by the imposters to people right around the deadline for filing Income tax returns. Those messages contain –‘the person’s income tax refund has been approved and mentions a random bank account number next to it.’

Clicking on the link more, opens a website that appears just like I-T Department’s official website. When the target enters his login credentials on that website, subsequent step needs the target to enter checking account details, which can currently be simply accessible to the scammer, who sent the message.

 


In starting, scammers will simply use it to transfer the I-T refund to a different bank account. But they can also change the target’s cell phone number in the I-T department s records, so they cannot be notified about the changes.

 

How Tax Scam Works?

      There are numerous modes used by the Scammers. Some of them are:

  • Phishing- A scam typically carried out with the help of unsolicited email or a fake website posing as a legitimate site to lure in potential victims.
  • Offers Tax Refund.
  • Identity Theft- By obtaining the personal or financial information of another person for the sole purpose of making transactions or purchases.
  • Fake Phone Calls- Here imposter fraudulently calls and threats you in the name of a legal notice.
  • Ransomware- By designing malicious software that exposes unwitting customers to data breaches or prevents you from accessing your data.


Recently, the tax department had proclaimed that it would issue refunds of up to Rs Five lakh straightaway to assist the taxpayers to keep going financial emergencies caused by the nationwide lockdown. However, several taxpayers having outstanding tax demand from the previous year that was due was needed to be adjusted against the tax refund. Hence, the tax department has been sending emails to such taxpayers communicating to them regarding such adjustment and asking them to respond to such email.[2]This has been done before also i.e. IRDA[3], RBI.[4]

 


      Preventive Measures


  • The income tax authority of India has notified the official E-mail id for the communication check of the domain of such mails.
  • Do not open any attachments. Attachments could contain malicious code which may infect your computer.
  • Do not enter confidential information like bank account, credit card details, in case mistakenly clicked on links in a suspicious phishing website or email.
  • If you think your e-Filing account may have been compromised or accessed in an unauthorized manner, you may file online complaint/FIR by visiting https://cybercrime.gov.in/

 

Conclusion

India has become the centre of fake calls, messages, and emails. Technology can be a boon or bane to the world, it’s our choice what to choose. We have to be more attentive towards fake calls, messages, emails, etc. It’s like a never-ending chain of crimes that will be more advanced with technology. As a user, it’s also our duty to keep a check on the fraudulent calls and report them so that everyone will be safe from those calls.

-Surbhi Joshi
(Legal Intern)

           For more updates, please visit our website: https://www.worldcybersecurities.com/

Comments

  1. Very well authored and educationg blog. Keep writing👏

    ReplyDelete
  2. This is one of the best article I've read so far. Very informative and very easy to understand as it is written in a very simple way:-)

    ReplyDelete

Post a Comment

Popular posts from this blog

UNESCO Guidelines on Generative AI in Schools

The advent of artificial intelligence has assumed prominence amongst all industries and various facets of people's personal lives. The integration of AI in education has been inevitable, given the significance and role of information, knowledge production and administration in the sector. This is especially so as its capabilities entail replicating higher-order thinking. Besides assisting in the education process, it also brings the element of real-life relevance, allowing education to be imparted against the backdrop of the evolving world due to the same AI. It tends to have implications on the subject matter that needs to be imparted, which tends to be something that constantly needs to answer the question of "Why and how is this particular subject matter relevant for learning?".  This induces policy-makers and educational institutions to rethink what they need to impart as knowledge, the area of matter, and the manner of thinking to be emphasised. This is because educa

Dark Web: Safe or unsafe? Truth Revealed!

  The dark web is the part of the internet that is not visible to search engines. With the advancement in technology, digitization has resulted in different types of attacks. We can talk to anyone as long as we have an internet connection. The main concern is with privacy and anonymity in mind.  A team of computer scientists and mathematicians working for one branch of the US navy which is known as the Naval Research laboratory (NRL), developed a new technology known as Onion Routing. It allows anonymous communication where the source and destination cannot be determined by the third party. A network using the Onion Routing technique is classified as Darknet. The NRL released the Onion Routing Technique and it became The Onion Router, also known as TOR. Advantages of Dark Web  Humans are allowed to hold privacy and express their views freely. Privacy is considered to be critical for honest persons through the different criminals and stalkers.  The growing tendency of employers to track

The Perfect Storm: How Technology And Cybercrime Are Creating A New Landscape Of Crime?

Introduction A clandestine revolution has been underway in cyberspace, transcending conventional notions of crime. This article embarks on a journey to decipher the intricate relationship between technology and the evolution of cybercrime. In this digital era through which technological advancements have permeated every facet of our existence, an examination is undertaken of how cybercriminal enterprises have been formed and how they have been driven to evolve in novel and unanticipated ways. Historical Perspective While cybercrime in its nascent stage existed within a substantially more insular digital environment, the infrastructure supporting modern interconnectivity remained scarcely foreseeable, living only as a speculative vision of future technological advancement. Limited technology posed both challenges and opportunities for cybercriminals. Hackers, often driven by curiosity or experimentation, explored vulnerabilities in rudimentary computer systems. Notable early cybercr