Man-in-the-middle: Pune is falling prey to calls from afar | pune news | Hindustan Times
Today in New Delhi, India
Oct 19, 2017-Thursday
-°C
New Delhi
  • Humidity
    -
  • Wind
    -

Man-in-the-middle: Pune is falling prey to calls from afar

Caller hacks into computers, gets control of business transactions and steals money

pune Updated: Jul 06, 2017 15:35 IST
Shalaka Shinde
Hackers from outside India have been targeting Pune businessmen.
Hackers from outside India have been targeting Pune businessmen.(Getty Images/iStockphoto)

Cyber crime is on the rise in Pune, and in most of the cases the victims have fallen prey to the ‘man in the middle’.

This is how it works:

A person sitting in one corner of the world hacks  into a person’s computer and gains information about a possible or scheduled business transaction.

The hacker then pretends to be a representative of the receiving end of monetary transaction and siphons money off while the involved parties remain oblivious of the fraud.

The worrying trend in the city of Pune is a threat to not only to the financial security but also privacy of the victim.

A few cases of cyber crime involving the practice of man-in-the-middle were detected in Kothrud area of the Pune city, according to Sudhir Hiremath, the Deputy Commissioner of Police, Cyber Cell.

However, according to Senior Police Inspector Radhika Phadke as the third person is generally in a different country, a case cannot be built due to lack of jurisdiction.

In what comes as an alarming fact, the number of cybercrimes involving man-in-the-middle attack in Mumbai cases rose by 37 per cent as the number of cases reached 26 in 2016 from 19 cases in 2015, according to studies. While in 2016, victims lost as much as ₹14.54 crore, the amount stood at ₹4.33 crore in 2015, according to local cyber crime police unit in Mumbai.

What is man-in-the-middle-attack?

Cyber crimes involving man-in-the-middle attack involves hacking an official email account of a company and finding out about its upcoming transactions with other companies.

The fraudster under a typical man-in-the-middle attack acts as an intermediary and intercepts and alters the user's computer details and later uses the information for fraudulent purpose.