BREAKING NEWS

BREAKING NEWS ""**If we want PSU bank to compete with Pvt bank ---Give them a break Saturday first*** DA FOR BANKER FROM FEBRUARY 2023 SEE DETAILS CHART FOR OFFICER AND WORKMAN***Outcome of Today’s meeting with IBA - 31.01.2023***All India Bank Strike 27.06.2022******PLEASE VISIT INDIAN TOURISM CULTURE & HERITAGE *****NITI Aayog finalised names of Two public sector banks and one general Insurance Co. for privatisation****No economic reason to privatise PSU banks---post date 24.05.2021******Mobile users may soon be able to switch from postpaid to prepaid and vice versa using OTP*****India May Privatise or Shut 46 PSUs in First 100 Days, Says NITI Aayog's Rajiv Kumar----We should start with the banks*****Expected DA for Bank Employee from August 2019 is 24 slab to 29 slab*****RTGS time window from 4:30 pm to 6:00 pm. with effect from June 01.06.2019******WITHOUT CUSTOMER'S CONSENT BANK CAN NOT USE AADHAAR FOR KYC ----RBI***** Salient features of Sukanya Samriddhi Account---Who can open and how?******OBC posts 39% rise in Q4 profit, OBC readt tWITHOUT CUSTOMER'S CONSENT BANK CAN NOT USE AADHAAR FOR KYC ----RBI o take another Bank--MD MUkesh Jain*******DA FOR BANKER FROM NOV 2018 IS INCREASE 66 SLAB I.E 6.60%****40,000 STANDARD DEDUCTION IN YOUR TAX - IS A GREAT DRAM/BLUFF BY JAITLY SEE DETAILS+++++++Cabinet approves plans to merge PSU banks-The final scheme will be notified by the central government in consultation with the Reserve Bank. post date 23.08.2017****IBA to restrict the negotiations on Charter of Demands of Officers' Associations up to Scale-III only post dated 07.07.2017*****

VISITOR FROM WORLD

Free counters!

YOU ARE VISITOR

Blog Archive

LIVE

BREAKING NEWS ""**If we want PSU bank to compete with Pvt bank ---Give them a break Saturday first****Outcome of Today’s meeting with IBA - 31.01.2023*********

Wednesday, August 11, 2021

Bank Customers in India Targeted by Phishing Websites Hosted on ngrok Platform

Indian banking customers are being targeted by a new type of phishing attack using the ngrok platform (a web service provider). The malicious actors have abused the ngrok platform to host phishing websites impersonating internet banking portals of Indian banks. Using these phishing websites, malicious actors are collecting sensitive information of the customers like internet banking credentials, mobile number and one time password (OTP) to perform fraudulent transactions. 
 
In a warning, the Indian Computer Emergency Response Team (CERT-In) says, the scammers are sending SMS to customers with embedded phishing links ending with ngrok.io/xxxbank. 
 
A sample message appears like this...
 
 
Once the customer clicks on the URL give in above message and login to the phishing website using their Internet banking credentials, the scamster generates an OTP as two factor authentication (2FA) which is delivered to customer’s phone number.
 
When the customer enters the OTP in the phishing site, the scammer captures it and then gains access to the victim’s account using the OTP and performs fraudulent transactions.
 
 
ngrok is a reverse proxy that creates a secure tunnel from a public endpoint to a locally running web service. ngrok creates a tunnel from the public internet http://.ngrok.io to a port on the local machine (here on the scammer's machine). The auto-generated URL can be shared with anyone to give them access to the local development environment (read: the scammer can see all details being filled by the victim on his machine).
 
CERT-In says bank customers in India must follow certain precautions when they receive such message and should never click on any link given there. Further it asks customers to refrain from filling out internet banking credentials on these websites.
 
Here are the best practices recommended by CERT-In to protect customers from this new type of phishing attack...
 
Do not browse un-trusted websites or follow un-trusted links and exercise caution while clicking on the link provided in any unsolicited emails and SMSs.
 
Look for suspicious numbers that don't look like real mobile phone numbers. Scammers often mask their identity by using email-to-text services to avoid revealing their actual phone number. Genuine SMS messages received from banks usually contain sender ID (consisting of bank's short name) instead of a phone number in sender information field.
 
If you get a message that appears to be from your bank or other financial institution, contact that bank directly to determine if they sent you a legitimate request.
 
Exercise caution while opening email attachments. 
 
Only click on URLs that clearly indicate the website domain. When in doubt, users can search for the organisation's website directly using search engines to ensure that the websites they visited are legitimate.
 
Install and maintain updated anti-virus and antispyware software.
 
Consider using safe browsing tools, filtering tools (antivirus and content-based filtering) in your antivirus, firewall, and filtering services.
 
Update spam filters with latest spam mail contents.
 
Exercise caution towards shortened URLs, such as those involving bit.ly and tinyurl. Users are advised to hover their cursors over the shortened URLs (if possible) to see the full website domain which they are visiting or use a URL checker that will allow the user to enter a short URL and view the full URL. Users can also use the shortening service preview feature to see a preview of the full URL.
 
Pay particular attention to any misspelling and/or substitution of letters in the URLs of the websites they are browsing.
 
Look out for valid encryption certificates by checking for the green lock in the browser's address bar, before providing any sensitive information such as personal particulars or account login details.
 
Reduce the risk of downloading potentially harmful apps by limiting your download sources to official app stores, such as your device's manufacturer or operating system app store.
 
Customer should report any unusual activity in their account immediately to the respective bank. Phishing websites and suspicious messages should be reported to CERT-In (at incident@cert-in.org.in) and the respective banks with the relevant details for taking further appropriate actions.

No comments:

Bank of Baroda Officers Union announces All India strike against New Transfer Policy

The All India Bank of Baroda Officers’ Association has declared a strike in protest against the bank management’s new anti-officer transfer ...

script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js">