Cyber Security Attacks
The scale of the criminal operation has been elaborate by the three sources. The World Health Organization says they were used by two front-companies created by a gang of expert fraudsters. The sources describe scam operations in “call centers” in two Indian cities.
They say as many as sixty “employees” add shifts in each geographic point, phoning TalkTalk purchasers and deceiving them until they offer their bank account information. The whistle blowers say they used a script and were told to claim they were employees at TalkTalk. The employees would then work to convince victims to unwittingly accept a virus onto their computers.
A separate team would then use that virus to gain access to victims’ on-line banking, they add. So far the sources have given very elaborate accounts of the scammers’ ways that correlate very closely with previous reports of fraud targeting of TalkTalk customers. A victim of the fraud was conned out of £5,000.
TalkTalk was hit by a cyber-attack in 2015, but that hack appears to be unrelated to the Indian fraud. Instead, it has alleged the fraud is coupled to problems throughout the country by a specific broadband provider. In 2011, TalkTalk outsourced a variety of its call-centre work to the municipality of (Calcutta), the geographic point of Wipro, one of India’s largest IT service firms. Last year, three Wipro workers were arrested on suspicion of selling TalkTalk consumer data. The World Health Organization alleges identical data was obtained by a criminal gang on a number of seized USB keys.
Internet Banking Fraud
The criminals then used the data to setup a minimum of three call centers where workers earned £120 per month to take part in the ongoing scam. The whistle blowers said that victims get tricked into giving the criminal complete management over their machine. The victims are then offered a compensatory payment that they have to log into their on-line banking profile to receive. Thanks to the virus, the fraudsters unit able to gain access to the victims’ bank accounts when they log in.
Why the whistleblowers appear credible:
Although the BBC cannot be bound of the whistleblowers claims, the following suggested they were telling the truth:
The information given by the three whistleblowers in the USA, namely the scripts use during fraudulent calls, correlate to a high degree. One of the individuals even shared a reproduction of his license, confirming his identity.
All three said they were unaware of the full scale of the fraud with two of them trying to share the information of UK victims they had spoken to, and asked American officials to warn the victims before they fell prey to the scam. So far, nearly £100,000 has been stolen as a result of this criminal act.
Questions keep surfacing about the speed with which TalkTalk became of the data breach at Wipro, which is believed to have occurred in late 2014.
“We are aware that there are criminals targeting customers in the UK and international firms, and we will implement strict measures to safeguard our customers very seriously,” said a voice for TalkTalk.
The World Health Organization proactively blocks over ninety million scam and nuisance calls a month.”
Wipro did not reply to requests for comment. When contacted, the two firms named by the whistleblowers vehemently denied any involvement or knowledge criminal behavior, and insisted their businesses was legitimate.