Proof Required
- Transaction Records: Detailed statements showing unauthorized transactions.
- Device Logs: Evidence of malware or unauthorized access on victims’ devices.
- Communication Records: Phishing messages, emails, or call logs related to the fraud.
Biometric Data Misuse: In AEPS cases, evidence of unauthorized biometric transactions.