Trick 5- Session Hijacking
Fraudsters intercept active banking sessions to execute unauthorized transactions.
The attack likely involved malware, keyloggers, or public Wi-Fi vulnerabilities.
No OTPs were triggered as transactions were performed within an already authenticated session.
Mumbai: Businessman Duped of ₹2 Crore Without OTP

- Modus Operandi: Cybercriminals gained unauthorized access to the victim’s bank account and transferred funds without triggering OTPs or alerts.
- Details:
- The victim, a Mumbai-based businessman, discovered the unauthorized transactions during a routine account check.
- No OTPs or transaction alerts were received on the registered mobile number.
- The bank’s investigation revealed that the fraudsters had used sophisticated methods to bypass security protocols.
- A police complaint was filed, and the case is under investigation.