Status: DECLASSIFIED / EDUCATIONAL
"The perpetrator utilized a sense of urgency, claiming the victim's bank account was 'Blocked due to pending KYC'. Used psychological manipulation to force the installation of a remote access application."
Step 1 (The Hook): The victim received an SMS with a link. The message warned that failing to update KYC (Know Your Customer) would result in a permanent bank freeze.
Step 2 (The Social Engineering): Upon clicking the link, the victim received a call from an 'Executive'. The caller sounded professional and possessed basic details (Name/Phone) of the victim.
Step 3 (The Payload): The 'Executive' guided the victim to download a 'Support App' (AnyDesk/TeamViewer). This allowed the attacker to view the victim's phone screen in real-time.
Step 4 (The Theft): As the victim logged into their net banking to 'verify' the KYC, the attacker recorded the credentials and intercepted the OTP on the shared screen, immediately transferring funds to multiple mule accounts.
This file is for public awareness. Names and specific identifiers have been altered to protect victim identity. Suraksha India Archive.