<?xml version="1.0" encoding="utf-8"?>        <rss version="2.0"
            xmlns:content="http://purl.org/rss/1.0/modules/content/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:atom="http://www.w3.org/2005/Atom">
            <channel>
                <atom:link href="https://english.dainikjagranmpcg.com/cyber-awareness/tag-18073" rel="self" type="application/rss+xml" />
                <generator>Dainik Jagran English RSS Feed Generator</generator>
                <title>Cyber Awareness - Dainik Jagran English</title>
                <link>https://english.dainikjagranmpcg.com/tag/18073/rss</link>
                <description>Cyber Awareness RSS Feed</description>
                
                            <item>
                <title>Raipur Cyber Fraud: 3 Targeted in Loan &amp; Banking Scams, ₹8 Lakh Lost</title>
                                    <description><![CDATA[<p dir="ltr"><strong>Cyber criminals duped three Raipur residents of ₹8 lakh using loan traps, fake reward point offers, and insurance scams. Police investigations are underway.</strong></p>
<p> </p>]]></description>
                
                                    <content:encoded><![CDATA[<a href="https://english.dainikjagranmpcg.com/states/chhattisgarh/raipur-cyber-fraud-3-targeted-in-loan-banking-scams/article-17474"><img src="https://english.dainikjagranmpcg.com/media/400/2026-04/raipur-cyber-fraud-3-targeted-in-loan-&amp;-banking-scams,-₹8-lakh-lost.jpg" alt=""></a><br /><h1 dir="ltr">Cyber Fraud in Raipur: Three Residents Duped of ₹8 Lakh in Separate Incidents</h1>
<p dir="ltr">Raipur cyber fraud cases continue to rise as miscreants target residents through sophisticated phishing, mobile hacking, and fake insurance updates.</p>
<p dir="ltr">Raipur: In a series of alarming incidents, cyber criminals have swindled approximately ₹8 lakh from three separate individuals in the capital city. Using a mix of predatory loan traps, credit card fraud, and fake consumer court threats, the perpetrators managed to siphon off money before the victims could realize they were being scammed. Local police have registered separate FIRs, and specialized teams are currently tracking the digital footprints of the fraudsters.</p>
<h3 dir="ltr">The Loan App Blackmail Trap</h3>
<p dir="ltr">The most severe case was reported from the Tikrapara area, involving a private sector employee, Vishal Gupta. On March 10, 2026, Gupta had applied for a modest online loan of ₹10,000. Instead of processing a legitimate loan, the suspects informed him that a higher amount—₹40,000—had been approved.</p>
<p dir="ltr">Under the guise of the application process, the fraudsters gained remote access to Gupta’s mobile device. They allegedly accessed his personal gallery, morphed his private photos into obscene content, and then used this to extort money. Sources indicate that the victim was coerced into transferring nearly ₹6 lakh under the constant threat of having his reputation destroyed on social media.</p>
<h3 dir="ltr">Army Personnel Targeted</h3>
<p dir="ltr">In a separate incident under the Saraswati Nagar police station limits, a serving Army Subedar, Harishchandra Singh, fell prey to a phishing scam. On April 17, he received a phone call from an individual claiming to be a representative from Axis Bank.</p>
<p dir="ltr">The caller offered to help him redeem accumulated reward points on his credit card. The perpetrator guided the Subedar to a fraudulent website and requested his card credentials. Shortly after entering the details, Singh received alerts of unauthorized transactions totaling ₹1,99,996. Realizing the deception, he promptly contacted the bank’s customer care and registered a complaint via the 1930 national cybercrime helpline.</p>
<h3 dir="ltr">Fake Insurance Claims</h3>
<p dir="ltr">The third case involves a fruit trader, Jaykumar Wadhwani, a resident of Amlidih, who was targeted through a convoluted insurance scheme. The suspects contacted Wadhwani, claiming his ICICI Prudential life insurance policy was facing losses and required urgent intervention.</p>
<p dir="ltr">The callers created a false sense of panic by mentioning fictitious legal actions in a "Consumer Court." They then sent a malicious link under the pretext of providing a "freezing code" to secure his policy. Once Wadhwani clicked the link, the suspects gained access to his banking information and withdrew ₹55,000 from his account.</p>
<h3 dir="ltr">Police Urge Public Caution</h3>
<p dir="ltr">Raipur police officials have reiterated their warning regarding unsolicited calls and suspicious links. Investigators noted that these gangs often operate from outside the state, making recovery difficult.</p>
<p dir="ltr">"People must remain vigilant against 'urgent' calls regarding bank details or insurance updates. Never click on unverified links or share OTPs," said an officer familiar with the ongoing investigations. As of now, authorities are analyzing the bank accounts where the stolen funds were transferred, hoping to trace the perpetrators behind this wave of Raipur cyber fraud.</p>
<p> </p>]]></content:encoded>
                
                                                            <category>States</category>
                                            <category>Chhattisgarh</category>
                                    

                <link>https://english.dainikjagranmpcg.com/states/chhattisgarh/raipur-cyber-fraud-3-targeted-in-loan-banking-scams/article-17474</link>
                <guid>https://english.dainikjagranmpcg.com/states/chhattisgarh/raipur-cyber-fraud-3-targeted-in-loan-banking-scams/article-17474</guid>
                <pubDate>Tue, 28 Apr 2026 12:40:01 +0530</pubDate>
                                    <enclosure
                        url="https://english.dainikjagranmpcg.com/media/2026-04/raipur-cyber-fraud-3-targeted-in-loan-%26-banking-scams%2C-%E2%82%B98-lakh-lost.jpg"                         length="96313"                         type="image/jpeg"  />
                
                                    <dc:creator><![CDATA[Abhishek Joshi]]></dc:creator>
                            </item>

            </channel>
        </rss>
        