Close Menu
  • Homepage
  • Local News
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
  • Business
  • Technology
  • Health
  • Lifestyle
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
Facebook X (Twitter) Instagram Pinterest
JHB NewsJHB News
  • Local
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
Let’s Fight Corruption
JHB NewsJHB News
Home»Technology»He downloaded a WhatsApp image. Minutes later, Rs 2 lakh was gone | Technology News
Technology

He downloaded a WhatsApp image. Minutes later, Rs 2 lakh was gone | Technology News

April 18, 2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
This unique method deployed by scammers uses a malicious code that is cleverly hidden inside images. (Express Image: FreePik)
Share
Facebook Twitter LinkedIn Pinterest Email

One early morning, Pradeep Jain, 28, acquired a name from an unknown quantity. Just a few moments later, he obtained a message from the identical quantity: A photograph of an aged man with a query, “Have you learnt this individual?”

Initially, Jain ignored it. However after repeated calls, he ultimately gave in. Round 1:35 PM, he downloaded the picture. That one click on gave hackers entry to his telephone. Inside minutes, he misplaced Rs 2.01 lakh from his checking account.

The cash was withdrawn from an ATM in Hyderabad. When Canara Financial institution known as to confirm the transaction, the scammers managed to imitate Jain’s voice.

Story continues under this advert

This rip-off makes use of Least Vital Bit (LSB) steganography, a method of hiding information inside media recordsdata like pictures or audio by modifying the least vital bits of information items.

“The phrase ‘steganography’ has Greek origins. It means ‘hidden writing’. In cybercrime, this system is exploited to embed malware or secret directions inside harmless-looking media recordsdata. These hidden payloads typically evade conventional detection techniques and are triggered solely by particular scripts,” defined Neehar Pathare, MD of 63SATS.

Tushar Sharma, cyber knowledgeable and co-founder of TOFEE (The Organisation For Enlightenment and Training), stated, “This isn’t a brand new idea. In 2017, hackers embedded dangerous executable code inside GIF recordsdata shared on WhatsApp. When downloaded, the hidden code ran within the background, bypassing safety settings and accessing the person’s information. Although the vulnerability was patched, this system made a comeback in 2019 with extra refined strategies and broader targets.”

How steganography scams differ from conventional malware assaults

In contrast to apparent phishing or malware makes an attempt, like faux login pages or suspicious attachments, steganography hides code inside seemingly harmless recordsdata. “There’s nothing overtly harmful about these pictures or audio recordsdata, which is why they typically bypass antivirus software program. Steganography can idiot even superior instruments like AI-based picture recognition,” stated Pathare. 

Story continues under this advert

File codecs like .jpg, .png, .mp3, .mp4, PDFs are generally used for this, since these codecs appear reliable and are ceaselessly exchanged.

How the assault works

“Most pictures use three bytes of information for color – pink, inexperienced, and blue. Malware is usually hidden in one in all these or the fourth byte, known as the alpha channel,” stated Sharma. “Once you open the contaminated picture, the malware installs silently and beneficial properties entry to your delicate information.”

Pathare stated, “The malicious code is then extracted utilizing particular instruments and executed, permitting it to slide previous signature-based antivirus techniques.”

Can this malware be detected?

“Detecting steganography requires forensic instruments, steganalysis platforms, and behavioural analytics to identify anomalies in file buildings or execution behaviour,” says Pathare. “Conventional antivirus instruments are ineffective as a result of they don’t scan for embedded content material. AI and machine studying provide a greater shot by detecting behavioural irregularities inside recordsdata and bettering early menace detection.”

Story continues under this advert

How are you going to shield your self?

Tushar Sharma shares these key tricks to keep protected:

Keep away from unknown senders: Don’t open or obtain recordsdata from unknown numbers.

Hold your telephone up to date: Common updates assist patch vulnerabilities.

Disable auto-download: Forestall unknown media from saving robotically by tweaking WhatsApp settings.

By no means share OTPs: Scammers typically fake to be recognized contacts.

Restrict group additions: Set group permissions to ‘My Contacts’ to forestall being added to suspicious teams.

Silence unknown callers: Activate the ‘Silence Unknown Callers’ characteristic on WhatsApp to scale back spam and rip-off makes an attempt.

Story continues under this advert

Along with the above security measures, a WhatsApp spokesperson stated that scammers are continually altering their ways, which is why it’s vital to remain alert and cautious. “If somebody you don’t know messages you or provides you to a bunch, you’ll see a context card supplying you with extra details about the person or the group. We advise folks to dam and report suspicious accounts, and by no means obtain pictures, movies, or click on hyperlinks from unknown numbers.”

The spokesperson instructed indianexpress.com that WhatsApp continues to spend money on know-how, security instruments, and sources to assist customers shield themselves from on-line scams.

Pathare additionally really useful deploying file-scanning instruments that may analyse embedded content material, utilizing behaviour-based menace detection, and limiting unauthorised media dealing with in safe environments. At an organisational stage, coaching staff to recognise dangers and utilizing AI-powered cybersecurity techniques can considerably cut back publicity to such assaults.

The Protected Facet

Because the world evolves, the digital panorama does too, bringing new alternatives—and new dangers. Scammers have gotten extra refined, exploiting vulnerabilities to their benefit. In our particular characteristic collection, we delve into the most recent cybercrime traits and supply sensible ideas that will help you keep knowledgeable, safe, and vigilant on-line.



Source link

downloaded image lakh Minutes news Technology WhatsApp
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

How to Watch the Galaxy S25 Edge Launch Live Stream

May 10, 2025

‘We thought civilians were safe… that belief has been shattered’: In line of Pak fire, Poonch empties out | India News

May 10, 2025

Sumitomo of Japan buys 20% stake in YES Bank for around Rs 13,483 crore | Business News

May 10, 2025

Whoop unveils next-gen wearables Whoop 5.0, Whoop MG, with advanced health monitoring features | Technology News

May 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Significant I-70 delays through Denver, Aurora expected this weekend

May 10, 2025

Shannon Sharpe’s Sexual Assault & Battery Lawsuit: Everything To Know

May 10, 2025

Inflows into equity mutual funds decline 3.2% in April: AMFI | Business News

May 10, 2025

How to Watch the Galaxy S25 Edge Launch Live Stream

May 10, 2025
Popular Post

“Era Of Strategic Patience Is Over,” Says Iran On Israel Attack

Potential climate disaster could hit the stock market, economist warns — Here are 2 stocks that fight for a greener future

Greta Thunberg, held over coal mine protests, released after brief detention: German police

Subscribe to Updates

Get the latest news from JHB News about Bangalore, Worlds, Entertainment and more.

JHB News
Facebook X (Twitter) Instagram Pinterest
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
© 2025 Jhb.news - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.