Loan app – Kenke Pelicula http://kenkepelicula.com/ Sat, 14 May 2022 19:34:41 +0000 en-US hourly 1 https://wordpress.org/?v=5.9.3 https://kenkepelicula.com/wp-content/uploads/2021/10/kenke.png Loan app – Kenke Pelicula http://kenkepelicula.com/ 32 32 Harassed by online lending app operators, Hyderabad man commits suicide https://kenkepelicula.com/harassed-by-online-lending-app-operators-hyderabad-man-commits-suicide/ Thu, 12 May 2022 12:21:00 +0000 https://kenkepelicula.com/harassed-by-online-lending-app-operators-hyderabad-man-commits-suicide/ Unable to bear the harassment from app operators, Rajkumar killed himself on Monday at his home in Jiyaguda, within the confines of Kulsumpura police station, police said. Harassment by operators of an online loan application is believed to have led a youngster to suicide in Hyderabad. Unable to bear the harassment from app operators, Rajkumar […]]]>

Unable to bear the harassment from app operators, Rajkumar killed himself on Monday at his home in Jiyaguda, within the confines of Kulsumpura police station, police said.

Harassment by operators of an online loan application is believed to have led a youngster to suicide in Hyderabad. Unable to bear the harassment from app operators, Rajkumar committed suicide on Monday at his home in Jiyaguda, within the confines of Kulsumpura police station, police said on Tuesday.

The family of Rajkumar, a private employee, told police he took Rs 12,000 through an online loan app and repaid Rs 4,000 through EMIs. While taking the loan, the youngster had given contact numbers of friends as a reference. As he failed to repay the remaining amount, the app organizers sent messages to his friends.

Rajukumar, who felt humiliated, committed suicide when no one was home. On a complaint filed by his mother, the police registered a file and resumed the investigation.

The latest incident has come to light even as Greater Hyderabad Police have stepped up a crackdown on online loan applications lately after new cases of harassment were reported.

Last year, six people died by suicide in Telangana due to harassment by agents hired by instant loan apps.

As many as 50 cases of harassment have been reported from Hyderabad, Cyberabad and Rachakonda Police Stations which cover Hyderabad and surrounding areas. Some of the apps were found linked to Chinese nationals.

In many cases, agents demanded more money even after customers paid dues. According to the police, the messages sent to the references given by the customers when taking loans and the threats led to the suicides.

Last month, Hyderabad police closed a fraud case linked to a loan application run by a Chinese national in Bengaluru. Police had arrested two Karnataka residents who ran a call center and offered loans through six loan applications under the supervision of a Chinese national.

In February, debt collectors on a loan application falsely labeled a man a rapist in order to force him to repay the loan.

According to police, in the majority of reported cases, officers sent messages to clients’ families and friends naming and shaming them.

Read: Made in China: How the instant loan app racket exploded in India

If you know someone who has mental health issues or is feeling suicidal, please provide help. Here are some hotline numbers for suicide prevention organizations that can offer emotional support to individuals and families.

Tamil Nadu

State Health Department Suicide Hotline: 104

Sneha Suicide Prevention Center – 044-24640050 (listed as the only suicide prevention hotline in Tamil Nadu)

Andhra Pradesh

Suicide prevention: 78930 78930

Roshni: 9166202000, 9127848584

Karnataka

Sahaï (24 hours a day): 080 65000111, 080 65000222

Kerala

Maitri: 0484 2540530

Chaitram: 0484 2361161

Both are 24 hour helpline numbers.

Telangana

State Government Suicide Prevention (toll-free): 104

Roshni: 040 66202000, 6620200

SEVA: 09441778290, 040 27504682 (between 9 a.m. and 7 p.m.)

Aasara provides support for individuals and families during an emotional crisis, those dealing with mental health issues and suicidal ideation, and those experiencing trauma following the suicide of a loved one.

24/7 hotline: 9820466726

Click here to access helplines across India.

]]>
Blackmail by Loan Enforcement Officers Rising in City | Bombay News https://kenkepelicula.com/blackmail-by-loan-enforcement-officers-rising-in-city-bombay-news/ Sun, 08 May 2022 21:49:00 +0000 https://kenkepelicula.com/blackmail-by-loan-enforcement-officers-rising-in-city-bombay-news/ MUMBAI: Just five days after a Malad man took his own life after his tweaked photographs were shared on WhatsApp by alleged loan app debt collectors, fellow Malad resident Anurag Singh ( 24), claims to have fallen prey to a similar blackmail tactic. He filed a complaint with Kurar police on Sunday. According to Singh, […]]]>
MUMBAI: Just five days after a Malad man took his own life after his tweaked photographs were shared on WhatsApp by alleged loan app debt collectors, fellow Malad resident Anurag Singh ( 24), claims to have fallen prey to a similar blackmail tactic. He filed a complaint with Kurar police on Sunday.

According to Singh, the app accessed his contact list after installing it on May 1 to simply ask what loan he could avail of and without his consent transferred Rs 3,805 to his bank account on the same day. Kurar Police said on May 6 that Singh had started receiving threatening text messages and calls demanding that he repay the “loan” as well as the “interest” of 7,000 rupees for just six days.
Loan application demands Rs 7,000 interest on Rs 3.8k for just 6 days
Young Malad resident Anurag Singh has filed a complaint of harassment and blackmail by agents of an online loan app. Police said one of the callers got angry when Singh asked if he could repay the loan in cash instead of an online transfer.
“Singh and his friends blocked the numbers after he started transmitting his transformed photos. Singh filed a complaint with the police against three mobile SIM card numbers, through which he and his friends received threatening calls between 6 and May 7,” said a Kurar police officer.
Singh, a graduate employed by a private company, said he came across a “Hedisy Loan App” advertising link on his Facebook page to get an easy loan without any documentation. As he was planning to avail a personal loan, he clicked on the link.
“I was asked to download the app. In order to check my loan eligibility and the maximum amount I could get, I downloaded my Aadhar and PAN cards, along with other bank details, and I I also granted access to my phone contact list and gallery.I was shocked when, unbeknownst to me, Rs 3,805 was credited to my account as a loan which I had not availed. What shocked me even more was how interest was calculated for just six days,” Singh told TOI.
“When I asked the caller how the interest rate was calculated, he cursed and threatened me that he would ruin my image by sending my transformed photos to everyone on my contact list. On the 7th May I got a call from two of my friends saying they had received the pictures along with a text saying I had taken out a loan and failed to pay it back We all blocked the numbers,” Singh said.
Meanwhile, Kurar Police said they are investigating the May 4 suicide case of Sandeep Koregaonkar (38) from Kurar Gaon in Malad (East) who was also harassed and blackmailed by “agents recovery”.
Cyber ​​expert Ritesh Bhatia says loan seekers should not blindly download such apps.

]]>
Coimbatore cyber police warn locals against loan app pitfalls https://kenkepelicula.com/coimbatore-cyber-police-warn-locals-against-loan-app-pitfalls/ Sun, 08 May 2022 07:07:48 +0000 https://kenkepelicula.com/coimbatore-cyber-police-warn-locals-against-loan-app-pitfalls/ Residence News India Coimbatore cyber police warn locals against loan app pitfalls –>]]>

–>

]]>
eow: Business owner ‘linked’ to questionable loan application held | Bhubaneswar News https://kenkepelicula.com/eow-business-owner-linked-to-questionable-loan-application-held-bhubaneswar-news/ Fri, 06 May 2022 22:26:00 +0000 https://kenkepelicula.com/eow-business-owner-linked-to-questionable-loan-application-held-bhubaneswar-news/ Bhubaneswar: The economic crimes wing (EOW) of the state crime branch on Friday arrested the owner of a shell company in Ghaziabad for his alleged links to a questionable loan application, which allegedly deceived many applicants for crores of rupees in and out of state.Mohammad Javed Saifi, owner of IWT India, the shell company, reportedly […]]]>
Bhubaneswar: The economic crimes wing (EOW) of the state crime branch on Friday arrested the owner of a shell company in Ghaziabad for his alleged links to a questionable loan application, which allegedly deceived many applicants for crores of rupees in and out of state.
Mohammad Javed Saifi, owner of IWT India, the shell company, reportedly worked as a middleman for the Koko loan company. “We have found suspicious transactions, involving millions of rupees, in IWT India bank accounts. loan Koko,” EOW Deputy Inspector General JN Pankaj said.
Lending company Koko was mass messaging people and urging them to download its app for instant loans. After downloading the app, users were prompted to allow access to their contact lists. Users were also asked to complete a KYC form including account number to receive the loan amount.
The company was transferring the loan amount to the applicants from the bank accounts of IWT India and some other fraudulent entities. After sending the loan amount, Koko agents forced the beneficiaries to repay three times the amount within a few days. If loanees ignored their calls and messages, the company hacked into their contact lists and sent abusive and vulgar messages to their contacts.
Many victims gave in and paid exorbitant sums to the fraudsters. EOW said some victims committed suicide in Andhra Pradesh and Telangana after cyber crooks defamed them in a WhatsApp group calling them rapists. On May 3, the EOW uncovered the link between Mahagram Payments Private Limited, a private company, and the Koko loan fraud and froze its deposits worth Rs 6.57 crore.
According to the EOW, around 1.5 lakh people across the country, including more than 5,000 from Odisha, downloaded the Koko loan app during the Covid pandemic to get instant small loans, ranging from Rs 3 000 to Rs 10,000 without much verification. The company was not licensed by the RBI to operate as a non-banking financial company, the EOW said.
]]>
Bengaluru: ED attaches Rs 6.2 crore to Chinese lending app firms | Bangalore News https://kenkepelicula.com/bengaluru-ed-attaches-rs-6-2-crore-to-chinese-lending-app-firms-bangalore-news/ Wed, 27 Apr 2022 23:10:00 +0000 https://kenkepelicula.com/bengaluru-ed-attaches-rs-6-2-crore-to-chinese-lending-app-firms-bangalore-news/ Companies used their own funds received from abroad (mainly China) to provide loans. (Representative image) BENGALURU: Enforcement Directorate (ED) detectives have attached Rs 6.2 crore found in different bank accounts of app-based companies dealing with instant loans. ED said it had provisionally seized assets worth Rs 6.2 crore located in various accounts or merchant IDs […]]]>
Companies used their own funds received from abroad (mainly China) to provide loans. (Representative image)

BENGALURU: Enforcement Directorate (ED) detectives have attached Rs 6.2 crore found in different bank accounts of app-based companies dealing with instant loans.
ED said it had provisionally seized assets worth Rs 6.2 crore located in various accounts or merchant IDs held on behalf of fintech companies and their associates in various banks under the Prevention of Money Laundering Act 2002 (PMLA).
Marathahalli and Mahalakshmipuram Police had registered a case related to the fraud in November 2021.
Central Crime Branch police took charge of the case and arrested two people.
ED began to probe the angle of money laundering and discovered that the accused as well as Chinese nationals had opened companies in the names of various people. They provide loans and raise investments through mobile apps like Cash Master, Krazy Rupee, Cashin, Rupee Menu, etc.
These companies were incorporated in the time of Covid at joint addresses by Chinese nationals with the help of locals. A few Indian accountants helped them by using KYC documents of job seekers and made them directors or shareholders of the company, detectives have said.
The companies’ bank accounts were managed by Chinese nationals under whose instructions the companies had been incorporated. Probe revealed that bank accounts opened on the basis of residents’ KYC documents were used to provide short-term loans to the public. They used to charge high processing fees and exorbitant interest rates. They have adopted unethical means to collect loans from customers. These short-term loans were provided by these companies through Non-Banking Financial Companies (NBFCs).
The companies used their own funds received from abroad (mainly China) to provide loans.
CCB police had registered cases against 59 of these companies between February 28 and April 13 this year.

FOLLOW US ON SOCIAL NETWORKS
]]>
You must beware! Instant loan app scammers are prowling the city https://kenkepelicula.com/you-must-beware-instant-loan-app-scammers-are-prowling-the-city/ Tue, 26 Apr 2022 19:22:51 +0000 https://kenkepelicula.com/you-must-beware-instant-loan-app-scammers-are-prowling-the-city/ Hyderabad: The city police’s cybercrime wing had cracked down hard on businesses in 2021 that were involved in providing instant loans; loan recipients were harassed by the companies because of which many gullible people were forced to commit suicide. After the police crackdown, it was found that most of the businesses involved Chinese people who […]]]>

Hyderabad: The city police’s cybercrime wing had cracked down hard on businesses in 2021 that were involved in providing instant loans; loan recipients were harassed by the companies because of which many gullible people were forced to commit suicide.

After the police crackdown, it was found that most of the businesses involved Chinese people who had also hired local Indians to provide loans. A huge syndicate of Chinese people has been discovered operating behind the instant loan app frauds.

A CCS officer said, “We have received a few complaints from people claiming that they are again being harassed by executives of loan application companies. Preliminary investigation of the cases indicated that the servers and backend operations are in Nepal, Indonesia and the Philippines. After the crackdown on illegal instant loan apps and the exposure of the Chinese angle, many loan fraudsters may have moved to these countries to hide their Chinese identity, although many of them were able to obtain bail after a few days of hearing.

The police arrested around 100 people, including Chinese. A few key suspects, however, managed to leave the country before police could arrest them. Police in Hyderabad, Rachakonda and Cyberabad had frozen bank accounts in which amounts reaching millions were deposited. In March this year, police arrested two people who operated a call center in Bangalore, with around 100 people, providing short-term loans.

In 2020, there were a few incidents where at least six borrowers ended their lives due to harassment from loan application company executives. In Hyderabad alone, about 50 cases have been booked; while an equal number have been reserved in other districts. The task forces had in fact raided call centers set up by loan application companies in Gurgaon, Bengaluru, Delhi and Hyderabad.

The officer, explaining the modus operandi of the accused gangs, said the suspects were hosting loaner apps on Google Play Store. Whenever people download the apps, scammers get permission to access gallery, contact list and locations before granting loans. If the borrower does not repay, all forms of harassment begin. In-app profits from the lending app fraud were sent via cryptocurrency to different accounts believed to be held by foreign nationals. Police in Hyderabad, Rachakonda and Cyberabad filed indictments in the cases. The cases are now pending.

Now it looks like the app companies are back in business, prompting police to issue a notice, asking people to stay away from instant loan apps and naming at least 130 apps.

It is a well-organized network involving crores. If a handful of people are arrested, the main ones, staying in other parts of the world, will resume their activities by collaborating with other local people in India. We are writing to Google Play Store asking to remove instant loan apps from their platform immediately to avoid harassment from borrowers, said another officer, who wished to remain anonymous.

]]>
Loan application scammers move to Nepal https://kenkepelicula.com/loan-application-scammers-move-to-nepal/ Mon, 25 Apr 2022 17:28:47 +0000 https://kenkepelicula.com/loan-application-scammers-move-to-nepal/ Posted: Posted Date – 10:58 PM, Mon – 25 Apr 22 Representative picture Hyderabad: After last year’s crackdown on illegal instant loan apps and the exposure of the Chinese angle, many scammers appear to have moved to the Philippines and Nepal to hide their Chinese identities, according to preliminary investigations by the police on a […]]]>

Posted: Posted Date – 10:58 PM, Mon – 25 Apr 22

Representative picture

Hyderabad: After last year’s crackdown on illegal instant loan apps and the exposure of the Chinese angle, many scammers appear to have moved to the Philippines and Nepal to hide their Chinese identities, according to preliminary investigations by the police on a few new cases.

“In recent days, we have received a few complaints from people claiming to be harassed by executives of lending application companies. Preliminary investigation of the cases indicated that the servers and main operations are located in Nepal and the Philippines,” said a cyber crime official from Hyderabad.

A year and a half ago, following a series of incidents that ended the lives of at least six borrowers due to harassment by executives of loan application companies, the State Police of Telangana launched a campaign of repression. In Hyderabad alone, around 50 cases have been booked while an equal number have been booked in other districts. The teams had in fact raided call centers set up by loan application companies in Gurgaon, Bengaluru, Delhi and Hyderabad.

Police arrested around 100 people, including Chinese nationals. A few of the main suspects, however, managed to leave the country before the police could arrest them.

Police in Hyderabad, Rachakonda and Cyberabad had frozen bank accounts where huge sums amounting to several crores were deposited. Also in March this year, police arrested two people who operated a call center in Bangalore with around 100 people and provided short-term loans.

Explaining the modus operandi, Co-Commissioner of Police (Detective Department) Gajarao Bhupal said the suspects were hosting loan apps on Google Play Store. “Whenever people download the apps, the scammers get permission to access the gallery, contact list and locations before giving loans. If the borrower does not repay, all forms of harassment begin,” he said.

Police also noted that app profits from lending app fraud were sent via cryptocurrency to different accounts believed to be held by foreign nationals. Police in Hyderabad, Rachakonda and Cyberabad have filed indictments in the cases and the cases are currently on trial.

Now it looks like the app companies are back in business, prompting police to issue a notice, asking people to stay away from instant loan apps and naming at least 130 apps.

“It is a well-organized network involving millions of rupees. So if a handful of people are arrested, the main people staying in other parts of the world will resume the activity by collaborating with other local people in India” , another police official said.

Police are writing to the Google Play Store asking it to immediately remove instant loan apps from its platform to avoid harassment of borrowers.


You can now get handpicked stories from Telangana today on Telegram every day. Click the link to subscribe.

Click to follow Telangana Today Facebook page and Twitter .


]]>
Delhi police arrest 5 behind Chinese loan application for extortion https://kenkepelicula.com/delhi-police-arrest-5-behind-chinese-loan-application-for-extortion/ Mon, 18 Apr 2022 07:00:00 +0000 https://kenkepelicula.com/delhi-police-arrest-5-behind-chinese-loan-application-for-extortion/ Delhi Police Cyber ​​Cell has arrested five people from Delhi, Haryana and Uttar Pradesh for allegedly abusing and extorting borrowers from a loan application, police said in a press release. The extorted amount was being sent to China, the statement added. The app is called Cash Advance Ha, which police described as an “unlicensed Chinese […]]]>

Delhi Police Cyber ​​Cell has arrested five people from Delhi, Haryana and Uttar Pradesh for allegedly abusing and extorting borrowers from a loan application, police said in a press release. The extorted amount was being sent to China, the statement added.

The app is called Cash Advance Ha, which police described as an “unlicensed Chinese micro-finance company”. To install this app available online, permissions to access gallery and contact list on the device must be granted. Once the user granted access, “all their data was automatically transferred to Chinese servers” and the loan amount was disbursed.

The team involved in the operations of the app tracked the users who received the loan repayment.

“After a day of loan transfer, the defendant team started calling the loan seekers and their known relatives, friends, etc. through different whatsapp/mobile numbers to repay the loan…Even after the loan repayment/ money, the alleged accused person used to extort more money from the loan applicant and also started sharing vulgar/threatening messages with the family member, relatives and friends of the applicant loans to push him to pay more and more money —Delhi Police Press Release

In the past, several people have taken their own lives due to harassment by representatives of predatory loan apps, some of which had connections to Chinese nationals.


Dear reader, we urgently need to build capacity to cover the rapidly changing technology policy space. For that, our independent editorial team is counting on you. Subscribe to MediaNama today, and help us report on the policies that govern the internet.

Advertisement. Scroll to continue reading.


Victims called from fraudulently obtained numbers

On March 15, Anurag Halder (a resident of Sodepur, Kolkata) filed a complaint alleging that he and his family, friends and were abused and threatened by strangers through WhatsApp calls from international mobile numbers. This was after taking out a loan from the Cash Advance Ha app.

Based on the complaint, the Delhi Police analyzed call data records from the phones allegedly used to commit the crime. “He revealed that the defendants were phoning the victims through a fraudulently obtained WhatsApp number and their registered owners were unaware of this WhatsApp activation from their mobile numbers. Most of these mobile users were from West Bengal and Assam“Delhi police said.

Call data records also revealed that one of the accused was in the Delhi-Gurugram border area. Based on this information, the police carried out raids in Salapur Khera, Bijwasahan in Delhi, where they arrested 22-year-old Sonu Singh. After questioning Singh who allegedly worked as a recovery agent for the company, police also arrested Vikash Kumar from Farukhabad, Uttar Pradesh.

“During technical analysis, it was further discovered that Vikash Kumar was leading a team of callers, who used to call loan seekers/victims who had borrowed their app. defendants’ gadgets, it was found that the defendants used to send threatening messages to the victims’ contact list to extort the victims,” the press release reads.

The app’s privacy policy had red flags everywhere

“The privacy policy has been hosted on a website which includes the collection of data such as contact list, images, SMS, Aadhaar card, PAN card, bank details, etc.. It is mentioned in the privacy policy of the Android application that if the user does not pay the loan amount, they will contact the people in their contact list to collect the loan amount“, reads the press release.

During a technical analysis of the app, the Delhi Police found that loans can be easily obtained from the app without KYC document verification. “Loans were made available in a very short period of time, sometimes immediately to a given IPU or bank accounts with a higher interest rate. A small amount of loan could be disbursed after service charge reduction with higher interest rates, as if Rs.6000/- is the loan amount, Rs. 2300/- would be service charge and Rs. 3700/- would be the disbursed amount of the loan,” he said. he declares.

Advertisement. Scroll to continue reading.

Delhi police scanned the app for malware and found that data was being sent from the app to third-party servers based in China. The extorted money was also sent to China in the form of cryptocurrency by a defendant in the case.

Hyderabad police halted a similar operation last month

The Hyderabad City Police Cyber ​​Crime Division has arrested two Bengaluru residents for allegedly operating six predatory instant loan apps under the supervision of a Chinese national named Chen Chaoping.

Shabbir Alam and Umakanth Yadav were employees of Sky Links Technology Pvt Ltd, based in Koramangala, a company which allegedly operated the lending apps – Ocean Ruppee, Life Wallet, Maloo Wallet, Elephant Cash, Box Cash and Dutta Rupee. Once installed, the apps obtained permissions to access the gallery, contact list and stored location on the device before providing short-term loans, according to a press release.

In 2020, Chaoping reportedly operated a lending application call center called Golden Bag Technologies Pvt. Ltd in Bangalore. Alam worked as a supervisor and Yadav was the company’s IT manager. However, when the police started cracking down on predatory loan apps in 2020, Chaoping left for China.

“After 2 months, the Chinese national again contacted defendants Shabbir Alam and Umakanth Yadav and asked them to manage the call center by introducing new loan applications.” The apps were reportedly developed by Chaoping. Based on his instructions, the accused hired about 100 telecallers and established Sky Links Technology Pvt Ltd.

How serious is the problem of predatory loan apps in India?

SaveThem India, a foundation working to tackle the problem of loan applications in India, received more than 55,000 calls from victims of harassment from loan application agents until September last year. Here are the common harassment techniques used by these agents to recover the money:

Advertisement. Scroll to continue reading.

  • Night calls: Lending apps use robocall software to harass victims late at night and interfere with their daily lives.
  • Threats to notify contacts: If the borrower defaults, the loan application officers threaten to call the borrower’s contacts or create WhatsApp groups to announce their default. In some screenshots seen by MediaNama, such groups were created and images were released with “420” or “fraud” written on the photos of the victims.
  • False legal notices: The app operators threaten to take legal action against the borrowers and send the government bogus legal notices with electronic stamps showing the stamp duty paid in the registered case.

These aren’t just obscure apps

At a time when Chinese lending apps are being criticized for charging exorbitant interest rates and using predatory practices, fintech company MobiKwik has been accused of using similar and ethically questionable practices to secure repayment of a loan contracted on its platform.

This particular incident concerns Bharath C Raghurama, a 34-year-old man from Karnataka who is currently based in Gujarat. Raghurama had benefited from an instant loan offered by MobiKwik in December and his repayment was scheduled for the end of the month. But when Raghurama was unable to pay him on time, he claimed that MobiKwik agents started harassing him on WhatsApp. They warned him that if he was unable to repay the sum as soon as possible, his friends and family would be informed of the situation. They have also attached a list of his “key contacts” as evidence that they have access to details of his friends and family.

This post is published under a CC-BY-SA 4.0 license. Feel free to repost on your site, with attribution and a link. Adaptation and rewriting, although permitted, must be faithful to the original.

Read also :

Do you have something to add ? Subscribe to MediaNama here and post your comment.

]]>
Defunct CashMama and Loan Zone, MeraLoan Leaks Sensitive Customer Data, Report Says https://kenkepelicula.com/defunct-cashmama-and-loan-zone-meraloan-leaks-sensitive-customer-data-report-says/ Mon, 11 Apr 2022 12:42:14 +0000 https://kenkepelicula.com/defunct-cashmama-and-loan-zone-meraloan-leaks-sensitive-customer-data-report-says/ Personally Identifiable Information (PII), such as passport photos, loan agreements, and other files exposing a wide variety of sensitive data, such as full names, email addresses, national ID cards, phone numbers, bank accounts containing over 6.5 million (million) files, totaling over 1TB (terabyte) of data, are leaked from (now) instant loan app CashMama and three […]]]>

Personally Identifiable Information (PII), such as passport photos, loan agreements, and other files exposing a wide variety of sensitive data, such as full names, email addresses, national ID cards, phone numbers, bank accounts containing over 6.5 million (million) files, totaling over 1TB (terabyte) of data, are leaked from (now) instant loan app CashMama and three other apps associated with it , according to a report.

the safety team at SafetyDetectives discovered a data breach affecting CashMama, which was left in an open form on Amazon’s S3 bucket. It states: “The contents of the compartment included PII and sensitive data belonging to customers of at least four instant loan applications: CashMama, Loan Zone (also known as Vayloan), MeraLoan and an unidentified application. We observed a large amount of personal data. that were collected for each application. We observed ten different file collections on the bucket. Each collection of files consisted of one or more folders containing similar files. The data in each collection relates to one of the instant loan apps on the bucket.

According to SafetyDetetectives, the data from the unidentified app was stored under an app name, although it was not possible to specify exactly which app that name referred to. “A small portion of the files are of unknown origin – this data could have been collected for one of the loan applications mentioned, or it could have been collected for a completely different instant loan application,” it says.

Founded in 2018 in Hyderabad, CashMama is now defunct after it was discovered that it was allegedly involved in an instant loan app scam. CashMama promised convenience with a 100% online loan application and screening process.

“CashMama was owned by parent company Onion Credit Pvt Ltd, which also operated other instant loan apps with open bucket data, such as Loan Zone and MeraLoan. Each of these apps is implicated in racketeering allegations. Onion Credit representatives were arrested in late 2020 following allegations of blackmail, harassment, coercion and financial fraud,” says SafetyDetectives.

CashMama’s Open Bucket features a feature that allows its owners to spy on customers through several mobile apps and related services. “The loan agreements exposed a lot of this PII and sensitive data, information that belongs to CashMama customers. The loan agreements appear to document contracts between customers and instant loan companies.

“Alternatively, the loan agreements could have been sent to the non-bank financial companies (NBFCs) funding the loans. There were nearly 300,000 loan agreements on the misconfigured bucket.”

According to the investigation, the image data found in CashMama’s bucket included technical information about users’ photos without containing the photos themselves. The image data exposed PII and sensitive data of CashMama customers and was found in vintage files. Nearly 200,000 vintage files exposed the data of approximately 100,000 CashMama customers.

“The photo ID files contained photo IDs presumably collected during the application and identification process. We believe these photos exposed PII of LoanZone/Vayloan customers, however, we cannot to be certain Over 2.3 million of these files were seen on the open bucket Processed ID cards contained over 170,000 plain text identifiers Here the ID cards were converted to plain text via the optical character recognition, a technology that scans images for text,” the report said.

Additionally, CashMama’s Amazon Web Service (AWS) S3 bucket contained nearly 650,000 SMS data files and nearly one million SMS and contact history files, the latter exposing the phone data of more than 350,000 customers. Device information that likely belonged to LoanZone or Vayloan users was also found in a Vayloan fingerprint data file. We have seen over 600,000 files in this folder containing this form of sensitive user data.

MeraLoan users had their cellphone contact data exposed in MeraLoan apps and contract files. A folder on the bucket stored over 7,000 files containing MeraLoan user contacts. “We do not know whether or not the app has requested access to users’ contacts to collect this data. If the app has requested access, users should be aware that access to contacts gives the app permission to download all contact files, including contact details,” says SafetyDetectives.

CashMama’s unsecured Amazon S3 bucket was not active and unused at the time of discovery and the files in the bucket were dated October 2020 to April 2021.

“Amazon is not responsible for the management of CashMama’s AWS S3 bucket and therefore is not responsible for this data breach. Based on the number of unique files we observed, we estimate that there are approximately 200,000 to 600,000 customers exposed to the CashMama data breach,” the report states. said.

According to SafetyDetetectives, CashMama’s bucket contained data apparently collected from users’ phones. It says: “We don’t know if access to this data has been granted by users in app permissions or not. If apps have requested permissions, the bucket shows how apps can legally collect user data and how this data collection can ultimately put users at risk.Users should read permissions carefully before downloading an app.Above all, users should be able to understand what data each app permission provides access to.

As reported by Moneylife, while loan sharks, charging astronomical interest and disguising it as a processing fee (to beat the loan sharking law) continue to wreak havoc among desperate borrowers, the union government has washed its hands on the question.

In February last year, a response written in the Lok Sabha, the Ministry of Electronics and Information Technology (MeitY) stated that the police and public order are matters of state and that the States and Union Territories (UTs) are primarily responsible for the prevention, detection, investigation, and prosecution of crimes, including the misuse of social media through their enforcement mechanisms. law application.

Also, instead of taking notice of the serious issues, the ministry simply shared the Google Play Store policy in its response.

Like reported by Moneylife , the apps, which lend small amounts between Rs2,000 and Rs10,000, are targeting low-income and financially unsophisticated Indians who don’t realize how quickly their small borrowings can turn into a huge loan. The ensuing harassment drove many young people to suicide, prompting the police to take action.

Earlier in December 2020, the Reserve Bank of India (RBI) warned borrowers not to go to unauthorized digital lending platforms or mobile apps to get a loan and never share any knowledge-related documents of your customer (KYC) with these entities. However, other than advising borrowers to file a complaint, RBI has not mentioned any action it has taken so far or how it proposes to tackle the threat.

According to RBI, there have been reports of individuals and small businesses falling prey to an increasing number of unauthorized digital lending platforms and mobile apps on the promise of getting loans quickly and hassle-free.

The article says that with few exceptions, most of these loan companies charge high interest and processing fees on short-term (seven days to one month) loans. Their interest rates vary from 25% to 40% while processing fees vary from 15% to 20%. In addition, GST at the rate of 18% is levied on the processing fee.

You might want to read…

]]>
Delhi: Eight detained for extortion using ‘loan app’ https://kenkepelicula.com/delhi-eight-detained-for-extortion-using-loan-app/ Mon, 04 Apr 2022 07:00:00 +0000 https://kenkepelicula.com/delhi-eight-detained-for-extortion-using-loan-app/ Eight people, including a Chinese national, have been arrested in Delhi, Jodhpur and Gurgaon for allegedly extorting people under the guise of giving them loans, police said. During the investigation, police discovered that the accused had installed malware on the victims’ phones and hacked into them. They accessed personal data and used it to extort […]]]>

Eight people, including a Chinese national, have been arrested in Delhi, Jodhpur and Gurgaon for allegedly extorting people under the guise of giving them loans, police said.

During the investigation, police discovered that the accused had installed malware on the victims’ phones and hacked into them. They accessed personal data and used it to extort their victims, police said.

DCP KPS ​​Malhotra said it received a complaint from a woman alleging she was threatened by strangers who sent her transformed photos to her family and friends via social media: “She told the police that she had taken out a loan through an app and repaid it. Soon after, she started receiving threatening calls and WhatsApp messages from app employees. We discovered that the scammers allegedly used the profile picture of a senior police officer.

Malhotra said the loan application was analyzed and found to be “malicious” – it would steal a person’s contact details, contacts/photos and send them to a third party.

“Money trails of the alleged transaction were established and it was found that the money was transferred to a current account opened in the name of (a company)… the account was found in the name of (one of the accused). In the alleged account, Rs 8.45 crore was credited in just about 15 days and the same was simultaneously transferred to other accounts,” Malhotra said.

Raids were carried out and four men were arrested. At their request, two people, including a woman, were arrested. “Later another accused was arrested in Jodhpur. He is the mastermind in India who provided bank accounts to the alleged Chinese national, who was arrested in Jodhpur. We discovered that the defrauded amount was sent to China via cryptocurrency,” Malhotra said. The other two defendants were arrested later, he said.

]]>