Pradeep Agale
Asked April 01, 2017

Cheated on pretext of giving loan

  • 1 Answer
  • 276 Views

I got  one call on 16.1.17 from number 7208358176 name Pooja patil regarding loan. She asked me for six month bank statement to send on watsapp number 9029817350 . After two days she called me and told loan of thirty lakh sanctioned but you have to deposit eight percent of the amount plus service tax. So I did RTGS the amount 120000/- + 200000/- on given account Skyline services. Karnataka bank ltd A/c no. 5502000100056901 IFSC code. KARB0000550 AFTER THAT THEY DEMAND 248604/- AFTER MAKING PAYMENT THEY TOLD AMOUNT transfer to my account But from yesterday all the numbers are switch off 9029817519 9029817350 7208358176 8097706489.

Answer 1

Clearly it is a case of cyber crime.  CIDs (Criminal Investigation Departments) of various cities have opened Cyber Crime Cells in different cities, so you should immediately file a criminal compliant against the nos. under section 120 B, 406, 417 & 426 of Indian Penal Code, along with Sections 43, 65, 66, 66A, C and D of the Information Technology Act.

 

Below mentioned are the steps you can take to file a cyber crime complaint.       Step 1: you will have to provide name, mailing address & telephone number along with an application letter, addressing the head of a cyber crime investigation cell when going to file a complaint.           Step 2: Provide the following papers and documents:            1) Server Logs         2) A copy of the defaced web page in soft copy as well as hard copy format. If any data is compromised on the victim’s server or computer or any other network equipment, soft copy of original data and soft copy of compromised data.           3) Access control mechanism details i.e. - who had access to the computer or email of the victim?   4) List of suspects i.e. if the victim is having any suspicion on anyone. 5) All relevant information leading to the answers to following questions, namely:  

  • What is compromised?
  • Who might have compromised the system?
  • When was the system compromised?
  • Why was the system compromised?
  • Where is the impact of the attack-identifying the target system from the network?

How many systems have been compromised by the attack

Agree Comment 0 Agrees over 3 years ago

Please Login or Register to Submit Answer

Directory ads
Need to talk to a lawyer?

Book a phone consultation with a top-rated lawyer on Lawfarm.