Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack

Posted on July 14, 2025July 14, 2025 By CWS

A Pune-based car elements producer fell sufferer to a complicated man-in-the-middle (MITM) cyber assault, leading to a lack of ₹2.35 crore. 

The 52-year-old director of the corporate filed an FIR with the cybercrime police station after discovering that fraudsters impersonating executives from an Italian manufacturing agency had intercepted enterprise communications and redirected funds to fraudulent accounts.

Key Takeaways1. ₹2.35 crore loss, Pune auto elements agency defrauded by cybercriminals impersonating Italian manufacturing firm executives.2. Attackers used faux e mail area much like authentic Italian agency to intercept ₹3.1 crore machine buy communications.3. After receiving 25% advance cost, fraudsters claimed checking account points and redirected remaining funds to faux accounts.4. Fraud detected when Pune firm contacted real Italian gross sales government; FIR filed with cyber crime police.

E-mail Spoofing Intercepts Enterprise Communications

In line with the Indian Specific report, the cyber criminals employed superior e mail spoofing strategies to execute this enterprise e mail compromise (BEC) assault. 

They created a fraudulent e mail area that carefully resembled the authentic Italian firm’s area title, using what cybersecurity consultants time period “area spoofing” or “typosquatting.” 

The attackers intercepted communications between the Pune agency and the Italian producer throughout a authentic enterprise transaction for buying a press bending machine price 320,000 Euros (roughly ₹3.1 crore).

The fraudsters demonstrated refined social engineering expertise by monitoring the e-mail exchanges and gathering detailed details about the continued enterprise dealings. 

They leveraged this intelligence to create convincing proforma invoices that appeared an identical to authentic paperwork. 

This assault vector, categorized as an “on-path” assault, exploits the dearth of end-to-end encryption in commonplace e mail protocols and the absence of correct e mail authentication mechanisms like SPF (Sender Coverage Framework), DKIM (DomainKeys Recognized Mail), and DMARC (Area-based Message Authentication, Reporting & Conformance).

The assault reached its fruits when the Pune firm had already paid 25% of the machine price (₹75 lakh) in April and Might 2025. 

Earlier than the scheduled cost of the remaining 75%, the fraudsters despatched a misleading e mail claiming the Italian firm’s Milan-based checking account was quickly non-operational. 

The e-mail directed the sufferer to switch funds to an alternate account managed by the cybercriminals.

The Pune agency, failing to detect the delicate deception, secured a mortgage of ₹2.25 crore and transferred ₹2.35 crore to the fraudulent account in two separate transactions in the course of the first and second weeks of June 2025. 

The fraud was found solely when the corporate contacted the real Italian agency’s India-based gross sales government to verify the cost receipts.

Organizations are advisable to deploy multi-factor authentication (MFA), implement SSL/TLS encryption for all e mail communications, and set up DMARC insurance policies to forestall area spoofing.

The Pune and Pimpri Chinchwad cybercrime police stations have particularly suggested firms to conduct common safety audits of their e mail methods and supply cybersecurity consciousness coaching to accounting workers. 

Crucial suggestions embody verifying any modifications in cost directions via direct telephonic conversations and implementing a dual-approval course of for high-value transactions.

Examine reside malware habits, hint each step of an assault, and make quicker, smarter safety selections -> Strive ANY.RUN now 

Cyber Security News Tags:Attack, Auto, Crore, Firm, Loses, ManintheMiddle, Parts, Pune

Post navigation

Previous Post: New Interlock RAT Variant Distributed via FileFix Attacks
Next Post: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More

Related Posts

Ransomware Actors Exploit Unpatched SimpleHelp RMM to Compromise Billing Software Provider Cyber Security News
Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Cyber Security News
Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions Cyber Security News
Five Hackers Behind Notorious Data Selling Platform BreachForums Arrested Cyber Security News
Managing Data Subject Access Requests in Compliance Programs Cyber Security News
Halo Security Achieves SOC 2 Type 1 Compliance Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments
  • Zip Security Raises $13.5 Million in Series A Funding
  • Ransomware Group Claims Attack on Belk
  • North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign
  • MITRE Unveils AADAPT Framework to Tackle Cryptocurrency Threats 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments
  • Zip Security Raises $13.5 Million in Series A Funding
  • Ransomware Group Claims Attack on Belk
  • North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign
  • MITRE Unveils AADAPT Framework to Tackle Cryptocurrency Threats 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News