Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack

Posted on July 14, 2025July 14, 2025 By CWS

A Pune-based car elements producer fell sufferer to a complicated man-in-the-middle (MITM) cyber assault, leading to a lack of ₹2.35 crore. 

The 52-year-old director of the corporate filed an FIR with the cybercrime police station after discovering that fraudsters impersonating executives from an Italian manufacturing agency had intercepted enterprise communications and redirected funds to fraudulent accounts.

Key Takeaways1. ₹2.35 crore loss, Pune auto elements agency defrauded by cybercriminals impersonating Italian manufacturing firm executives.2. Attackers used faux e mail area much like authentic Italian agency to intercept ₹3.1 crore machine buy communications.3. After receiving 25% advance cost, fraudsters claimed checking account points and redirected remaining funds to faux accounts.4. Fraud detected when Pune firm contacted real Italian gross sales government; FIR filed with cyber crime police.

E-mail Spoofing Intercepts Enterprise Communications

In line with the Indian Specific report, the cyber criminals employed superior e mail spoofing strategies to execute this enterprise e mail compromise (BEC) assault. 

They created a fraudulent e mail area that carefully resembled the authentic Italian firm’s area title, using what cybersecurity consultants time period “area spoofing” or “typosquatting.” 

The attackers intercepted communications between the Pune agency and the Italian producer throughout a authentic enterprise transaction for buying a press bending machine price 320,000 Euros (roughly ₹3.1 crore).

The fraudsters demonstrated refined social engineering expertise by monitoring the e-mail exchanges and gathering detailed details about the continued enterprise dealings. 

They leveraged this intelligence to create convincing proforma invoices that appeared an identical to authentic paperwork. 

This assault vector, categorized as an “on-path” assault, exploits the dearth of end-to-end encryption in commonplace e mail protocols and the absence of correct e mail authentication mechanisms like SPF (Sender Coverage Framework), DKIM (DomainKeys Recognized Mail), and DMARC (Area-based Message Authentication, Reporting & Conformance).

The assault reached its fruits when the Pune firm had already paid 25% of the machine price (₹75 lakh) in April and Might 2025. 

Earlier than the scheduled cost of the remaining 75%, the fraudsters despatched a misleading e mail claiming the Italian firm’s Milan-based checking account was quickly non-operational. 

The e-mail directed the sufferer to switch funds to an alternate account managed by the cybercriminals.

The Pune agency, failing to detect the delicate deception, secured a mortgage of ₹2.25 crore and transferred ₹2.35 crore to the fraudulent account in two separate transactions in the course of the first and second weeks of June 2025. 

The fraud was found solely when the corporate contacted the real Italian agency’s India-based gross sales government to verify the cost receipts.

Organizations are advisable to deploy multi-factor authentication (MFA), implement SSL/TLS encryption for all e mail communications, and set up DMARC insurance policies to forestall area spoofing.

The Pune and Pimpri Chinchwad cybercrime police stations have particularly suggested firms to conduct common safety audits of their e mail methods and supply cybersecurity consciousness coaching to accounting workers. 

Crucial suggestions embody verifying any modifications in cost directions via direct telephonic conversations and implementing a dual-approval course of for high-value transactions.

Examine reside malware habits, hint each step of an assault, and make quicker, smarter safety selections -> Strive ANY.RUN now 

Cyber Security News Tags:Attack, Auto, Crore, Firm, Loses, ManintheMiddle, Parts, Pune

Post navigation

Previous Post: New Interlock RAT Variant Distributed via FileFix Attacks
Next Post: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More

Related Posts

PLA Rapidly Deploys AI Technology Across Military Intelligence Operations Cyber Security News
Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users Cyber Security News
Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender Cyber Security News
Critical GitHub Copilot Vulnerability Let Attackers Exfiltrate Source Code From Private Repos Cyber Security News
Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers Cyber Security News
NCSC Warns of ‘UMBRELLA STAND’ Malware Attacking Fortinet FortiGate Firewalls Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise
  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise
  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark