Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack

Posted on July 14, 2025July 14, 2025 By CWS

A Pune-based car elements producer fell sufferer to a complicated man-in-the-middle (MITM) cyber assault, leading to a lack of ₹2.35 crore. 

The 52-year-old director of the corporate filed an FIR with the cybercrime police station after discovering that fraudsters impersonating executives from an Italian manufacturing agency had intercepted enterprise communications and redirected funds to fraudulent accounts.

Key Takeaways1. ₹2.35 crore loss, Pune auto elements agency defrauded by cybercriminals impersonating Italian manufacturing firm executives.2. Attackers used faux e mail area much like authentic Italian agency to intercept ₹3.1 crore machine buy communications.3. After receiving 25% advance cost, fraudsters claimed checking account points and redirected remaining funds to faux accounts.4. Fraud detected when Pune firm contacted real Italian gross sales government; FIR filed with cyber crime police.

E-mail Spoofing Intercepts Enterprise Communications

In line with the Indian Specific report, the cyber criminals employed superior e mail spoofing strategies to execute this enterprise e mail compromise (BEC) assault. 

They created a fraudulent e mail area that carefully resembled the authentic Italian firm’s area title, using what cybersecurity consultants time period “area spoofing” or “typosquatting.” 

The attackers intercepted communications between the Pune agency and the Italian producer throughout a authentic enterprise transaction for buying a press bending machine price 320,000 Euros (roughly ₹3.1 crore).

The fraudsters demonstrated refined social engineering expertise by monitoring the e-mail exchanges and gathering detailed details about the continued enterprise dealings. 

They leveraged this intelligence to create convincing proforma invoices that appeared an identical to authentic paperwork. 

This assault vector, categorized as an “on-path” assault, exploits the dearth of end-to-end encryption in commonplace e mail protocols and the absence of correct e mail authentication mechanisms like SPF (Sender Coverage Framework), DKIM (DomainKeys Recognized Mail), and DMARC (Area-based Message Authentication, Reporting & Conformance).

The assault reached its fruits when the Pune firm had already paid 25% of the machine price (₹75 lakh) in April and Might 2025. 

Earlier than the scheduled cost of the remaining 75%, the fraudsters despatched a misleading e mail claiming the Italian firm’s Milan-based checking account was quickly non-operational. 

The e-mail directed the sufferer to switch funds to an alternate account managed by the cybercriminals.

The Pune agency, failing to detect the delicate deception, secured a mortgage of ₹2.25 crore and transferred ₹2.35 crore to the fraudulent account in two separate transactions in the course of the first and second weeks of June 2025. 

The fraud was found solely when the corporate contacted the real Italian agency’s India-based gross sales government to verify the cost receipts.

Organizations are advisable to deploy multi-factor authentication (MFA), implement SSL/TLS encryption for all e mail communications, and set up DMARC insurance policies to forestall area spoofing.

The Pune and Pimpri Chinchwad cybercrime police stations have particularly suggested firms to conduct common safety audits of their e mail methods and supply cybersecurity consciousness coaching to accounting workers. 

Crucial suggestions embody verifying any modifications in cost directions via direct telephonic conversations and implementing a dual-approval course of for high-value transactions.

Examine reside malware habits, hint each step of an assault, and make quicker, smarter safety selections -> Strive ANY.RUN now 

Cyber Security News Tags:Attack, Auto, Crore, Firm, Loses, ManintheMiddle, Parts, Pune

Post navigation

Previous Post: New Interlock RAT Variant Distributed via FileFix Attacks
Next Post: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More

Related Posts

New Blitz Malware Attacking Windows Servers to Deploy Monero Miner Cyber Security News
Deep Dive into Endpoint Security Cyber Security News
Denodo Scheduler Vulnerability Let Attackers Execute Remote Code Cyber Security News
Threat Actors Employ Clickfix Tactics to Deliver Malicious AppleScripts That Steal Login Credentials Cyber Security News
OneLogin AD Connector Vulnerabilities Exposes Authentication Credentials Cyber Security News
Google Threat Intelligence Launches Actionable Technique To Hunt for Malicious .Desktop Files Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Practice Safe Torrenting
  • Wing FTP Server Vulnerability Actively Exploited
  • The Unusual Suspect: Git Repos
  • New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
  • Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Practice Safe Torrenting
  • Wing FTP Server Vulnerability Actively Exploited
  • The Unusual Suspect: Git Repos
  • New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
  • Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News