Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » A Growing Threat to Digital Security, ETCISO

A Growing Threat to Digital Security, ETCISO

A Growing Threat to Digital Security, ETCISO

Amid a rise in Telegram-based scams affecting users across India, cybersecurity researchers have identified several concerning patterns. Fraud actors are increasingly using the platform’s encrypted channels to circulate fake investment opportunities, lottery claims, and job offers. These schemes often lead to financial losses, identity theft, and malware infections through phishing links and malicious files. Data from the Indian Cybercrime Coordination Centre indicates that more than ₹1,100 crore was lost to digital-arrest and investment frauds during the first half of 2025, with a notable share linked to Telegram bots and private groups posing as legitimate services.

Analysis from a malware research facility shows that scammers typically initiate contact through public Telegram channels using messages that promise high returns from cryptocurrency or stock trading. Victims are then moved into private chats, where pressure tactics escalate. These include fabricated proof of profits, deepfake videos, and repeated requests for urgent fund transfers. Investigators have also documented “pig butchering” operations, in which attackers build trust over extended periods before directing victims to scan QR codes that redirect UPI payments or download trojanized applications disguised as trading tools. Law enforcement recoveries, including a ₹50 crore seizure connected to a Telegram-linked sextortion network in Delhi, illustrate the scale and sophistication of these operations. Telegram’s end-to-end encryption can limit visibility into malicious activity, while its large user base in India—estimated at over 200 million accounts—creates opportunities for wide-scale targeting. A common misconception that private chats are inherently safe has contributed to increased exposure to account compromise, ransomware, and financial fraud. Ongoing monitoring shows that scam operators are now using AI-generated voices and cloned profiles to impersonate family members or officials, increasing the effectiveness of psychological manipulation.

Researchers note that technical controls at the device level can help detect suspicious behavior, such as malicious downloads or phishing payloads, before harm occurs. At the same time, user awareness remains critical. Cybersecurity advisories recommend treating unsolicited Telegram messages with caution, avoiding unknown links, QR codes, or file downloads, and verifying claims directly through official channels such as bank applications or government websites. Additional measures include enabling two-factor authentication, restricting unknown group invitations, and reporting suspicious accounts within the platform.

In cases of suspected fraud, users are advised to immediately secure financial accounts, report incidents via the national cybercrime portal, and preserve relevant digital evidence to support investigation and response efforts.

  • Published On Dec 19, 2025 at 09:05 AM IST

Join the community of 2M+ industry professionals.

Subscribe to Newsletter to get latest insights & analysis in your inbox.

All about ETCISO industry right on your smartphone!




Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket