CBI charge sheet against Mallya likely in a month, bank officials may be included

Agencies
September 16, 2018

New Delhi, Sept 16: Many senior bank officials who had dealt with loans given to liquor baron Vijay Mallya's Kingfisher Airlines may be named as accused in a CBI charge sheet which is likely to be filed within a month, sources said.

This would be first charge sheet in the case pertaining to loans of over Rs 6000 crore given to Kingfisher by a consortium of 17 banks led by State Bank of India which alone had an exposure of Rs 1600 crore.

The agency has already filed a charge sheet against Mallya last year in connection with a separate case related to Rs 900 crore pending loan given by IDBI bank in which senior officials of the bank were allegedly involved.

The CBI had registered two cases against Mallya related to the IDBI loans in 2015 and consortium loan in 2016.

Refusing to give names of the officials, the sources said the first phase of probe into loans given by a consortium of banks is almost complete and the charge sheet may be filed within a month while keeping the investigation open.

Both serving and retired senior officials of the banks including the State Bank of India who had handled Kingfisher Airlines loans may be named as accused in the charge sheet as the agency has gathered enough evidence against them on misuse of official position, they said. 

The top brass of erstwhile Kingfisher airlines including Mallya, its CFO A Raghunathan and other former senior executives will also be named as accused in the case, they said. 

They said the agency is also looking into the role of Finance Ministry officials who could have influenced the decision of the bankers but their role is still be evaluated.

During the probe, the agency has gathered enough evidence to show that Mallya allegedly diverted the loan funds from the purpose for which they were given, they said.

The agency in its FIR has alleged that State Bank of India and its consortium banks had advanced various credit facilities to Kingfisher Airlines Limited during the period between 2005 and 2010, they said.

During 2009-10, the company failed to meet its repayment commitments to the bank from which it had availed the credit facilities and Kingfisher Airlines did not keep its account with the consortium banks regular which became NPA, the FIR states.

The consortium banks, therefore, recalled the credit facilities and also invoked corporate guarantee of UBHL and personal guarantee of Mallya, it alleged.

Mallya deliberately did not repay the amount, outstanding dues payable by Kingfisher Airlines to consortium of banks, the sources said. 

It is alleged that there was a conspiracy among group companies promoter and unknown others to cheat the lenders, they said.

SBI has an exposure of Rs 1,600 crore to the airline. Out of this, the bankers, which recalled the loan in February 2013, could recover only around Rs 1,100 crore after selling pledged shares of UB Group companies.

Other banks that have exposure to the airline include Punjab National Bank and IDBI Bank (Rs 800 crore each), Bank of India (Rs 650 crore), Bank of Baroda (Rs 550 crore), Central Bank of India (Rs 410 crore).

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 26,2020

In a startling revelation, cybersecurity researchers have claimed that a hacker has posted personal details of nearly 2.9 crore Indian job seekers at one of the hacking forums on the Dark Web for free.

As part of the regular sweep over the Deep Web and Dark Web, researchers from cybersecurity firm Cyble came across an interesting item, where a threat actor posted 2.3GB (zipped) file on one of the hacking forums.

"The leak actually has a lot of personal details of millions of Indians Job seekers from different states," Cyble said in its blog on Friday.

This breach includes sensitive information such as email, phone, home address, qualification and work experience etc from job seekers spanning across states, from New Delhi to Mumbai and Bengaluru. 

Cybercriminals are always on the lookout for such personal information to conduct various nefarious activities such as identity thefts, scams, and corporate espionage.

"It appears to have originated from a resume aggregator service given the sheer volume and detailed information," it added.

Cyble indexed this information at ‘AmIbreached.com; – Cyble's data breach monitoring and notification platform.

Cyble researchers have identified a sensitive data breach on the dark web where an actor has leaked personal details of nearly 29 million Indian job seekers from various states. 

"Cyble's team is still investigating this further and will be updating their article as they bring more facts to the surface,” it said in a statement.

Cyble said it has acquired the leaked data. 

The same cyber security firm earlier exposed that Bengaluru-based edtech firm Unacademy was hacked.

According to Cyble researchers, nearly 22 million Unacademy user accounts were affected and the data was dumped and sold on Dark Web.

'We would like to assure our users that no sensitive information such as financial data or location has been breached," said Hemesh Singh, Co- Founder and CTO, Unacademy, in a statement.

In April, hackers sold personal data of a whopping 267 million Facebook users for just Rs 41,500 (approximately 500 Euros) that includes email addresses, names, Facebook IDs, dates of birth and phone numbers.

No passwords of the 267 million Facebook users were exposed by the hacker, according to Cyble.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 27,2020

May 27: At a time when India is struggling with the deadly coronavirus, huge swarms of locusts in many states has bought nightmares to the farmers.

Experts warn of extensive crop losses if authorities fail to curb the fast-spreading swarms by June when monsoon rains spur rice, cane, corn, cotton, and soybean sowing.

Locusts entered India after traveling from Africa through Yemen, Iran and Pakistan.

After massive devastation in Pakistan, t swarms of locusts entered India through Rajasthan and Gujarat. The number is so large that the farmers and authorities are feeling helpless in tackling the threat.

The situation has become more alarming as the locusts is spreading across the country at an extremely fast rate. After badly affecting the crops in Rajasthan, Gujarat, Maharashtra, and Madhya Pradesh, the swarm of locust have now entered Uttar Pradesh.

In Rajasthan alone, the locust attack has damaged 5 lakh hectares of crop and nearly 17 districts of Madhya Pradesh have also seen their terror. Earlier from May 2019 to February 2020, too, the locust swarms entered India several times.

Speaking on the current situation, Dr Ram Pravesh, District Agricultural Officer, Agra, Uttar Pradesh said the Department of Agriculture is working with farmers in dealing with the situation. He urged the farmers to inform their Mandal Krishi Adhikari if they require any help.

India's largest-ever locust attack was in 1993 when more than three lakh hectares of cultivated land were completely destroyed.

Earlier in 2020, farmers salvaged their wheat and oilseed crops from a previous locust scourge.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.