Beware: Fraudsters sending I-T tax payment challan receipt via mail!

Now the Income-Tax Department has been encouraging taxpayers to file their returns online, email fraud is bound to proliferate and trap the gullible


It is probably a test mail as yet, but several people received a missive, ostensib

ly from the Indian Income Tax (I-T) department receipt for tax payment. The email id was a giveaway. And surprisingly, it uses '[email protected]' email ID for sending this spurious mail.



Two things, both I-T department and NABARD-National Bank for Agriculture and Rural Development, are separate entities with completely difference functions.


A mail, which bears an email id like this, "Income Tax Department " contains some text message and a link to "download and view your tax challan".


This not only is funny for those who know how the Income Tax department and its processes. The subject line of this fraud mail reads, "Your Tax Payment of INR 70,000 is Successful" and

 body text says, "Your recent tax payment is successful. The tax amount has been deducted from your netbanking access..


Please Follow the link below to download and view your Tax Challan." But more about the link later.


Basically, a challan is used for filing taxes, so why would anybody need it after the tax payment, and that too of INR 70,000. Read again INR 70,000. Nobody, at least no government body uses INR for rup

ees, which is denoted either Rs or with the new symbol.


Second clue about the fake nature of this mail is use of NABARD. As mentioned above, NABARD is an apex institution in India, which looks after the development of the cottage industry, small industry and vi

llage in

dustry, and other rural industries. NABARD refinances the financial institutions, which finances the rural sector. In short, NABARD has nothing to do with the Income Tax department and any individual taxpayer.


Third clue is the link, which the mail asks you to click in order to "download and view your Tax Challan". As mentioned above you do not need to download and view your tax challan, after making a tax payment! You get challan before paying your taxes, if any and not afterwards.


Now, coming back to the link. The link is related with an URL from TCRC Group. When clicked, it asks the user to download a .zip file, which probably may not be safe and contain malware or virus or a form seeking your personal details. So in any case, do not click on the link and download any file.


The domain is registered by one Noopur Patel from TCRC, with an address from Mumbai. Its telephone numbers are not in service. The registrant for this domain is, again a Mumbai-based entity. Both the owner and registrant of may be genuine, but someone may have been using their domain for this fake mail to host the so-called challan download.


The mail addresses you as "Dear Sir"; however, our own I-T Dept refers the taxpayer by full name like "Dear xxxxxxx xxxxxx xxxxxx".


Another point, the authentic email ID or server, our own I-T Dept uses is so the mail id would be like [email protected] and not like "Income Tax Department" .


Lastly, while the copyright shows as Income Tax Department, the signature image and links are used from NABARD with authentic link. In fact, except for the download link all other links used in this mail are authentic.


If you receive such mails, do not pay any heed and simply mark it as "spam" and press delete.  




5 Ways to Avoid Being a Cyber Theft Victim
Cyber security is not just a technical problem. It is a business risk that requires attention of a team including top management to ensure protection from cyber risks
There is no getting around it. Cyber threats are increasing. They will continue to do so. The world economy is slowing. The reason is emerging markets, including Russia and China. As other opportunities recede, talent will migrate to those areas that still provide employment. Since cyber theft is a growth industry in many of these countries, it will flourish as other sectors of the economy wilt. 
Besides as the industry matures it is becoming more efficient. It is segmenting and industrialising. It is not just a few talented programmer or über hackers practising their craft. Services provide everything from email design for ‘phishing’ campaigns to downstream money processing services.
To combat this problem the technology industry has created advanced software and hardware that are wonderful example of creative genius. Still no matter how high the walls, the defense still has to be manned by people. To insure that your firm will be protected there are five areas that require management’s attention.
Osaka castle was a wonder of its age. It was able to withstand a siege by one of Japan’s greatest leader, Tokugawa Ieyasu, in 1614. The secret of Osaka was defense in depth. There was not just one moat, but two. The same is true of any good cyber security system. It is not just the perimeter that needs to be defended, but the interior as well. You do not want the proverbial hard candy shell and an ooey gooey center.
The second important area has to do with the type of business. Cyber security spending has to match the security failures of your particular business. Do you have sales people that are constantly losing laptops on the road? Then full disk encryption is a necessity. Does your business have auxiliary devices like printers, digital scales or even medical equipment connected to your network? Just because these machines are not considered computers does not mean that cannot be used to compromise your information.
Third, has to do with the most important part of your cyber defense: people. When I was at Darden the UVa business school, there was a computer simulation of a failing business. The only input that actually helped save the business was more training for the employees. This is especially true for cyber security. People cause the vast majority of cyber breaches. Awareness of the tricks of social engineering can prevent circumvention of the rest of your security controls. 
Fourth, it used to be said that the only time that you wanted your name in the paper was when you were born, when you married and when you died. The advent of social networking has changed all that. Now your friends, relatives, business associates, Google, the NSA and every would-be cybercriminal knows who you are, where you are, what you ate for lunch. This is exceptionally valuable information if I want you to click on a link and infect your computer with malware. Less is more.
Finally, one of the best defenses is strategic, specifically strategic governance. Cyber security is not just a technical problem. It is a business risk. Like any other business risk it requires the attention of a team including top management. Enterprise risk management capability requires a larger focus than one specific area of expertise. To achieve the strategic goal it is necessary for all experts in any discipline to be multilingual. They have to understand other problems, but just as important is the ability to communicate in ways which other non-technical stakeholders can understand.
While it is impossible to eliminate this threat, especially as it metastasizes across industries and boarders. The risk can be substantially reduced if it is seen in context. It is not just a technical problem with a technical solution. It is a business problem that requires a management solution.
(William Gamble is president of Emerging Market Strategies. An international lawyer and economist, he developed his theories beginning with his first-hand experience and business dealings in the Russia starting in 1993. Mr Gamble holds two graduate law degrees. He was educated at Institute D'Etudes Politique, Trinity College, University of Miami School of Law, and University of Virginia Darden Graduate School of Business Administration. He was a member of the bar in three states, over four different federal courts and speaks four languages.)


IS destroys Triumphal Arch of Palmyra
The Islamic State (IS) militants destroyed the centuries-old Triumphal Arch of Palmyra, a Syrian official said.
The Triumphal Arch, which dates back to the second century AD, has been destroyed by the IS militants on Sunday, Xinhua news agency quoted Maamoun Abdul-Karim, the head of the Damascus Department of Antiquities and Museums, as saying.
"We were informed that the IS had booby-trapped the arch, but we never thought their madness will lead them to actually blowing it up because the arch held no religious signs or indications," he said.
The arch is significant because it is considered the entrance of the ancient city of Palmyra and one of its most beautiful icons and landmarks.
"We expect that the entire city of Palmyra will be destroyed. It's certain, they will destroy the entire city after they previously blew up two major temples, 10 tombs, and destroyed some relics in the city's museum," he said.
Since capturing it last May, the group destroyed Palmyra's military prison.
Palmyra contains the monumental ruins of a great city that was one of the most important cultural centres of the ancient world.
Disclaimer: Information, facts or opinions expressed in this news article are presented as sourced from IANS and do not reflect views of Moneylife and hence Moneylife is not responsible or liable for the same. As a source and news provider, IANS is responsible for accuracy, completeness, suitability and validity of any information in this article.


We are listening!

Solve the equation and enter in the Captcha field.

To continue

Sign Up or Sign In


To continue

Sign Up or Sign In



The Scam
24 Year Of The Scam: The Perennial Bestseller, reads like a Thriller!
Moneylife Magazine
Fiercely independent and pro-consumer information on personal finance
Stockletters in 3 Flavours
Outstanding research that beats mutual funds year after year
MAS: Complete Online Financial Advisory
(Includes Moneylife Magazine and Lion Stockletter)