• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

16 Year Old Indian Hacker Busted for eBay Scam

June 17, 2008

Views: 16,678

[ad]

Looks like India has them moving into the hacking scene young, it’ll happen anywhere with decent network infrastructure and disparate levels of economy. Look at Eastern Europe and China as other examples, India though due to it’s outsourcing culture and plentiful legitimate jobs in the IT industry doesn’t seem to suffer so many problems with hacking.

I guess things might change though with the USD weakening and the World economy slowing down.

His face is cherubic and his mannerisms childish. But, when he talks to police officials, they find it hard to catch up with this whiz-kid. Ajay (16) is a perfect example of what parents should watch out for when they encourage their children to use computers. Being a teenager from a modest background, he wanted to achieve all the good things in life – right from the latest gadgets to a lavish lifestyle.

“His knowledge of the codes and payment gateways is as good as that of a professional hacker,” said a senior crime branch official who has been interrogating this teenager picked up from Mulund in Mumbai, involved in an online payment scam on eBay.

I don’t remember what exactly I was doing at 16 but I think it had something to do with BBS and was fairly advanced, it’s not a large leap of imagination for a 16 year-old to be doing these kind of things.

Paypal and eBay scams/fraud are pretty high on the list now as they are easy to pass off and you can just spend the money back online to buy the latest fashion items or gadgets which makes it very hard to trace.

Ajay was happy with the progress he was making in life and told the police he did not want to pursue college education as “it was useless for earning money”.

His life changed when he came in contact online with bigger hackers five months ago. He started visiting the forums meant for international hackers. One of the international sites with the tagline ‘We move the world to free’ attracted him. It was a gateway to a heaven where the CVV (customer verification value) numbers and personal details were available for a very cheap price.

The same website was being used by his Ahmedabad-based links for dealing on PayPal — a payment gateway — to purchase goods using someone else’s credit card number and bank account. Ajay used it wisely and never raised an alarm. He blames his ‘amateur’ associates of Ahmedabad for landing the whole gang in the police net.

It just shows, be very careful with your CVV number and be careful when using services like Paypal and eBay – sadly once again I think those reading here already are careful so it’s not the target audience for education.

Perhaps you can tell your friends and relatives they might be funding a 16 year olds haircut at Toni and Guy!

Source: Times of India – Thanks to Navin.

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Legal Issues, Spammers & Scammers Tagged With: credit-card-fraud, ebay, hackers, Legal Issues, paypal



Reader Interactions

Comments

  1. Navin says

    June 17, 2008 at 3:06 pm

    cheers!!:)

  2. chevalier3as says

    June 17, 2008 at 5:21 pm

    I’m really curious! how did in heck did he get caught !!
    I’ve heard a lot about Russian, Chinese Moroccan hackers, but never Indian ones, though they have some really good security experts, like the vbootkit guys, during the last year black hat conference!

  3. Navin says

    June 17, 2008 at 11:24 pm

    Yeah chevalier3as, the boot loader that got around Vista’s code-signing was by Indian’s -Nitin and Vipin Kumar of NV labs

    frankly, the thing is that in India, there’s no such thing as cyber laws!! Even though there is are cyber-crime cells in the police, most of them spend their day playing minesweeper!!(they don’t know abt hacking for nuts, ask them what ARP is and they’ll probably say american rat poison!!)

    So youngsters are able to get online and without supervision they get into trouble!! Here it wasn’t his mistake but his partner whose laptop revealed the scam…The kingpin’s laptop was found to be completely clean (or so the “police” has claimed)

    Try to read abt Ankit Fadia, who inspired many Indians to take up hacking( evn though many claim he simply used techniques freely available on the net)

  4. yom kiss says

    June 20, 2008 at 2:03 am

    cheers, we indians are getting up in light, shining brighter.

    ha-ha-ha

  5. grav says

    June 25, 2008 at 9:17 pm

    According to the article, it seems like he just bought on of the CVV’s and the accompanying personal info and just plugged in the “correct values.”

    Please correct me if I am wrong.

  6. lyz says

    August 13, 2008 at 11:25 am

    Thing here is… somebody is just using this kid. Indians should start working on their cyber laws before its too late.

  7. Navin says

    August 13, 2008 at 1:58 pm

    ++1
    As an Indian (and a proud one @ that)….. I totally agree…..

  8. lyz says

    August 13, 2008 at 2:24 pm

    Here in our country, we had a certain hacker that defaced a government website and was caught and convicted.

  9. Navin says

    August 13, 2008 at 2:39 pm

    and which country is tht?? The US??

    In india, government websites get dafaced on a regular basis….the government blames Turkey, CHina, ROmania etc etc….but simple Follow-The-Trail leads to Mumbai which is nowhere near anyof the mentioned countries :)

  10. lyz says

    August 13, 2008 at 3:24 pm

    Am from the Philippines.

    Same thing here. Government websites in all places are one of the most targeted by this hackers.

  11. NEO says

    August 30, 2008 at 7:31 am

    It is must for security issue. Much hacking is the only way to design a secure system. I’ve been designing a security glitch and I am supposing to test it from HACKERS. I think it is the only solution for hybrid security…NEO

  12. Navin says

    August 30, 2008 at 7:53 am

    @ Neo, hacking by itself is not illegal…..only when U hack into a server widout prior permission tht U get into trouble. Nowadays server admins are more open towards allowing people to test the security of their servers than in the past….but stealing data/frauding data etc are all definitely punishable offences

  13. lyz says

    August 30, 2008 at 12:12 pm

    and shall be punished by a thing called the “cyber law”

  14. emmason says

    December 23, 2008 at 5:30 pm

    hi am emmason by name and looking for a good hacker to work with i need Abbey login london if you can hack it mail me on [email protected] and please bi fast if you have it come let’s do business ok?

  15. Bogwitch says

    December 23, 2008 at 5:35 pm

    Wouldn’t that affect your potential career as a professional footballer?

    +27826281788

    Knob.

  16. navin says

    December 23, 2008 at 6:57 pm

    hahahaha

    ROFLMAO!!

    Good one bogwitch!!

  17. Vicky Verma says

    February 24, 2009 at 9:53 am

    I think that child is really a foolish guy.
    If he really have the knowlage about hacking then why he dont use it for his country?

    M also 16 year old and i also have a lot of hacking tips, but my aim is to do something for my country.
    After all India Is The Best.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

Views: 418

With more businesses running Linux in production—whether in bare metal, VMs, or containers—the need … ...More about Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 467

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 386

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 588

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Upload_Bypass - Bypass Upload Restrictions During Penetration Testing

Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Views: 556

Upload_Bypass is a command-line tool that automates discovering and exploiting weak file upload … ...More about Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Shell3r - Powerful Shellcode Obfuscator for Offensive Security

Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Views: 726

If antivirus and EDR vendors are getting smarter, so are the tools that red teamers and penetration … ...More about Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (228)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (233)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,294,320)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,085)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,621)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,681)
  • Password List Download Best Word List – Most Common Passwords (933,487)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,146)
  • Hack Tools/Exploits (673,293)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,157)

Search

Recent Posts

  • Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked) May 14, 2025
  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025
  • Upload_Bypass – Bypass Upload Restrictions During Penetration Testing May 5, 2025
  • Shell3r – Powerful Shellcode Obfuscator for Offensive Security May 2, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy