logo
Counterfeit Apple accessories worth ₹1.01 crore seized in Hyderabad's Jagadish market

Counterfeit Apple accessories worth ₹1.01 crore seized in Hyderabad's Jagadish market

The Hindu26-05-2025

A counterfeit racket selling Apple accessories was busted in Hyderabad's Jagadish Market, where four mobile shop owners were found passing off fakes as genuine. Officers from the Commissioner's Task Force (Central Zone), along with the Abids Police, carried out simultaneous raids and seized duplicate iPhone accessories worth ₹1.01 crore.
The accused have been identified as proprietor of Shree Mataji Mobiles Vikram Singh, Suresh Kumar Rajpurohit who runs R.G. Mobiles, Natharam Choudary of Rajaram Mobiles and proprietor of Sapna Mobiles Mohammad Sarfaraz.
'The men were procuring fake accessories from marketing agents in Mumbai. These items, complete with duplicate Apple logos and printed packaging, were sold to unsuspecting customers,' DCP Task Force Y.V.S. Sudheendra said.
Among the seized items were 156 airpods, 16 power banks, 430 Apple logo stickers, 295 adapters and adapter covers, 61 USB cables, 45 mobile phone batteries, and 1,430 silicone back covers.
Investigators confirmed that the shopkeepers were aware of the counterfeit nature of the goods and intentionally violated copyright laws to maximise profits. The raid took place on May 25 following credible intelligence. The accused and the seized material have since been handed over to the Station House Officer (SHO) of Abids Police for further legal proceedings.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Noida businessman dies as cabbie ‘falls asleep' & rams car into truck on DND Flyway
Noida businessman dies as cabbie ‘falls asleep' & rams car into truck on DND Flyway

Time of India

time19 hours ago

  • Time of India

Noida businessman dies as cabbie ‘falls asleep' & rams car into truck on DND Flyway

Noida: A city businessman who had booked a cab to go to Delhi airport at dawn died after the driver allegedly fell asleep and crashed into a truck. Rakesh Kumar, CEO of TechnoConcept India Pvt Ltd, had booked an Uber at 4am on June 11 to reach IGI Airport for a flight to Bengaluru. But the car allegedly crashed into a stationary truck on the DND Flyway within minutes of the trip. Kumar died on the spot. The family of the 59-year-old businessman has now accused the ride-hailing company of negligence. They claimed the company neither alerted them about the accident nor flagged a long halt in the trip. They also said the app showed a different destination after the crash. According to his daughter, Shriti Arora, both she and her mother received a crash notification from his iPhone around 4am. "We initially didn't understand what it meant. My mother tried calling my father several times. There was no response. I checked his location, and it showed he was still on the DND flyover," she told TOI. They rushed to the spot and found the car mangled under the rear of a tempo truck near the MCD toll. Passersby informed them that a man was trapped inside. "We found my father unconscious in the car, with no pulse," Arora said. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like 5 Books Warren Buffett Wants You to Read In 2025 Blinkist: Warren Buffett's Reading List Undo He was later declared dead at AIIMS Trauma Centre. The driver, Sudhir, who survived the crash, claimed a tyre burst led to the collision. But Arora said passersby told her the driver admitted he had fallen asleep. She has also shared photographs of the vehicle with all tyres intact with the police. One of the family's main grievances is Uber's silence. The company, they said, did not reach out after the accident. The app also displayed a destination change — from IGI Airport to AIIMS Trauma Centre — without explanation. The driver allegedly ended the trip around 11am, several hours after the crash. "The company should have noticed the unusually long halt," Arora said. "Instead, they did nothing until we went public on social media on June 15." Uber only responded after the family shared details of the incident online, eventually providing information about an insurance coverage. An FIR was filed at Delhi's Mayur Vihar Phase 1 police station under BNS sections 106 (causing death by negligence), a bailable offence, besides 281 (rash driving) and 125 (acts that endanger the life or personal safety of others due to rash or negligent behaviour). TOI tried to reach out to Uber but got no response.

Meity on alert to find Indian data in global breach; asks Cert-In to probe
Meity on alert to find Indian data in global breach; asks Cert-In to probe

Business Standard

time2 days ago

  • Business Standard

Meity on alert to find Indian data in global breach; asks Cert-In to probe

Taking cognizance of an alleged global data breach, the Union government is taking steps to identify the quantum of Indian data in it, it is learnt. In what is being considered one of the biggest breaches globally, user names, passwords, and other sensitive personal information of around 16 billion digital accounts were leaked recently. The Ministry of Electronics and Information Technology (Meity) has asked the Indian Computer Emergency Response Team (Cert-In) to seek an appropriate response from intermediaries, data centres, corporate bodies, and government organisations on the Indian data present in the global data leak and report back with details. 'Given the proportion of the global leak, it is very likely that the data of Indian citizens might be on the dataset,'' an official said. Cert-In is looking into it, he pointed out, adding that Indian firms too will have to look into it and report according to cyber incidents norms. Earlier this week, media reports suggested that data of nearly 16 billion accounts of Apple, Facebook, Google, GitHub, Telegram, and various government services were leaked. A Cybernews researcher team, led by Vilius Petkauskas, found, through an investigation beginning in January 2025, that the new records were scattered across 30 different databases and were most likely stolen by various infostealers. 'The datasets that the team uncovered differ widely. For example, the smallest, named after malicious software, had over 16 million records. Meanwhile, the largest one, most likely related to the Portuguese-speaking population, had over 3.5 billion records. On average, one dataset with exposed credentials had 550 million records,' Cybernews said in a report. Emails sent to Apple, Meta, Google and Microsoft did not yield any response on whether they had sent any instructions to users on the alleged breach, and if data of Indian users was also found in the said breach. 'While the exact nature of these leaks remains unclear as investigations unfold, the critical takeaway for users and enterprises alike is unequivocal: reactive password resets are no longer enough. Proactive adoption of strong multi-factor authentication (MFA), particularly biometric verification, is now essential. It creates a critical layer of security that stolen credentials alone cannot compromise,' said Vijender Yadav, co-founder and chief executive officer of cybersecurity firm Accops. In 2022, Meity had issued comprehensive guidelines on the timelines by which any cyber incidents would have to be reported to Cert-In, along with the details of the nature of the attack, the systems, the quantum of data compromised, and whether the users had been informed about the compromise of the datasets. As per the norms then issued, the ministry had also mandated that all companies should maintain a 180-day rolling log of all of their information technology and computer systems and keep that data within India. As and when demanded by Cert-In, this data would have to be furnished in cases of cyber incidents.

Cybersecurity nightmare: More than 16 billion passwords leaked in unprecedented data breach
Cybersecurity nightmare: More than 16 billion passwords leaked in unprecedented data breach

Indian Express

time2 days ago

  • Indian Express

Cybersecurity nightmare: More than 16 billion passwords leaked in unprecedented data breach

Cybersecurity researchers are claiming that they recently came across a massive database comprising more than 16 billion usernames and passwords, making it the largest data breach of all time. According to a new report from Cybernews, these leaked passwords are likely generated by various cybercriminals who used various infostealing malware to steal usernames and passwords. As it turns out, these login credentials were gathered from social media, corporate platforms, VPNs, developer portals and more. The researchers claim that they came across 30 exposed datasets of various sizes, which contained anywhere between tens of millions to more than 3.5 billion records with accounts from Google, Apple, Facebook, GitHub, Telegram and more. The report also claims that 'none of the exposed datasets were reported previously,' except for the one reported by Jeremiah Fowler, which contained more than 184 million passwords. 'This is not just a leak – it's a blueprint for mass exploitation. With over 16 billion login records exposed, cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing. What's especially concerning is the structure and recency of these datasets – these aren't just old breaches being recycled. This is fresh, weaponizable intelligence at scale', added researchers. And while these newly discovered datasets were only exposed online for a brief period of time using unsecured Elasticsearch and object storage instances, which was long enough for security researchers to uncover the dataset, but not learn who controlled them. The publication says that the majority of data leaked in the datasets contains 'a mix of details from stealer malware, credential stuffing sets and repackaged leaks.' And while there is no way to compare these datasets, they likely contain at least some duplicated information. This makes it hard to determine how many people were affected by the data breach. However, most of the data in these datasets followed a particular pattern, containing a URL followed by a username and a password. To those unaware, this is exactly how infostealing malware collects information and sends it to threat actors. The researchers also found that these huge datasets containing usernames and passwords are often used for phishing campaigns, ransomware intrusions, business email compromise and account takeovers. These exposed datasets also included tokens, cookies and metadata, which makes them dangerous for companies and services that lack multi-factor authentication. Also, some of these were simply named 'logins' and 'credentials'. If you think your system is infected by an infostealing malware, make sure to install a known antivirus and run a thorough security scan to remove it. Users can also make use of Google One's 'Dark Web Report' feature, which lets you check if your personal information has been leaked as part of a data breach or is available on the dark web. Also, make sure that you refrain from using common passwords like '12345678' and 'password' and instead use a combination of numbers and letters to keep your account secure. To give you a quick recap, datasets containing billions of passwords have previously found their way on the internet. Last year, researchers came across what they called the Mother of All Breaches, which contained more than 26 billion records.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store