
"Hello, this is Microsoft Support"
The Indian Central Bureau of Investigation (CBI) announced the dismantling of a transnational cybercrime syndicate responsible for large-scale phone scams posing as technical support services.
Operation Chakra V, carried out on July 7, 2025, was part of an international investigation targeting a network that defrauded citizens in the UK and Australia.
Operation Chakra V, carried out on July 7, 2025, was part of an international investigation targeting a network that defrauded citizens in the UK and Australia.

"Hello, this is Microsoft Support"
According to the agency, one of the key nodes of the fraudulent infrastructure was located in Noida's Special Economic Zone.
Here, a fully operational fake call center named FirstIdea was identified and shut down. The center used advanced call-routing technology, malicious scripts, and VoIP infrastructure to mask the origin of calls and launch mass attacks on victims outside India.
As a result of the raids, two individuals were arrested, including one of the network's main operators.
Agents noted that the operation was planned with consideration for the time zones of the target countries, allowing them to catch the scammers during active calls – live conversations with victims were documented.
According to the CBI, the criminals posed as employees of major IT companies, including Microsoft. Victims were told their devices had been hacked, after which they were pressured into paying for unnecessary services to remove non-existent threats.
Here, a fully operational fake call center named FirstIdea was identified and shut down. The center used advanced call-routing technology, malicious scripts, and VoIP infrastructure to mask the origin of calls and launch mass attacks on victims outside India.
As a result of the raids, two individuals were arrested, including one of the network's main operators.
Agents noted that the operation was planned with consideration for the time zones of the target countries, allowing them to catch the scammers during active calls – live conversations with victims were documented.
According to the CBI, the criminals posed as employees of major IT companies, including Microsoft. Victims were told their devices had been hacked, after which they were pressured into paying for unnecessary services to remove non-existent threats.
The damage caused by this group in the UK alone has been estimated at over £390,000 (approximately $525,000).
According to the UK's National Crime Agency (NCA), more than 100 people were deceived into paying for "repairs" of their computers following false pop-up warnings about system infections. Criminals, masquerading as Microsoft representatives, extorted money for installing non-existent updates and solutions.
The investigation lasted about 18 months and involved collaboration between the CBI, NCA, FBI, and Microsoft itself. Thanks to international cooperation, not only was the criminal scheme exposed, but the IT servers used for call routing were also traced. The organizers employed number spoofing, and calls were routed through several countries to complicate tracking.
Meanwhile, Nikkei Asia reports that despite measures taken in other regions, there has been a rise in centers involved in cryptocurrency scams in eastern Myanmar. Sixteen suspicious facilities have already been identified this year, with construction continuing on eight more despite previous crackdowns.
According to the UK's National Crime Agency (NCA), more than 100 people were deceived into paying for "repairs" of their computers following false pop-up warnings about system infections. Criminals, masquerading as Microsoft representatives, extorted money for installing non-existent updates and solutions.
The investigation lasted about 18 months and involved collaboration between the CBI, NCA, FBI, and Microsoft itself. Thanks to international cooperation, not only was the criminal scheme exposed, but the IT servers used for call routing were also traced. The organizers employed number spoofing, and calls were routed through several countries to complicate tracking.
Meanwhile, Nikkei Asia reports that despite measures taken in other regions, there has been a rise in centers involved in cryptocurrency scams in eastern Myanmar. Sixteen suspicious facilities have already been identified this year, with construction continuing on eight more despite previous crackdowns.
The scale and technological sophistication of such crimes highlight the growing threat posed by transnational cyber schemes capable of operating globally and exploiting users' trust in well-known brands and technologies.
Key Points:
Scope of Fraud:
The group used VoIP technology to disguise call origins and targeted victims in the UK and Australia.
Estimated losses exceeded £390,000 ($525,000) in the UK alone.
How It Worked:
Scammers impersonated Microsoft support staff, claiming victims' devices were compromised.
They offered paid "technical support" services to fix fictitious issues.
Why It’s Dangerous:
Exploits trust in reputable brands like Microsoft.
Uses complex call-routing systems to obscure origins.
International Cooperation:
The investigation spanned 18 months and involved CBI, NCA, FBI, and Microsoft.
Operation Chakra V demonstrated successful global law enforcement collaboration.
Trends and Outlook:
Despite successes in India, similar operations persist in Myanmar, focusing on cryptocurrency fraud.
Cybercriminals increasingly adopt transnational strategies, necessitating stronger international cooperation.
What Users Should Do:
Be skeptical of unsolicited calls from "tech support."
Verify contacts independently using official numbers.
Use antivirus software to detect malicious scripts.
Avoid granting remote access to unknown parties.
Key Points:
Scope of Fraud:
The group used VoIP technology to disguise call origins and targeted victims in the UK and Australia.
Estimated losses exceeded £390,000 ($525,000) in the UK alone.
How It Worked:
Scammers impersonated Microsoft support staff, claiming victims' devices were compromised.
They offered paid "technical support" services to fix fictitious issues.
Why It’s Dangerous:
Exploits trust in reputable brands like Microsoft.
Uses complex call-routing systems to obscure origins.
International Cooperation:
The investigation spanned 18 months and involved CBI, NCA, FBI, and Microsoft.
Operation Chakra V demonstrated successful global law enforcement collaboration.
Trends and Outlook:
Despite successes in India, similar operations persist in Myanmar, focusing on cryptocurrency fraud.
Cybercriminals increasingly adopt transnational strategies, necessitating stronger international cooperation.
What Users Should Do:
Be skeptical of unsolicited calls from "tech support."
Verify contacts independently using official numbers.
Use antivirus software to detect malicious scripts.
Avoid granting remote access to unknown parties.
Operation Chakra V proved that even sophisticated transnational schemes can be dismantled with proper coordination. However, the growing prevalence of such crimes underscores the need for vigilance among users and enhanced cooperation among global authorities.
Every user must remember: if something seems suspicious, it’s better to verify than to become a victim.
Every user must remember: if something seems suspicious, it’s better to verify than to become a victim.
Report
My comments