Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Three UK Men Convicted for Fraud Site

September 3, 2024
Reading Time: 2 mins read
in News
Three UK Men Convicted for Fraud Site

Three men in the United Kingdom have been convicted for their roles in operating a fraudulent website that targeted banking security systems during the COVID-19 lockdown. The website was set up by Callum Picari, 22, from Hornchurch, Essex, Vijayasidhurshan Vijayanathan, 21, from Aylesbury, Buckinghamshire, and Aza Siddeeque, 19, from Milton Keynes, Buckinghamshire. The site, which began its operations in September 2019, provided criminals with a subscription-based service designed to bypass multi-factor authentication systems. By using automated bots to extract one-time passcodes from victims, the operation enabled fraudsters to access bank accounts and steal funds from unsuspecting individuals.

The National Crime Agency (NCA) seized the website in March 2021, following an investigation that began in June 2020. The subscription service offered by the website was tiered, with a basic plan costing £30 per week and a more advanced “elite plan” priced at £380 per week. The elite plan included access to Visa and Mastercard verification sites, making it a valuable tool for criminals seeking to evade banking security measures. Despite the severe impact of their actions, the NCA has not disclosed the total amount of money generated by the criminal enterprise.

The trio initially denied any wrongdoing, but they eventually pleaded guilty to charges of conspiracy to make and supply articles for use in fraud, with Picari also facing charges of money laundering. The NCA’s investigation revealed that Picari was the primary owner and developer of the website, which was advertised on a Telegram group with over 2,200 members. In response to a journalistic exposé on the operation, the group’s administrators attempted to erase incriminating evidence, including deleting Telegram conversations that discussed the site’s fraudulent activities.

Sentencing for Picari, Vijayanathan, and Siddeeque is scheduled for November 2, 2024, at Snaresbrook Crown Court. Anna Smith, operations manager at the NCA’s National Cyber Crime Unit, emphasized that the convictions serve as a stark warning to anyone involved in similar illegal activities. The NCA is committed to disrupting and dismantling websites that pose a threat to financial security and public trust. Smith also advised the public to remain vigilant against potential phishing scams and to verify any suspicious requests for personal information directly with the relevant organizations.

Reference:

  • Three UK Men Convicted for Running Fraudulent Website During COVID-19 Lockdown
Tags: AylesburyBuckinghamshireCallum PicariCovid-19Cyber NewsCyber News 2024Cyber threatsEssexHornchurchMilton KeynesNational Crime AgencySeptember 2024United KingdomWebsite
ADVERTISEMENT

Related Posts

Akira Ransomware Made 244 Million Dollars

Skripal Hacker Arrested In Thailand

November 14, 2025
Akira Ransomware Made 244 Million Dollars

Claude AI Linked To Chinese Espionage

November 14, 2025
Akira Ransomware Made 244 Million Dollars

Akira Ransomware Made 244 Million Dollars

November 14, 2025
UK Unveils Cyber Security Bill

Google Sues Text Message Scammers

November 13, 2025
Google Sues Cybercriminals Behind Lighthouse

Google Sues Cybercriminals Behind Lighthouse

November 13, 2025
Google Sues Cybercriminals Behind Lighthouse

Police Take Down Major Malware Operations

November 13, 2025

Latest Alerts

Imunify360 Flaw Puts Sites At Risk

Safery Extension Steals Crypto Wallets

ChatGPT Flaw Exposed Core Infrastructure

Firefox Chrome Fix High Severity Bugs

CISA Warns Of WatchGuard Fireware Flaw

Npm Package Targets GitHub Repos

Subscribe to our newsletter

    Latest Incidents

    Hackers Breach NY State Texting Service

    Doordash Hit By October User Data Breach

    Synnovis Reports Data Theft In Attack

    Hyundai Breach Risks Drivers Data

    Hackers Demand 200K From Doctor Alliance

    GlobalLogic Confirms Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial