• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Intesa Sanpaolo Data Breach Update

    Intesa Sanpaolo Missed Unauthorized Access for 2 Years, Regulator Reveals

    Hasbro cyberattack

    Hasbro Discloses Cyberattack After Unauthorized Network Access Detected

    Stable Channel Update

    Google Chrome Update Fixes 21 Flaws, Warns of Actively Exploited Vulnerability

    Mercor cyberattack

    AI Startup Mercor Hit by Supply Chain Attack Linked to LiteLLM

    Axios npm Supply Chain Attack, Supply Chain Attack, Axios, npm Package, GTIG, CTI, North Korea, Lazarus Group, Lazarus

    North Korea’s Lazarus Group Behind the Axios npm Supply Chain Attack

    Axios supply chain attack

    Axios Supply Chain Attack Exposes Developers to Hidden Malware

    CareCloud data breach

    CareCloud Hit by Cyberattack, Probe Into Possible Data Exposure

    Intesa Sanpaolo data breach

    Intesa Sanpaolo Data Breach Exposes 3,500+ Customers, Draws €31.8M Penalty

    TCEinterview with Dr Priyanka Sunder scaled

    Cybersecurity Is a Calling, Not Just a Career — Dr. Priyanka Sunder (PD) on Women Leading the Charge

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    AVrecon, AVrecon Malware, Home Router, FBI, SocksEscort, Proxy Network

    FBI Warns of AVrecon Malware Targeting Network Devices Across 163 Countries

    Axios npm Supply Chain Attack, Supply Chain Attack, Axios, npm Package, GTIG, CTI, North Korea, Lazarus Group, Lazarus

    North Korea’s Lazarus Group Behind the Axios npm Supply Chain Attack

    CERT-UA, AGEWHEEZE, RAT, Remote Access Trojan, Government, Hospitals

    Hackers Impersonate Ukrainian CERT to Plant a RAT on Government, Hospital Networks

    Russian information operation

    Latvia Warns of Disinformation Campaign Targeting Baltic States

    Black Friday discounts

    30% of Retailers Fail to Show Accurate Discounts, EU Probe Reveals

    DSA child protection investigation

    Snapchat Faces EU Child Safety Probe Under Digital Services Act

    Foreign-Made Router, FCC Ban, FCC

    The FCC Just Blocked Every New Foreign-Made Router from the U.S. Market

    Iran Telegram malware

    Iran-Linked Hackers Use Messaging Platform to Target Dissidents and Journalists

    DarkSword, DarkSword iOS Exploit, GTIG, Google, Lookout, iVerify, Apple, iOS Exploit

    Multiple Threat Actors Exploiting a Six-Vulnerability iOS Exploit Kit Dubbed “DarkSword”

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Intesa Sanpaolo Data Breach Update

    Intesa Sanpaolo Missed Unauthorized Access for 2 Years, Regulator Reveals

    Hasbro cyberattack

    Hasbro Discloses Cyberattack After Unauthorized Network Access Detected

    Stable Channel Update

    Google Chrome Update Fixes 21 Flaws, Warns of Actively Exploited Vulnerability

    Mercor cyberattack

    AI Startup Mercor Hit by Supply Chain Attack Linked to LiteLLM

    Axios npm Supply Chain Attack, Supply Chain Attack, Axios, npm Package, GTIG, CTI, North Korea, Lazarus Group, Lazarus

    North Korea’s Lazarus Group Behind the Axios npm Supply Chain Attack

    Axios supply chain attack

    Axios Supply Chain Attack Exposes Developers to Hidden Malware

    CareCloud data breach

    CareCloud Hit by Cyberattack, Probe Into Possible Data Exposure

    Intesa Sanpaolo data breach

    Intesa Sanpaolo Data Breach Exposes 3,500+ Customers, Draws €31.8M Penalty

    TCEinterview with Dr Priyanka Sunder scaled

    Cybersecurity Is a Calling, Not Just a Career — Dr. Priyanka Sunder (PD) on Women Leading the Charge

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    AVrecon, AVrecon Malware, Home Router, FBI, SocksEscort, Proxy Network

    FBI Warns of AVrecon Malware Targeting Network Devices Across 163 Countries

    Axios npm Supply Chain Attack, Supply Chain Attack, Axios, npm Package, GTIG, CTI, North Korea, Lazarus Group, Lazarus

    North Korea’s Lazarus Group Behind the Axios npm Supply Chain Attack

    CERT-UA, AGEWHEEZE, RAT, Remote Access Trojan, Government, Hospitals

    Hackers Impersonate Ukrainian CERT to Plant a RAT on Government, Hospital Networks

    Russian information operation

    Latvia Warns of Disinformation Campaign Targeting Baltic States

    Black Friday discounts

    30% of Retailers Fail to Show Accurate Discounts, EU Probe Reveals

    DSA child protection investigation

    Snapchat Faces EU Child Safety Probe Under Digital Services Act

    Foreign-Made Router, FCC Ban, FCC

    The FCC Just Blocked Every New Foreign-Made Router from the U.S. Market

    Iran Telegram malware

    Iran-Linked Hackers Use Messaging Platform to Target Dissidents and Journalists

    DarkSword, DarkSword iOS Exploit, GTIG, Google, Lookout, iVerify, Apple, iOS Exploit

    Multiple Threat Actors Exploiting a Six-Vulnerability iOS Exploit Kit Dubbed “DarkSword”

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

Navigating Unknown International Calls on WhatsApp: The Rise of Sextortion Scams in India

An unsuspecting victim found himself entangled in a digital nightmare soon after he received a video call on WhatsApp from an unknown international number

Ashish Khaitan by Ashish Khaitan
May 12, 2023
in Features, Firewall Daily
0
WhatsApp scams
725
SHARES
4k
VIEWS
Share on LinkedInShare on Twitter

Answering a WhatsApp call from an unknown international number… That’s all it took for a 30-year-old man from Mumbai to lose 0.3 million rupees.

That’s how easy it is for scamsters to extort money in the latest WhatsApp scams, targeting unsuspecting WhatsApp users in India. 

In the past weeks, many users of the messaging platform have fallen victim to the WhatsApp sextortion scam, which seems to have been spreading throughout the India. 

WhatsApp Sextortion Scam, WhatsApp scams

The perpetrators behind the WhatsApp sextortion scams are the masters of deception, deploying a simple yet effective tactic—a captivating profile picture of an alluring woman. The visual lures innocent victims into the web of deception, scams, and misery. 

WhatsApp scams: What happens when you get a WhatsApp call from unknown international numbers?

In one such incident, an unsuspecting victim Ravi (name changed to protect their identity), found himself entangled in a digital nightmare soon after he received a video call on WhatsApp from an unknown international number.

Intrigued by the caller’s profile picture of a seemingly attractive woman, the 23-year-old answered the call. Little did Ravi know that this one phone call would leave him regretting every unknown call he had ever answered.

report-ad-banner

WhatsApp Sextortion Scam, WhatsApp scams

Instead of a friendly conversation, Ravi was greeted by a digital background and a morphed voice instructing him to check his WhatsApp messages.

On checking those, Ravi was left aghast to find a series of obscene images and videos in his chat, all doctored to appear as though he was the subject.

WhatsApp Sextortion Scam, WhatsApp scams

And then, the nightmare began!

The anonymous caller demanded a ransom in exchange for not spreading this damaging material online or to his contact list. Overwhelmed by fear and anxiety, Ravi complied with the demand, becoming a victim of a malicious WhatsApp sextortion scam.

Unfortunately, Ravi is not the only one who fell victim to the scam.

Amit (name changed), a young professional, also faced a similar situation on WhatsApp.

Unlike Ravi, Amit assumed the WhatsApp international call to be from one of his clients from the US. On answering the call, Amit waited a while thinking there might be some connectivity issues.

Soon after, Amit received a video on his WhatsApp chat. On opening those, he felt the blood drain from his face as the video was a morphed version featuring him in explicit scenarios.

The unknown caller demanded a ransom, threatening to leak the video online if the payment wasn’t made.

To prevent the video from going public, Amit sent the requested amount. He then rushed to the nearest police station to report the incident. The police, having dealt with such cases before, redirected him to the main office of the cyber cell.

At the cyber cell, Amit learned that there were many like him who too were a victim of the WhatsApp scams.

While Amit assumed that the worst was over, it clearly was not. The very next day, Amit was terror-struck when he received a friend request on Facebook from an account matching the Truecaller ID of the attacker, highlighting the extent of the cyber threat he was facing.

Amit’s experience underlines the pervasive nature of these sextortion scams and the importance of implementing the recommended WhatsApp security settings.

A growing number of users across India have reported receiving calls from unknown international numbers, often accompanied by a profile picture of an attractive woman. Upon answering these calls, users find themselves ensnared in a similar sextortion scam.

If you suspect you are a victim of such a scam, it is crucial to report the incident to local authorities and the cyber cell promptly.

Unravelling the WhatsApp scams and possible fixes

WhatsApp Sextortion Scam

The enigma of these WhatsApp scams solely lies in the victim’s fear as they pursue them with fake information and use the built-up anxiety to extort money from them.

The dark corners of the internet are still hidden from regular users as they propagate on the dark web. However, the WhatsApp scams has made its way into the Indian WhatsApp market, with multiple users reporting about the same.

The WhatsApp sextortion scams take a new turn when the attacker initiates contact with the victim and engages in friendly conversation to establish trust.

Gradually, the scammer lures the victim into sharing intimate photos or engaging in explicit conversations.

Once the scammer obtains compromising material, they turn the tables on the victim. They threaten to expose the explicit content to the victim’s family, friends, or colleagues unless a ransom is paid.

This creates immense emotional distress and fear among the victims, leading some to comply with the scammer’s demands.

WhatsApp Sextortion Scam

To better understand how these WhatsApp scams work, it is important to check out how these scammers gain information about a specific individual.

In the initial phase of the scam, the perpetrator behind the computer uses the hidden realms of the internet known as the dark web or deep web. 

Within the dark web lies illegal criminals and businesses that stomp the foundation of human rights.

The dark web is the home of all illegal online activities, including but not limited to the trade of personal data, selling and buying company access, artillery, unsetting livestreams, and even the sale of drugs. 

In the cybersecurity world, whenever data breaches occur, a multitude of individuals find their personal information, such as emails, phone numbers, and credit card details, up for sale in these obscure corners.

Opportunistic hackers purchase this data trove, employing it as a foundation for fraudulent activities like WhatsApp scams.

The information being sold, often in large quantities, encompasses not only login credentials but also sensitive financial data.

Armed with these details, hackers can identify potential targets, initiate contact, and orchestrate their deceptive schemes. This modus operandi elucidates why seemingly random individuals fall victim to these scams.

Nevertheless, various measures exist to assess whether your personal information has been compromised.

Websites like amibreached.com offer a means to input your email, phone number, or credit card details for verification against the dark web’s repositories. This process may look tedious, but it is a crucial step in fortifying your digital well-being. 

How to block international calls on WhatsApp and protect yourself from WhatsApp scams? 

WhatsApp Sextortion Scam

Protecting yourself against these WhatsApp sextortion scams requires more than luck. Because at the end of the day, we’re humans, and we always make errors. However, some quick mitigation techniques can be used to avoid getting into WhatsApp scams. 

A smarter approach to avoid this scam is to use some quick settings on your smartphone.

To begin with this security feature, one must access the WhatsApp security settings. If you’re unsure how to access it, fret not because we have devised an easy-to-follow guide below to help you counter these WhatsApp scams.

  1. Firstly, open WhatsApp on your device and click on the three dots. (available on the top-right corner of the screen)
  2. Select ‘Settings’ from the available options. 
  3. Tap on ‘Account’ and then click on ‘Security Notifications.’ 
  4. Now, enable the ‘Show Security Notifications.’ (This option will notify you if a contact’s security code changes)
  5. On the next step, click ‘Settings’ and select ‘Privacy.
  6. Under ‘Calls,’ select the ‘Silent Unknown Callers.’ (This will prevent unknown users from calling you)
  7. Now, go back to Groups, and select ‘My Contacts Only.
  8. That’s all you have to do is protect yourself from WhatsApp sextortion scams.

By following these steps, one can increase their WhatsApp security and effectively evade the perils of WhatsApp sextortion scams.

Also, remember that online threats come in all shapes and sizes. By continuously learning and adapting to new technologies, one can avoid shenanigans like these WhatsApp scams.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: WhatsApp Sextortion Scam
Previous Post

Anonymous Sudan Attacks UAE Banks: Cybersecurity Breach Raises Concerns

Next Post

Patch These 15 Industrial Control Systems Vulnerabilities, Urges CISA ICS Advisory

Next Post
CISA ICS Advisory

Patch These 15 Industrial Control Systems Vulnerabilities, Urges CISA ICS Advisory

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

AVrecon, AVrecon Malware, Home Router, FBI, SocksEscort, Proxy Network
Malware News

FBI Warns of AVrecon Malware Targeting Network Devices Across 163 Countries

April 2, 2026
Intesa Sanpaolo Data Breach Update
Cyber News

Intesa Sanpaolo Missed Unauthorized Access for 2 Years, Regulator Reveals

April 2, 2026
Hasbro cyberattack
Cyber News

Hasbro Discloses Cyberattack After Unauthorized Network Access Detected

April 2, 2026
Stable Channel Update
Firewall Daily

Google Chrome Update Fixes 21 Flaws, Warns of Actively Exploited Vulnerability

April 1, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information