Criminal logo

₹1.33 Crore Lost! How a Sophisticated Cyber Attack Duped a Mumbai-Based Company

Cyber Attack

By Zenpulse Published 12 months ago 4 min read

l landscape, businesses are increasingly vulnerable to cyber-attacks, particularly those that exploit the communication channels used daily. One of the most dangerous and subtle forms of cybercrime is the Man-in-the-Middle (MitM) attack. This type of attack occurs when a cybercriminal secretly intercepts or alters the communication between two parties who believe they are communicating directly with each other. A recent incident in Mumbai, where a chemical manufacturing company lost ₹1.33 crore due to a MitM attack, highlights the devastating consequences of this type of cyber fraud.

The Incident: A Closer Look

The incident occurred at an Andheri-based chemical manufacturing company in Mumbai. The company fell victim to a MitM cyber attack after the email accounts of two senior executives were compromised by cybercriminals. The attackers infiltrated the company’s email system, allowing them to monitor communications and alter messages between the company and its client. Through this manipulation, the fraudsters impersonated legitimate emails, leading the client to believe that they had received valid payment instructions. As a result, the client transferred ₹1.33 crore to an account controlled by the criminals. The fraud was only uncovered when the company did not receive the expected payment, prompting them to contact the client. It was only then that they discovered the scam, leading to a significant financial loss.

What is a Man-in-the-Middle Attack?

A Man-in-the-Middle (MitM) attack occurs when an attacker secretly intercepts communication between two parties. The attacker can eavesdrop on the conversation or manipulate the exchange of information without either party realizing it. In some cases, the attacker impersonates one of the parties involved, leading to significant damage. These attacks can occur in various forms, including email hacking, wiretapping, and session hijacking, where attackers gain access to data or communications in transit. The goal is often financial gain, but it can also be for espionage, sabotage, or other malicious purposes.

How the Attack Unfolded

The attackers’ method was sophisticated. They likely gained access to the email accounts of the company’s senior executives either through phishing or exploiting weak security protocols. Once inside the email system, the attackers monitored ongoing email threads between the company and its client. They then proceeded to alter payment instructions, providing fraudulent banking details to the client. Since the email appeared to come from trusted company executives, the client proceeded with the payment without suspicion. This subtle manipulation of email communication was the key factor in the success of the fraud.

By using an established communication channel, the attackers were able to take advantage of the trust built between the company and its client. Such trust is often a significant barrier to detecting these types of attacks, making it difficult for businesses to protect themselves from MitM fraud. This case serves as a reminder that hackers do not need to directly break into bank accounts or financial systems to carry out a successful cybercrime; sometimes, they only need to manipulate the way businesses communicate.

The Consequences for the Company

The financial impact of the fraud was severe. The company lost ₹1.33 crore, a considerable amount that could have been disastrous for its operations, especially if the company relied heavily on this client for revenue. However, beyond the financial loss, the company also faced a reputational crisis. Clients who are impacted by fraud lose trust in the businesses they deal with. Even if the company is not at fault, the incident could tarnish its reputation, leading to long-term damage to its relationships with other clients.

Moreover, incidents like these highlight vulnerabilities within an organization’s communication systems. If a company can be tricked by hackers posing as trusted employees, it is crucial to reconsider its security protocols to prevent further breaches.

Preventing Man-in-the-Middle Attacks

The devastating loss of ₹1.33 crore serves as a wake-up call for businesses, particularly regarding the importance of cybersecurity. To mitigate the risks of MitM attacks, businesses must adopt a range of preventative measures:

Secure Email Systems:

The most crucial aspect of mitigating MitM attacks is ensuring that email systems are secure. Businesses should use email encryption to prevent unauthorized access to sensitive information in transit. Encryption makes it much harder for hackers to read or alter email messages.

Two-Factor Authentication (2FA):

Implementing two-factor authentication (2FA) can add an extra layer of protection to company emails and financial systems. With 2FA, even if a hacker gains access to an employee’s password, they will still need a second form of verification (such as a text message or authentication app) to access sensitive systems.

Regular Security Audits:

Conducting regular security audits can help identify vulnerabilities within a company's systems. Through penetration testing and other audits, businesses can assess the strength of their defenses and patch any weaknesses before they are exploited by attackers.

Employee Training and Awareness:

Training employees to recognize the signs of phishing attacks and suspicious emails is crucial. Many MitM attacks begin with social engineering, where attackers use phishing emails or fake login pages to steal credentials. Employees should be taught to verify any unusual requests, especially those involving sensitive financial information.

Incident Response Plans:

It’s essential for companies to have a clear incident response plan in place. This plan should outline how to respond if a cyber attack occurs, including how to notify affected parties and steps to mitigate further damage. The faster a company can respond to a breach, the more likely it is to minimize the impact.

Conclusion

The MitM attack on the Mumbai-based company highlights the evolving nature of cyber threats and the devastating impact they can have on businesses. In an increasingly connected world, companies must recognize that cybersecurity is no longer optional. Robust measures like email encryption, two-factor authentication, and employee awareness are critical for preventing such attacks. As cyber threats continue to grow in sophistication, businesses must prioritize cybersecurity to protect themselves, their clients, and their reputations from harm.

fact or fiction

About the Creator

Zenpulse

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments (1)

Sign in to comment
  • Alex H Mittelman 12 months ago

    Wow! Can’t believe they got duped! Great work!

Find us on social media

Miscellaneous links

  • Explore
  • Contact
  • Privacy Policy
  • Terms of Use
  • Support

© 2026 Creatd, Inc. All Rights Reserved.