ODFC Investigation: Free Fire Garena Phishing, PUBG UC Sellers, CODM Activision Deepfakes & Ludo King RNG Hacks

 

⭕ ODFC.App has uncovered online gaming ecosystems—spread via social engineering on Instagram, Facebook, WhatsApp, and Telegram—as key conduits for advanced digital fraud.



Case examples from ODFC reports:


📌 Free Fire Recruitment Scams:

Scammers pose as Garena scouts on Telegram, offering "clan trial slots" for "entry fees" via UPI QR phishing or GPay redirects. Victims share OTPs for "verification," enabling SIM swaps that drain gaming wallets via micro-transactions. They then push RAT-laden "optimizer APKs" to steal session tokens for account takeover (ATO).


📌 PUBG Mobile/BGMI Pro Trials:

Fraudsters fake UC sellers on Instagram Reels, baiting with "pro squad invites" needing "kit deposits" through crypto tumblers or Paytm proxies. After payment, they use shared biometric "team apps" to drain Royale Pass wallets or sell skins on black markets. Telemetry reveals VPN-chained C2 servers hiding locations.


📌 Call of Duty Mobile Esports Lures:

Impostors mimic Activision on Discord, selling "CODM World League tryouts" with "registration bonds" via PhonePe. They bundle deepfake "analyzer tools" with keyloggers to grab Battle Pass credentials and COD Points for resale. Variants use eSIM burners to dodge KYC.


📌 Ludo King Cash Tournament Fraud:

Fake "high-stakes Ludo leagues" on WhatsApp demand "table buy-ins," then rig RNG via script injection. Screen-share "fair play" links allow clipboard hijacking of UPI PINs. ODFC flags polymorphic phishing mimicking Moonfrog Labs.


If you're victimized, contact immediately:


🌎 ODFC Cyber Helpdesk  

🎯 24/7 Chat @odfchelpdesk


⭕ ODFC.App  

📩 cybercrime@odfc.co.in  

🪀 WhatsApp +91-8779696580  


ODFC 🇮🇳 UT √ WhatsApp Chat 💬 8850585672

Name

Email *

Message *