# Fraud/Fake Website
## Common Services Centre
As I noticed last time, Common Services Centre (CSC) is the registrar. **BUT** I had no idea about this [Diginame](https://www.diginame.in/) initiative by CSC:

This seemingly allows anyone to register a domain with CSC. Seeing CSC as the registrar adds some legitimacy if you try to look details about the domain:

## Google Ads
[Google Ads Transparency Center](https://adstransparency.google.com/advertiser/AR06802116607788187649?origin=ata®ion=IN) is no longer showing any running ads by this profile:

This could happen because of the following reasons:

However, if you are certain that you have the correct profile in your [Google Docs](https://docs.google.com/document/d/1qb9rO3ROomsraNZBsKhLpO6G85cn8aMytKAFVojVQR4/edit?tab=t.0), then this Vijay Barbhaya guy could be invovled, either knowingly or otherwise.
One good thing is that Google says that the profile was verified:

It is still possible that his ID was misused, or that he never expected anyone to look for him.
### Vijay Barbhaya
Interestingly, this looks like a unique name, and searching his name brought me to https://about.me/vijay.barbhaya

He is a freelance web developer, who works with WordPress (a2simplybettermilk.in) and PHP (a2simplybettermilk.in and globaltechsolutionsinc.in).
Coincidence? Maybe, but very suspicious IMO. He could be an innocent person here, I am just sharing the info that I came across, and all this is already public.
## Payment Gateway
The second site or domain involved in this fraud is globaltechsolutionsinc.in, where you see a fake Razorpay form:

This entire form is fake and has nothing to do with Razorpay. The amount you see is controlled by a POST request parameter:

You can simply modify this parameter to change the value:

This is done for 2 reasons based on my experience:
1. If you report the site for fraud/phishing, person processing the report would never see the form:

2. Developer can make many fake sites/products and just modify the POST parameter to change the price to whatever they want the victims to see.
### Logging
Any person who is willing to try the form **MUST BE CAUTIOUS** not to enter any real information. The website is sending every field change to the backend, basically creating a keylogger for the form:


This goes on for each update:


The second form you see for OTP, also does the same logging:


Continue button has no role, scammer already has all your info, including OTP. At this point you are just waisting your time trying to enter the "correct OTP".
Example URL: https://globaltechsolutionsinc.in/s/api/rozorpay-secure-pay/aHR0cDovL2xvY2FsaG9zdC90ZXN0Lw
How to reproduce: https://files.catbox.moe/hop415.mp4 or https://gofile.io/d/KQ7g0U