u/InterestingMajor6841

How my mom almost lost ₹50,000 to a phone call — and why I built a cybersecurity platform for India

Six months ago someone called my mom.

Told her I had an arrest warrant. Smuggling case. Police arriving within the hour. ₹50,000 to settle it quietly. Right now.

She believed it completely. Was walking to her phone to transfer.

Right before she did she went to talk to my maternal uncle.

He said: "police kabhi WhatsApp pe digital arrest nahi karti. Ye fraud hai."

Two minutes. Done. ₹50,000 saved.

We got lucky. That conversation could have gone the other way.

The thing that actually bothered me:

My mom isn't careless. She handles all our finances. Sharp, careful, uses UPI daily.

But urgency + fear for her son + authoritative voice = her brain completely shut down.

She didn't need more awareness. She'd heard "don't trust unknown callers" a hundred times.

She needed to have experienced that pressure before in a safe environment.

That's a completely different problem. And nobody was solving it for India specifically.

So I built HackIQ.

Not a course. Not another awareness video.

A scenario-based platform where you go through real social engineering attacks before an actual scammer finds you.

  • Digital arrest calls
  • Fake KYC verification flows
  • UPI fraud traps
  • Courier scams

You make decisions in real time. Feel the pressure. Then get a breakdown of exactly where you were psychologically vulnerable and why your brain responded that way.

Core idea: awareness doesn't protect you. Muscle memory does.

Honest state right now:

Early. Genuinely early. Core scenarios are live but I'm figuring out the hard stuff.

This is where I actually need help from this community:

1. GTM B2C first or straight to B2B? Banks and corporates have obvious budget for security awareness training. But I feel like I need real individual validation before any enterprise conversation. Has anyone here made this call successfully?

2. Retention after the first scenario The "aha moment" happens once. How do you bring someone back? What made retention work for you in edtech or gamified products?

3. Pricing in Indian market People pay for entertainment easily. Safety? Much harder sell. How did you handle perceived value problems early on?

4. Measuring actual behavior change Completion rates are a vanity metric here. Real success is whether someone avoids a scam six months later. Anyone solved outcome measurement for a product like this?

What I need right now:

Beta users who will go through it and tell me where it breaks.

Not "looks great" feedback. The kind that makes me tear things down and rebuild them.

If you want access comment or DM me directly. No form. No waitlist. I'll share it personally.

And if something like this has happened in your family — digital arrest, fake CBI call, KYC fraud I'd genuinely like to hear it. Real Indian stories are what the scenarios are built from.

One thing building this taught me:

The cultural specificity of Indian scams is a real moat.

Digital arrest scripts in Hindi. Fake electricity department calls. KYC flows tailored to Indian banking. Courier scams using actual Indian logistics brands.

No Western cybersecurity product touches this. That gap is massive and it's only getting wider.

Whether HackIQ is the right execution that's what I'm figuring out right now.

If you've built in edtech, fintech, HR tech, or security what killed your early traction that you didn't see coming? Would genuinely value the conversation.

Building this because my family almost became a statistic.

reddit.com
u/InterestingMajor6841 — 18 hours ago

If I called you right now, said your name, your bank, your last transaction — and asked for an OTP in 30 seconds, would you actually stop yourself?

Be honest. Think about it for a second.

Because a trained social engineer does exactly this. And their success rate is terrifyingly high — even with educated, tech-aware people.

A friend told me this week: his mom got a call from someone claiming to be a TRAI officer. Said her number would be permanently disconnected in 2 hours due to "suspicious activity linked to her account." To avoid it, she just needed to confirm one OTP.

She's a retired teacher. Uses a smartphone daily. Watches the news. Knows about online scams in theory.

She gave the OTP.

₹1.1 lakhs gone.

---

Here's the thing that bothers me — we all think awareness is enough. But there's a difference between knowing scams exist and having a trained response when you're actually under pressure.

A doctor doesn't just read about emergencies. A pilot doesn't just watch crash videos. They simulate. They practice until the response is automatic.

Came across a platform called HackIQ that takes this approach to scam awareness — puts you through realistic scenarios so you're building actual reflexes, not just collecting facts. Feels like the right model. Because reading a list of "red flags" and recognizing a red flag in real-time while someone is pressuring you — those are two completely different skills.

---

Genuine question for this community:

Do you think online scam vulnerability is mainly an "older generation" problem — or are people our age (18–40, daily internet users, somewhat tech-savvy) just as exposed, just in different ways?

And if you've had a close call yourself — what actually almost got you?

reddit.com
u/InterestingMajor6841 — 6 days ago