Introductio of Cybercrime in India: Cyber Means
Introductio of Cybercrime in India: Cyber Means
Introductio of Cybercrime in India: Cyber Means
As the technological development is on the rise by leap and limits in India, the vulnerabilities
connected with this growing cyberspace is evolving and its repercussion in the recent times
have been witnessed far and wide. With the increses in the tecnology cyber crime also rise. No
one is save on internet and special girls are not.
What is cyber-crime?
In the question's literal sense, cyber was a word coined by William Gibson in his 1984 fictional
novel 'Neuromancer'. Cyber is the prefix relating to the worldwide field of electronic
communication. Crimes, involving stealing, fabricating, leaking or circulating forbidden digital
information is collectively branched under the umbrella term cyber-crime. Cyber-crime is
classified broadly into three basic categories – data related crimes, physical crimes and
software crimes.
computer is an integral part of the criminal act. Computers are either victim of the crime or the
tool used in the crime or the witness in a committed crime. Corrupting operating system,
stealing data / information, disrupting functioning of computer are examples where computers
are victims. Credit card frauds, transaction of illegal goods via internet, software piracy fall under
the category or crimes where computer is the tool. While money laundering, drug trafficking,
transaction of records, bullet board systems, etc., fall under the third and final slot of computers
acting as witness to crime.( 👤 Balu Swaminathan, Additional Supdt. of Police (Retd)16 April 2017
10:15 PM)
Statistics. Cybercrime cases in India, registered under the IT Act, increased at a rate of 300
percent between 2011 and 2014. In 2015, there were 11,592 cases of cyber crime registered
in India.
TYPES OF CYBER CRIME
1) Hacking:- Technology can be used against us in the ways that we don't understand. Most of
people in our society have become expert user of technology but they have no idea how to
things are operate under the hood. It is true that people are using more the time of technology.
Through that they become expert users. In this the first cyber crime is hacking .it means that
any computer, device, informational system or networks are stolen. Through that they can miss
used the information or photographs of that person. Some time people are hack the someone
account after that they edit there photographs after that he or she is start black mailing that
person who's account is hacked in return they ask for money or anything else. Many people
complain against the culprit to catch it and police take serous action and punish it.
2) Virus dissemination: Virus is small software programs that damage the computer. A computer
virus is attach itself to a program or a file to unable to separate into one computer to another
computer living a inflation to one another it can damage the files and other important things of
computer. The virus dissemination means that it involves direct or search unauthorized access
to system by introducing malicious program.
3) Logic bombs: A logical bombs is a program which has deliberated been written or
modifying to produce result when certain conditions are met that are unexpected and
unauthorized legitimated user or owner of the software. Time bomb is a subclass of logic bomb.
4)Denial of service attack (dos): It means that being down the server flooding machine requests
in an attempt to over system also uses bots for tasks .
5) Phishing: - This type of attack involves hackers sending malicious email attachments or URLs
to users to gain access to their accounts or computer. Cybercriminals are becoming more
established and many of these emails are not flagged as spam. Users are tricked into emails
claiming they need to change their password or update their billing information, giving criminals
access. for e.g. if the hacker send a mail to the user it look like the formal mail if the user is
gone to check the mail and that mail written that we are check the information of you please
logging your account after that we can clarify it. If the user is logging in the given link his
account has been hacked by hacker. Then the hacker uses her all information or if he hacked
her bank account he will credit his all money.
6) Web jacking: - If any one forcefully or deliberately tries to take control of a website by
developing a method of cracking a password and later changing it. The actual owner of the web
site doesn’t have more control over what appear that wed site.
Attacker can to use this method are firstly creating the fake website and wait for the time victim
open the link created by him. When the page become on a screen with the message that the
web site they we looking for ha move to another address they are need to click on other link if at
all the victim click the given link that appear to the real website then he will redirect with the fake
page the social engineering tool gate already imported on the attack and all the information of
the website has been hacked by the hacker and used it for its beneficial to his or misuse the
website.
7) Cyber stalking: - It is also known as the use of the internet to sock or other electronic means
to follow someone. This term in inter changeably use with online harassment or online abused
.if a stalker is rejected by someone, mostly it is seen in girl cases. If a girl rejects any boy the
boy is not accept that he is rejected by someone then he is spot him everywhere.
8)Email bombing and spamming :-It is a form of Internet abuse which is perpetrated through the
sending of massive volumes of email to a specific email address with the goal of overflowing the
mailbox and overwhelming the mail server hosting the address, making it into some form of
denial of service attack. It is also known as letter bomb.
9) Cyber bullying:-It is when one is bulling in the forms of media, this could be social media, text,
message, snap chat, email etc. Because of cyber bullying can cause some or all of the
following; depression. He is posting negative, harmful or false or contact about someone else.
For e.g. if a child already in depression and there classmate also tease them through which he
goes to negative side and he is posting all the thing is negative in social media in instagram,
face book, snap chat etc.
10)Data diddling :-It mean that when the data is change before inserting into the computer or
after inserting into the computer with the help of some software and the data is entered is wrong
and it is also is a cyber crime .
11) Identity theft and credit card fraud:-Credit card fraud in which an individual uses someone
else's credit card and withdraw funds from the account. Some time the hacker hacked the bank
account and withdraws cash of the actual card, or by illegally obtaining the cardholder’s account
and personal information, including the card number, the card’s security number, and the
cardholder’s name and address. It is known as identity theft or credit card fraud.
12) Salami slicing attack: - It means the crime of stealing a large amount of money, by taking it
over a period of time in small amounts that are less likely to be noticed. For e.g. any company
has manufacture good and sold it but the retailer has sale more than that in the small amount
like 2, 3 Rs. And that make crore of Rs. But people have not aware.
13) Software piracy:-It is the unauthorized copying or distribution of copyrighted software .It is
such a profitable "business" that it has caught the attention of organized crime groups in a
number of countries. But people are doing this business to earn money and make lots of money.
But they know that they are doing illegal.
14) Cyber terrorism: - It is criminal who uses computer technology and the internet, especially to
cause fear and disruption. The deliberate, large-scale disruption of networks of computers,
especially of personal computers attached to the Internet, by means of viruses etc.
CASES OF HACKING
1) Surge in Facebook hacking: Six cases in two days
INTRODUCTION
Now-a-days most of the people are crazy and desire to become a hacker, hacking is not an art
that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course
the time. In simple, hacking is a technical skill of a person. So it is good to have some extra
skills or knowledge about hacking.
A hacker is someone who likes to play with electronics or computer systems. Hackers like to
explore and learn how computer systems work. They try to take advantage of vulnerabilities or
weakness of a software and hardware. Hacking is the process of getting unauthorized access to
a system, network or resources
BHOPAL:
BACKGROUND
This is a true store of Bhopal girl name has Anjali. She is a student pursuing engineering form a
reputed collage of Bhopal. She was a good student and enjoying her life. All things going good
but after some time her facebook account has hacked. A message from her friend on her
Facebook messenger gave Anjali. a shock of her life The hacker, posing as her friend, a student
of SGSITS Collage in Indore — wrote she received a friend request from a fake Facebook
account opened in Anjali’s name.
And the hacker posted a message to Anjali saying her nude photographs were posted on the
fake account and also attached a link with the message, asking her to check it herself. Terrified
and curious, Anjali clicked on the link and suddenly her Facebook account was hacked. When
she tried to login into the account again it notified a wrong password.
Subsequently, similar messages were sent to people added in friend list of Anjali’s Facebook
account and their accounts were hacked, too.
Anjali is not only victim of Facebook hacking. SHO Cyber Cell police station Bhopal Manish Rai
told TOI a sudden rise was seen in number of Facebook hacking cases in the city. Six cases of
Facebook hacking were reported at cyber cell in past two days in which girl aged 19-21 years,
all college students, were victimized by unidentified hackers. The accused sent malicious link
through Facebook messenger and hacked their account. Subsequently, hackers sent extortion
messages to members in their friend list.
After her account hacked the hacker demand for money of Rs. 2000 to Rs.3000.but she not
contemplate. And she go to police station and complain a file against hacker the hacker posing
as victim, demanded money from those on victim’s list. Luckily, none of those who received
message deposited the money in account number given by hacker. In two . cases, hacker even
sent extortion message. All victims in such frauds were highly qualified, but were making silly
basic mistakes, which exposed them to threats on internet.
Action taken
Section 43 and section 66 of the IT Act cover the civil and criminal offenses of data theft or
hacking respectively.
BACKGROUND:
This is a case on 10 august 2018, in Pune. Pune-based Cosmos cooperative bank, which ranks
among the city's oldest urban cooperative banks. In a major cyber attack, hackers have stolen
Rs. 94 crore by hacking into the ATM switch server of the cosmos in pune.The hackers stole
details of multiple visa and repay debit card owners. The hackers carry out around 2841
transaction worth about Rs. 2.50 crore. Suhas Gokhale, an official from the bank's head office
on the Ganeshkhind road here, has lodged a complaint with the Chatushrungi police on Monday
night after the fraud came to light.
The hacker didn’t stop here after 2 day he again starts the same thing. On August 13, the
hackers transferred Rs 13.94 crore to an account in a Hong Kong-based bank by initiating swift
transaction system of the Cosmos Bank. The bank has lost Rs 94 crore within two days. We
have registered the offence under the Information and Technology Act and are investigating.
The complaint stated that on August 11, unidentified hackers stole information of the bank's
VISA and Rupay card customers through malware attack on it's ATM (switch) server and
siphoned Rs 80 crore through 14,849 transactions.
"Of these, 12,000 transactions were made through VISA cards and Rs 78 crore were
transferred out of the country while Rs 2 crore were transferred through Rupay card within the
country with 2,849 transactions," said an officer from Chatushrungi police.
The officer said, "On August 13, the hackers transferred Rs 13.94 crore to an account in a Hong
Kong-based bank by initiating swift transaction system of the Cosmos Bank. The bank has lost
Rs 94 crore within two days. We have registered the offence under the Information and
Technology Act and are investigating."
Hackers cloned several thousand cards of different account holders of the Cosmos Bank and
shaved off the reported amount.
According to a bank official, preliminary probe shows that the hacking activity seems to have
originated from Canada.
"We have filed a complaint and are also taking help from the National Payments Corporation of
India (NPCI) and the RBI to see what can be done," said Krishnakumar Goyal, a director of the
co-operative bank.
He added that no customers were affected and the bank has been put to a loss because the
money was withdrawn from a pool account.
He said the hackers designed a "parallel system," to the NPCI system and self-approved those
transactions. According to him, the bank has shut down the servers and put a block on its
internet banking transactions.
Goyal added that most of these customer accounts did not even have the requisite balance that
was withdrawn from each account.
Action taken
The bank has also registered an FIR at the Chatushringi police station in the city. A case was
registered under sections 43, 65, 66(C) and 66 (D) of the Information Technology Act and
relevant sections of the Indian Penal Code.
When asked about the recovery of the amount, Kale said the malware attack was not against
any bank but against the banking system and was done at international level in a very
"coordinated way".
"Since a lot of countries are involved, getting the money getting the money back will completely
depend on coordinated efforts of all the agencies," he said.
He said that the actual loss to the bank will be known only after reconciliation with Visa and
Rupay.
INDORE:
Crime branch of Indore police on Sunday arrested a man who had been hacking into the
Facebook accounts of women, sending them obscene pictures and uploading the pictures
through their hacked accounts. Police had received more than six complaints against the
accused.
The hacker, 36-year-old Dilip, resident of Jagrati Nagar, was booked under relevant sections of
the IPC and IT Act. At first, he did not accept the crime, but when he was showed the technical
evidences by police he admitted to infiltrating the web app through his mobile phone.
Police said Dilip had been using VIP numbers to open FB accounts of several women. The
victims had complained that their accounts were hacked and the accused was trying to send
messages to them on their friend list He asked them to maintain physical relations with him and
the retuned to make their personal pictures viral on social media. This was his motive behind
the crime. He had been committing the crime for the past three months, said police.
He told police that he was travelling in a train once when he saw a man trying to log in to
accounts of unknown persons by entering random mobile numbers and combination of
passwords. He followed the same procedure and managed to log on to six account These
people did not come to know that their account had been hacked until the accused started
sending them messages.
The accused told police that he has studied till Class VIII and lives in Sindhi Colony of the city.
He owns a footwear shop in the city.
“We appeal to the women in the city to approach us if they face any such problems. Don’t fall
prey to such cyber bullies and do not meet them in person,” said ASP crime branch Amrendra
Singh.
ACTION TAKEN
He was arrested and Section 43 and section 66 of the IT Act cover the civil and criminal
offenses of data theft or hacking respectively.
https://timesofindia.indiatimes.com/city/indore/facebook-hacking-sept-2-man-arrested-
for-hacking-into-fb-accounts-of-six-women/articleshow/65649374.cms
CASES OF PHISHING
UTI Bank is a leading private bank in India enjoying its promotion by Unit Trust of India (UTI),
the country's largest financial institution. Cyberspace fraudsters have again embarked on their
criminal act. And, this time they've come down on the website of UTI Bank through
a phishing attack. UTI Bank is a leading private bank in India enjoying its promotion by Unit
Trust of India (UTI), the country's largest financial institution.
The phishes have crafted a URL on Geocities that is nearly a copied version of the Bank's home
page and are circulating it through e-mail link. The web page asks for several personal
information of the user such as username, transaction login and passwords. In addition it has
also inserted disclaimer and security hazard notes.
As soon as an unwary account holder submits his login id, password, transaction id and
password as asked by the spurious bank web page, all that information gets transmitted to the
phishes(s).
According to ZDNet's news published on January 15, 2007 the President - IT, UTI Bank. Mr. V.
K. Ramani said that the bank was planning to close its site. They have also kept customers in
the loop while they are processing the initiative.
The security department of the UTI Bank has reported that the phishes have sent e-mails to
more than 100,000 account holders of this bank and other. Though the bank has launched
damage control processes, none of them is entirely free from being harmed.
According to Ramani the bank has no way to differentiate between fraud and legitimate users
who log in with correct user information. However, there's so far no confirmation of losses from
this particular attack.
There have been earlier incidents of phishing attacks too, on UTI customers. The last was in
December 2006. At that time Delhi police caught four Nigerian nationals along with an Indian
for robbing Rs.20,00,000 off 30 customers. The fraud surfaced and came in notice when a
certain UTI account holder found a contradictory entry in her account.
There were 86 phishing attacks in 2005 that doubled to 200 in 2006, as per data of Computer
Emergency Response Team, India. Most banks across the country have posted alerts on their
websites. Many have even set up campaigns to caution investors against such phishing attacks
Action taken
He was arrested and Section 66A and section 67 of the IT Act cover the civil and criminal
offenses of data theft or hacking respectively.
http://www.tezu.ernet.in/wsc/pdf/notes/W03-Cyber-crime
https://www.vakilno1.com/legal-news/cybercrime-in-india
http://digitalpresense.com/guest-articles/all-about-cyber-crimes--it-act-and-ipc