CYBERCRIME IN INDIA

CYBERCRIME IN INDIA

CYBERCRIME IN INDIA

1. What are the Top 5 Cybercrime in India?

Cybercrime in India can take several forms, some of which you may not immediately associate with the word. For example, if the attacker plans to use the information stored on the device for personal gain, even the theft of a physical computer may be considered a cybercrime in India. If someone steals a flash drive containing valuable data that they intend to sell on the dark web, this is also considered a cybercrime in India.

Some of the most common types of cybercrime in India are as follows:

1st type of cybercrime in India is Phishing Scams

Phishing is the most common form of cybercrime in India, involving the mass distribution of emails containing links to malicious websites and/or attachments containing malicious software-infected files. When a user clicks on a connection or attachment, malware can be downloaded to their device without their knowledge. Hackers may then use the malware to monitor the victim’s online activities, steal personal information, or connect their device to create a robot network and use it to target other computers.

These emails also have urgent-sounding subject lines and imagery deliberately designed to mislead victims into disclosing sensitive information such as passwords and credit card numbers, exposing them to scammers. The average computer user usually gets up to 16 phishing emails each month as proved and illustrated by the reports. While most of them are immediately recognised as spam, some are so convincing that they manage to get past spam filters and into inboxes alongside legitimate mail.

2nd type of cybercrime in India is Identity Theft

A person can be a victim of identity theft if unknowingly the person gives his own personal information to the hackers by following the said instructions in phishing emails or if downloading malware on your computer. When hackers get their hands on your personal information, they will use it to steal money from your account, Use your identity to gain access to classified information that you have access to, or build fake documents. Hackers may also use your personal data to plan an illegal activity or file tax returns in your name.

In 2020, the FTC (Federal Trade Commission) received 4.8 million identity theft and fraud reports from around the world, up 45 percent from 3.3 million in 2019, owing to a 113 percent rise in identity theft allegations. Identity theft complaints increased to 1.4 million in 2020, up from 651,000 in 2019.

3rd type of cybercrime in India is Online Harassment/Cyberbullying

Harassment on the internet is normally linked to your social life and whether or not you use a popular social media platform like Facebook or Twitter. Various forms of threats can take place that can lead to online harassment whether in form of email, text messages, or social media messages, or posts. It is usually easy to report these threats to the social media platform where you’re being abused. Harassment can also lead to children being harassed online, which can have serious implications.

The word “internet harassment,” also known as “cyberbullying,” refers to the use of the Internet to intimidate, annoy, threaten, or maliciously embarrass others. It may include actions such as:

1) Sending threatening and/or unsolicited e-mail.

2) Encourage others to give the victim unsolicited and/or offensive e-mail, or to send the victim an excessive amount of e-mail messages.

3) Viruses sent via e-mail (electronic sabotage).

4) Disseminating rumours.

5) Making online defamatory remarks regarding the victim.

6) Directly Impersonating the victim online by sending a message that is offensive, controversial, or tempting, causing others to react negatively to the victim.

7) During a live chat, harassing the witness.

8) Abusing others online, including on social media platforms.

9) Sending pornography or other explicit content to the victim with the intent to offend.

10) Creating web material that portrays the victim in a negative light. sending derogatory messages to the survivor.

4th type of cybercrime in India is Exploit Kits

Exploit kits, as the name implies, are sets of exploits, or pieces of software designed to exploit vulnerabilities and security flaws in computers. Rather than creating these kits from the ground up, hackers can purchase them ready-made on the dark web. Furthermore, victims are not required to visit a malicious website in order to become infected. Cybercriminals can break into any legitimate website and insert an undetectable HTML tag that neither the site owner nor the victim can know until it’s too late.

When you visit a hacked website, the kit searches the computer for security breaches. These may involve an out-of-date browser with a particular bug, or security software with out-of-date virus definitions. If the kit detects a malfunction, it will begin a silent installation of unauthorized malicious software on your computer. As a result, hackers will be able to monitor your online activities, steal personal information, and access files on your computer’s hard drive.

5th type of cybercrime in India is Ransomware

Ransomware is a form of malicious software that locks users out of their computers or prevents them from accessing their files on their hard. The user is instructed to pay a few hundred dollars to retain their data by the hacker. The victim is prohibited from reporting the incident towards its enforcement where the logos and other images are used by the hackers to make them aware and inform about the current ongoing cases by the local law enforcement.

Later, after 2013 various ransomware has destroyed many computers and networks throughout the world which were the biggest earning towards costing businesses and financial firms in dollars under the category of sales. To avoid being apprehended, many hackers are now demanding ransom in cryptocurrency.

CYBERCRIME IN INDIA

2. How can I Report Cybercrime in India?

Cybercrime Complaints in India may be filed with the cybercrime cells. The victim can file the cybercrime complaint both online and offline, and he or she can choose which method is more convenient for him or her. The victim is not entitled to report a cybercrime complaint with the city’s cybercrime unit. Since cybercrime in India falls under the purview of global jurisdiction, a cybercrime case may be filed with any of India’s cybercrime cells, regardless of where he or she lives or where the crime was committed.

In India, cyber crime cells have been developed in a number of cities. to make it easier for people to get proper help in the event of an injury or damage caused by a cybercrime perpetrated against them These cells have also been raising awareness about cybercrime and the steps that can be taken to prevent being a victim.

Cybercrime cell.

If the victim does not have entry to any of the cybercrime cells, he or she can file a police complaint under Section 154 of the Criminal Procedure Code (CRPC) at the local police station. If the cybercrime committed against the victim is a punishable offence under the Indian Penal Code, the police officer is required to file an FIR (First Information Report) keep track of cybercrime alerts, and conduct investigations.

If the police officer fails to file the victim’s report, the victim may file a formal complaint with the Judicial Magistrate of his or her jurisdiction, who may then compel the police officer to conduct an investigation. The documents needed to file a cybercrime in India FIR vary depending on the form of cybercrime perpetrated against the victim (Crimes on social media, cyberbullying, mobile app crime, cyberextortion, and so on).

Offline cybercrime cell procedure for filing a cybercrime report :

Since certain individuals cannot pay internet charges or lack the requisite skills, filing a formal complaint with the cybercrime cell has proved to be the most appropriate way of reporting the crime. A cybercrime victim may file a written complaint with the nearest cyber crime cell or any other cyber crime cell in India.

1. The written report must be submitted to the Cybercrime Cell’s Head and provide the following details about the victim or the individual filing the complaint:

a) Identity

b) Information about how to contact us, as well as

c) Address for correspondence.

The form of cybercrime in India perpetrated against the victim determines what other records may be added to the complaint. These records must be used with all offline and web grievances.

2. The National Cyber Crime Reporting Portal is the place to go if you want to file a cybercrime complaint :

Since technology has surpassed all previous methods, it has also surpassed the offline phase of filing a cybercrime report. Cybercrime complaints can be filed on the National Cyber Crime Reporting Portal, which is a government of India initiative aimed at making it easier to file cybercrime complaints across the country.

Victims/complainants should have access to cybercrime cells and other cybercrime-related information at their fingertips. The Indian Cyber Crime Coordination Centre, established by the Government of India’s Ministry of Home Affairs, is one of the elements of the National Cyber Crime Reporting Portal, which deals with all types of cybercrime. There are two forms of complaints that can be registered on the portal.

3. Can you call the Police if Someone is Blackmailing you?

The first thing to keep in mind is that you can never take things into your own hands. If you decide to respond with your own threats, a physical altercation, or even murder, you will almost certainly be arrested and the blackmailer will be able to carry out his or her threat. Similarly, merely meeting the demands isn’t enough. Until you have complied, the blackmailer will make additional demands or even carry out the coercive threat out of spite.

The police are tasked with locating and prosecuting criminals. Make a call to them first. Extortion and blackmail are crimes, and it is their duty to enforce the law.

In certain situations, the possibility of harm is less severe in reality than it appears in your mind. Speak with someone you trust to have a second opinion. This may be a religious leader, instructor, or partner who is bound by attorney-client privilege not to share your secrets. See if they can have some background that will help you feel better about refusing to comply with the blackmailer’s demands and coping with the consequences.

Follow the instructions of law enforcement, even though they sound counterintuitive. They can force you to go through another round of blackmail at the hands of your tormentor in order to gather enough evidence to prosecute you. They may even tell you to deny the blackmailer or take other acts in order to entice the individual to come out. Whatever advice is given, take it.

The police are qualified professionals who understand how to treat these circumstances and what documentation would be needed to ensure that your blackmailer will never torture you or anyone else again.

Of course, contacting your attorney for assistance in coping with these complex legal issues is always the best choice. An attorney can not only assist you in gaining perspective while protecting your privacy, as outlined above but he or she can also assist you in navigating the proper procedure for finding help with your issue. An attorney might be willing to recommend options that you would not have considered otherwise.

4. How can I stop Sextortion?

Sexual extortion is a terrifying and dehumanizing crime that thrives on the humiliation of its victims. Sextortion is similar to online blackmail scams in that the blackmailer requests the victim perform sex acts, such as posing for nude pictures or masturbating in front of a webcam, instead of demanding money.

Sextortion on social media is the most popular type of sextortion. Via online messaging and/or emails, sextortonists form close friendships with their potential victims. They allow their victims to send nude pictures or videos once the trust has been established. They then use the images as leverage to compel their victims to produce more footage that conforms to their bizarre requirements.

Sextortonists can even break into their victims’ computers, find confidential information, and threaten to reveal them if they fail to follow their orders.

a) Tell Anyone You Know Well

We understand how difficult it is to accept that you have been manipulated by a faceless, unknown criminal. You may be afraid that your friends and family would be perplexed as to how the situation arose. Or you’re afraid the perpetrator would follow through with his promise to upload the compromising video online.

b) Disconnect from Offender at all Times

You may be alarmed at the prospect of not responding to the sextortonist out of the blue. “Would they contact your family?” your mind will race with panicked thoughts. Is it feasible for me to communicate with my friends?”

“Am I ready to do this forever?” you can also ask yourself. And the answer should be no. You have gained the freedom to be liberated from this. Some more chats or sessions trap you in your abuser’s coercive grip. The fight to bring him to justice will begin once the link is broken.

c) Do Not Delete Anything

Evidence is required to determine the extent, duration, and timeline of the exploitation. You may feel compelled to delete all traces of the incident from your computer to avoid embarrassment but resist. Keep it. You don’t have to live with your guilt any longer. It’s now your ammunition.

d) Inform the Police

It is important to involve the police from the start. Since there is no federal law prohibiting sextortion, collecting more data on how common it is would make legislative change more necessary.

e) Get in Contact with a Law Firm who knows how to defeat Sexual Extortionist

Your local law enforcement may lack the tools, time, or nuanced understanding of your situation that you need. Have an appointment with a solicitor who is acquainted with sextortion.

Sextortionists maintain power by convincing you that if you don’t comply, your life will end. He/She persuades you that you have no other choice and that there is no way out. He/She is incorrect.

5. What are 3 examples of Cybercrime in India?

There are several types of Cyber Crimes but there are some major one’s like :

a) 1st type of example of cybercrime in India is A.I (Artificial Intelligence) Powered Attacks

Cyberattacks are becoming more widespread and have a greater effect.

Cyberattacks are generally viewed by governments and non-governmental organisations (NGOs) as one of the most serious challenges to global security. In terms of usability and capacity, cyberattacks today are nothing like they were five years ago. The automation and more advanced attack tactics have made it easier for threat actors to conduct attacks on a larger scale with greater effect.

Take, for example, ransomware attacks. Ransomware has been one of the most popular techniques used in cyber attacks since 2017. Ransomware attacks on both the public and private sectors are now occurring on a regular basis all over the world.

Ransomware is on the rise because conventional cybersecurity mechanisms like network firewalls make it difficult to detect these attacks. Email phishing, web apps, and device and hardware bugs are all possibilities for intrusion. Governments, schools, hospitals, and businesses have all been targets of ransomware attacks. Many victims suffer serious consequences, including financial and reputational losses, business interruptions, infrastructure destruction, and even death.

b) 2nd type of example of cybercrime in India is Password Attacks

A password breach is just as it sounds like, it is a third attacker trying to obtain access to your database by breaking a user’s password.

This form of attack typically does not necessitate the execution of any malicious code or software on the machine. Attackers may use software and try to break your password, but this software is usually installed on their own computer. To gain access to accounts, programs use a variety of techniques, including brute force attacks to guess passwords and matching different word combinations against a dictionary list.

Using secure passwords is the easiest way to defend yourself from password attacks. involves a combination of upper and lower case letters, symbols, and numbers, as well as a minimum of eight characters

An intruder will normally open a password with all lower case letters in minutes using password guessing cracking tools. It’s also a smart thing to stop using dictionary words, no matter how long they are; doing so just makes the task of the password intruder easier.

It is also advisable to change the passwords on a weekly basis. If a hacker manages to get a hold of an older password, it will not work because it has been replaced.

c) 3rd type of example of cybercrime in India is Malware

Malware can deliver its payload in a variety of ways. Cybercriminals’ methods are getting more complex, from seeking a ransom to stealing classified private information. The lists that show the most popular malware types are as follows –

Types of Malware :

1) Virus

Viruses attach malicious code to clean code and wait for an unaware user or an instantaneous process to run it. They can spread rapidly and widely, much like a biological virus, causing harm to systems’ core functionality, corrupting data, and locking users out of their computers. Typically, they are stored inside an executable format.

2) Worms

Worms are named for the way they infect computers. They thread their way through the network, starting with one infected machine and connecting to subsequent machines to spread the infection. This form of malware has the ability to rapidly infect entire networks of computers.

3) Spyware

Spyware is malware that, as the title indicates, tracks a user’s actions. This type of malware runs in the context of a computer, obtaining data such as credit card numbers, passwords, and other sensitive information without the individual’s consent.

4) Trojans

This form of malware hides inside or disguises itself as legitimate software, similar to how Greek soldiers hid in a giant horse to deliver their attack. It can bypass protection invisibly by installing backdoors that allow other malware variants easy access.

5) Ransomware

Ransomware, also known as scareware, has a high cost. Ransomware, which can lock down networks and lockout users before a ransom is paid, has targeted some of the world’s most powerful organisations, with disastrous results.

6. What are the 10 Steps to Cyber Security against cybercrime in India?

These are the following 10 steps to Cyber Security as follows ;

1) 1st step to Cyber Security against cybercrime in India is Regime of risk management

Before introducing security measures, organisations must first consider the threats they face. This allows them to prioritise the most serious threats and tailor their responses accordingly.

A risk management program also keeps the board informed of your cybersecurity activities and allows you to adapt your strategy as the threat environment shifts. Changes or additions to the cybersecurity policy or staff awareness program, for example, may be requested.

2) 2nd step to Cyber Security against cybercrime in India is Configuration that is secure

One of the most frequent sources of data breaches is poorly configured controls, such as a database that hasn’t been adequately protected or a security upgrade that hasn’t been activated.

By emphasizing the importance of configuration, you will ensure that redundant functionality is removed or disabled from systems and that known vulnerabilities are addressed as soon as possible.

3) 3rd step to Cyber Security against cybercrime in India is Home and mobile working

Many organizations encourage employees to operate from home or on the go, but this has security aspects. Remote staff doesn’t have access to the same physical and network protections as employees do in the workplace, so companies must adapt.

Links to classified systems should be limited, and protocols for protecting laptops, removable machines, and physical information outside the office should be enforced.

4) 4th step to Cyber Security against cybercrime in India is Control of incidents

You will have a security incident at some stage, no matter how strong your defences are.

Various protocols and processes are developed to ensure the reduction of damages and result in quick process.

5) 5th step to Cyber Security against cybercrime in India is Prevention of Malware

Malware can infect a company’s systems in a variety of ways. It may be sent as an email attachment, as a worm via a vulnerability, or as a removable device plugged into an office computer.

Anti-malware tools and strategies designed to help discourage workers from being victims should be implemented to mitigate these risks.

6) 6th step to Cyber Security against cybercrime in India is Managing account permissions

Access controls must be implemented to ensure that workers only have access to information that is important to their employment.

This prevents sensitive information from being leaked if an employee’s email is hacked, and it makes it less possible for an employee to steal sensitive information.

7) 7th step to Cyber Security against cybercrime in India is Monitoring

You can detect active or attempted attacks by monitoring your system. This is beneficial to you in two ways. First and foremost, you will be able to quickly recognise incidents and initiate response efforts.

Second, you’ll get firsthand proof about how criminals are attacking you, allowing you to fortify your defences and search for bugs until the fraudsters do.

8) 8th step to Cyber Security against cybercrime in India is Network safety

Vulnerabilities exist in the links between your networks and the Internet that could be exploited.

You won’t be able to eliminate all of those flaws, but you should be mindful of them and make architectural improvements to mitigate as many risks as possible. Similarly, regulations and technological interventions should be implemented to minimize the risk of them being used.

9th step to Cyber Security against cybercrime in India is Media controls that can be removed

Many security problems are caused by USBs and other removable devices. They’re not only used to inject malware but they’re also involved in a lot of insider attacks. Employees are susceptible to misplacing removable devices or having them plugged into machines where they can be accessed by unauthorised parties.

As a result, enterprises must introduce techniques emphasizing the value of having removable gadgets on your person or in a secure location.

10th step to Cyber Security against cybercrime in India is User education and awareness

Employees play a critical role in their company’s security policies, so they must be taught their roles and shown what they can do to avoid data breaches.

Training will be of various types, ranging from beginner e-learning to classroom-based qualification programs. It is up to you to decide the amount of preparation needed by your workforce.

7. What is the most common type of Cybercrime in India?

Having your identity stolen is frightening and intrusive, and it can have serious consequences for your finances, medical history, and reputation. Knowing how to act and report an incident if you become a victim is critical.

Identity theft is the unauthorised acquisition of a person’s personal details that determines their identity for financial gain. It is the most prominent form of cybercrime. If the fraud victim is alive or dead, identity theft may occur. Creating a fake account or impersonating someone by using multiple email addresses has become very popular, and it has resulted in the commission of fraud in order to gain some information that cybercriminals can use to take over the victim’s identity and commit a variety of crimes.

Since the Internet and online transfers provide an individual with a sense of anonymity and secrecy, technology has made it far simpler to identify the person impersonating others.

Data fraud and the theft of personal information from electronic devices can be accomplished using a variety of methods. The following are some of them:

a) Hacking- Hackers are unscrupulous individuals who gain access to information stored on other computer systems. The offence of unauthorised access to a computer resource as “Whoever has the intent or motive to cause any loss, harm, or destruction, deletion, or alteration of any information stored on a public or private computer. Hacking is when someone reduces the utility of something, lowers its worth, or harms it in some way.”

Hacking is a violation of one’s right to privacy, as guaranteed by the Information Technology Act (2000). It is a process in which viruses or worms, such as malware, divert information from another computer device by decrypting it and passing it on to a hacker, who then either uses the information themselves or gives it to someone to commit fraud with it.

b) Phishing – Phishing is the use of forged email addresses or messages containing links to virus-infected websites. People are urged to enter personal information such as login information and account information on these compromised websites.

c) Spoofing E-Mail/SMS- A spoofed e-mail has an origin that is distinct from where it originally came from. In SMS spoofing, the perpetrator steals another person’s identity in the form of a phone number and sends SMS via the internet, with the recipient receiving the SMS from the victim’s mobile number.

d) Carding – Carding is when cybercriminals make fraudulent withdrawals from an individual’s bank account using ATM debit and credit cards.

e) Vishing – A cyber-criminal impersonates a bank representative or a call centre employee and calls the victim, tricking them into disclosing sensitive details about their personal identity.

Reference – https://www.jigsawacademy.com/blogs/cyber-security/types-of-cyber-crime/
https://www.itgovernance.co.uk/what-is-cybersecurity
https://www.esafety.gov.au/key-issues/image-based-abuse/take-action/deal-with-sextortion

Article by – Sahil Madan Mate

Leave a Comment