0% found this document useful (0 votes)
59 views

Cyber Crime- PPT

Uploaded by

jeevaarulmalar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views

Cyber Crime- PPT

Uploaded by

jeevaarulmalar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 67

Cyber Crimes

- Cyber Crime Wing


Overvie
w

• What is Cyber crime ?


• Types of Cyber offences
• Cyber Safety tips (Do’s & Don’ts)
• How to Lodge Police Complaint on Cyber Crime ?
 Financial Cyber Fraud Toll free Helpline(“1930”)
 National Cybercrime Reporting Portal(www.cybercrime.gov.in)
Cyber Crime

 New and powerful cyber-attacks are striking the internet regularly. According to
a study, 90% of all cyber-attacks are caused by human negligence.
 A cybercrime is a crime involving computers and networks as a tool or
as a target or both. This includes a wide range of activities, from
illegally downloading music files to stealing money from online bank
accounts.
 The content which is considered unlawful in the physical world is also unlawful
in the online world.
 Cyber criminals are not always financially motivated. Cybercrimes include non-
monetary offenses as well.
Types of Cyber Offences

Financial Non-Financial
Frauds Frauds
• Cyber frauds in • Cyber frauds
which the victim other than
has lost money financial frauds
• OTP fraud, KYC • Social media
frauds, etc. offences such as
cyber
bullying/stalking
Financial Frauds
Financial
Fraud
Boss
Gift scam/ Loan fraud/ scam/Impe Part-time/
Job offer
Lottery Fake Loan rsonation Investment
scam /Prize App fraud Fraud
money

Scratch card Fake Crypto


FEDEX Claim Matrimonial QR Code
currency
Courier scam Fraud

Bank
account
related Digital Arrest Sextortion / OLX scams
Honey Scam Others
offences-
OTP fraud,
KYC Frauds
etc
Instant loan apps link sending through
Whatsapp
• Method 1: First the victim will search for Instant loan app and installs apps not
registered with RBI, whenever the victim not able to pay the money, the
scamster will suggest another loan app through WhatsApp. Then victim will
install the apps and get harassed.

• Method 2: The scamster will send a warning message through WhatsApp that
the victim taken loan from an instant loan app and if he didn’t pay the amount
then he will receive court order for recovery and his cibil score will get affected.
So, he have to repay the loan by using the app downloaded through given link.

• Related Sections: 306, 383, 406, 420, 469, 500, 506(1) – IPC, 66, 66D,
67,67A - IT ACT 2008

• If Victim is woman, 509 IPC, sec 4, 6 of TNPHW ACT also applicable.


Loan fraud

• The fraudster call or communicate to the


victim for the availability/sanctioning of
loan amount to the victim and asked to
pay initial 3 EMI for processing charges.
The victims unaware of the fraudster
intention pay the money to the fraudster.

• Related Sections: 419, 420, 465 -


IPC, 66C, 66D - IT ACT 2008
BOSS Scam/Impersonation Fraud

• The scamster will collect details of officials from


public domains and send message to the victim with
display picture of his/her higher officer. Also asking
victims to purchase Amazon gift cards. The fraudster
will convert the gift cards to Google Play recharge
vouchers and sell those vouchers at offer price in
Telegram.

• Related Sections: 419, 420 of IPC, 66C, 66D - IT


ACT 2008
KYC /OTP fraud

• The scammers sends SMS/e-mail to the victim that KYC has


been not verified for his/her bank account or SIM card. So, it
will be deactivated within 24 hours. On seeing this the
victim will get tensed and respond to that message. Then
the scammer convince the victim to install Remote access
apps and get control of victim’s mobile to get OTP for
financial transactions.

• Related Sections: 419, 420 of IPC, 66, 66C, 66D - IT


ACT 2008
Gift Scam

• Scammer will connect with victim through social


media and impersonating as millionaire living in
abroad.

• After some time, he/she will tell the victim that


he/she sent luxurious gift to victim’s address.

• The scammer will call as customs officer, Income


tax officer, Delivery person and demanding
money to deliver the luxurious gift.

• Related Sections: 419, 420, 465 of IPC, 66C,


66D - IT ACT 2008
Job offer

• Fake job providing web sites obtained the details / particulars


of the victim. After registration on the website the fraudster
call to the victim asked money for registration fees.

• The victim used to pay the amount through URL sent by the
fraudster and the account details of the victim automatically
obtained by the fraudster, then money in the victim account
automatically debited.

• Related Sections: 419, 420, 465 of IPC, 66C, 66D - IT


ACT 2008
Lottery Fraud

• The fraudster will send an SMS/E-mail to victim that


his/her number is selected in lottery and he/she won
huge money or other expensive items. Then the
scammer will ask address and delivery details of victim.

• Then they will ask for money exchange charges, income


tax like that.

• Related Sections: 419, 420, 465 of IPC, 66C, 66D -


IT ACT 2008
Scratch card

• Fraudster create and publishes google ads as


scratch cards.

• When victim receive the scratch card notification,


thinks that it is genuine and types UPI PIN.

• Then the money will be deducted from his account.

• Related Sections: 419, 420 of IPC, 66C, 66D -


IT ACT 2008
Matrimonial fraud

• The fraudster target the persons who were registered in the


various matrimonial websites, Introduced themselves as
bridegroom / bride and showing interest in the alliance and
show them living in foreign countries, slowly asked for
financial assistance.

• The victims without knowing the fraudster intension send


money to the fraudster. After getting money the fraudster
avoid communication to the victim.

• Related Sections: 419, 420, 465, 507 – IPC, 66C, 66D of


IT ACT
QR code scam

• The scammer will impersonate as buyer in reseller


websites. Negotiate with the victim for a product and
finalize it. Then he will send QR code to victim and asking
him to scan the code. It will ask UPI PIN. But the victim not
aware of that UPI Pin is not needed to receive money. So,
he/she will enter the UPI pin and loose money.

• Related Sections: 406, 420 – IPC, 66 of IT act


Sextortion/ Honey
scam

• Scammer will collect victim’s private photos


or do video call with victim through social
media.

• Then they will extort money.

• Sometimes it may lead to sexual


exploitation.

• Related Sections: 354C, 419, 469, 354A,


509, 507 of IPC, 66C, 66D, 67, 67A of IT
ACT
Scholarship frauds

• The fraudsters will spread news that Government announced new


scholarship scheme in the name of famous leaders. They will
spread a mobile number or website along with the news.
• Victims will apply or send their children details to that mobile
number. Later, the fraudster will impersonate as school
administration official to get their trust and says victim that their
children was eligible for the scholarship.
• Then they will ask victim's debit card details to verify their account.
By this they will swindle the amount from victim's account.
• Related Sections: 419, 420, 465 of IPC, 66C, 66D - IT ACT
2008
EB bill payment alert SMS
from TNEB

• The scamster will send WhatsApp message or SMS that the


electricity power will be disconnected at midnight because
previous bill payment is not updated and asking victim to call
a number who will be impersonating as electricity officer and
instruct victim to install remote access apps like Anydesk,
Team viewer. Otherwise, advice victim to install SMS
forwarding apps.

• Related Sections: 419, 420 of IPC, 66, 66C, 66D of IT


ACT
Browser pop-up of Fine for watching adult
website/videos

• While surfing website


there will be a popup of
lawmin.gov.in and saying
the victim watched adult
videos and for that the
victim have to pay fine
amount.
• Related Sections: 419,
420 of IPC, 66C, 66D of
IT ACT
Tour package fraud

• Since this is holiday season, many of the


people looking for tour packages, using this
scamster will create new websites and
posting attractive tour packages. They will
send fake confirmation of train, flight tickets.

• Related Sections: 465, 419, 420 of IPC,


66C, 66D of IT ACT
Online courses in the name of
Famous Colleges and Universities

• Scamsters will create websites and make ads


through google ads that one famous college or
University conducting online course and
providing certificates. By this, they will collect
fees amount for a period and escapes.

• Related Sections: 465, 419, 420 of IPC,


66C, 66D of IT ACT
Scam in the name of international exams

• Fraudster will conduct fake


exams in the name of
international eligibility exams
through voice calls and social
media calls. For that they will
ask money as fees.

• Related Sections: 465, 419,


420 of IPC, 66C, 66D of IT
ACT
Expensive things at low price

• The scamster will post sale of


expensive items at low price in
Instagram. When the victim
contacts the scamster he will send
message that those products are
purchased using carding
method(stolen card details). When
the victim sends money, they won’t
deliver the product. Victim also not
approaching police station because,
he also involved in this crime.
• Related Sections: 419, 420 of
IPC, 66C, 66D of IT ACT
Flight/Train ticket booking fraud

• Most of the people searching


google for booking Flight/train
tickets. Some people also search
for Helicopter travel. Fraudster will
create some websites with
tempting offers, the price will be
cheaper than the official website.
After seeing this, victim will book
the tickets on the fraudulent
websites. Until the travel, they
won’t they are cheated.
• Related Sections: 465, 419,
420 of IPC, 66C, 66D of IT ACT
Fraud through Google search engine

• Fraudsters will post fake contact


numbers as customer care number of
many companies in many forums,
websites, social media pages.
• When a victim searches for customer
care number of a company in search
engine, they may get various fake
contact numbers of that company.
Misuse of Biometrics

• Cyber criminals steals fingerprints


and aadhaar number from sales
deed, Aeps POS machines and
clones their fingerprints with the
help of special equipment. Using
those aadhaar number and
cloned fingerprints they withdraw
money from victim’s bank
account.
• Related Sections: 465, 419,
420 of IPC, 66, 66C, 66D of IT
ACT
ATM Skimming fraud

• Fraudsters will place skimming devices in


card slots of ATM.
• These skimming devices will captures and
send the card details of victims who using
the ATM.
Online Shopping/E-commerce fraud

• Fraudsters will create fake e-commerce


sites/social media pages and advertising that
expensive items are available at cheap rates.
• Victim will pay the amount and waits for the
delivery.
• The product may undelivered or damaged
products will be delivered.
4G to 5G scam

With 5G telecom services have been launched in few cities


there are opportunities for cyber crimes like phishing and
OTP based cheating.
Fraud using Google maps

• Fraudsters will create places near famous


hotels or in the name of famous hotels in
Google maps and put some fake website links
and mobile number on it. While public
searches for hotels online, they will see those
fraudulent places and books hotel online at
cheap price.

• Related Sections: 465, 419, 420 of IPC,


66C, 66D of IT ACT
Investment fraud

• The scammer will advertise an app or website through google


ads, telegram channels, YouTube channels.

• In the app/website they will say that it will provide 3x profit of


the invested amount.

• They use MLM method to get more investment.

• When they get enough amount, they will block the withdrawal
option and close the app/website.

• Related Sections: 406, 419, 420 of IPC, 66C, 66D of IT ACT

• Sections 3, 4, 5, 6 of Prize Chits and Money Circulation Schemes


(Banning) Act, 1978
Crypto currency Fraud

• Scammers will run fake exchange or fake investment


apps to increase profit of cryptocurrency.

• They also creating fake crypto currencies.

• Some fraudsters will instruct another victim to send


money to a cryptocurrency convertor and get crypto
assets from cryptocurrency converter.

• Related Sections: 406, 465, 419, 420 of IPC,


66C, 66D of IT ACT
Investment fraud using crypto
currency

• First the scamster will ask victims to buy


cryptocurrencies (especially Tether) through other
platforms and telling victims to invest the
cryptocurrency in their app/website.

• Related Sections: 406, 465, 419, 420 of IPC,


66C, 66D of IT ACT

• Sections 3, 4, 5, 6 of Prize Chits and Money Circulation


Schemes (Banning) Act, 1978
Investment fraud amount/loan app repayment
amount to cryptocurrency (commission/p2p trading)

• The scamster will make arrangement that the fraudulent


amount of investment fraud/loan app repayment will be
credited directly to a cryptocurrency convertor account. The
cryptocurrency convertor may be work for commission or
p2ptrader.

• By this, the scamster escapes from money trail investigation


of law enforcement agency.

• Related Sections: 34, 406, 419, 420 of IPC, 66D of IT


ACT
Crypto Trading

• Investing in cryptocurrencies is increasing


exponentially.

• The fraudsters will run YouTube or


telegram channels and portraying that
they are doing crypto trading and earning
huge profit.

• By seeing this Victim will send


money/crypto assets to fraudsters. They
will be defrauded by the scamsters.

• Related Sections: 406, 419, 420 of


IPC, 66C, 66D of IT ACT
Non-Financial Cyber
Frauds
Social
Media

•Social Media enables communication among


individuals or communities to create share
& content in cyberspace using Internet.

•Social media is omnipresent & accessible using


communication devices like Desktops, smart
phones, laptops, Tablets etc.

•This includes social networking sites, Micro


blogging sites, Images & videos sharing sites, Blogs,
messengers etc.
Social Media related Cyber
crimes
From the analysis of NCRP complaints reported in our state, Social media related
crimes picks top position. The basic reason for this type of crimes is victim’s
ignorance. We sharing our Name, Email-ID, mobile number, hometown, Place of
Birth, School name, College name, previous job and current job details in public.
Also posting photos and videos about tour, special occasion, dinner and day to
day life. These tiny details are useful for a fraudster to find behaviour of victim.

Not only Women but also men affected by social media related crimes. It's called
Cyber defamation. Children also became the victims of this crime, which is
known as cyber bullying.
Social Media related Cyber
crimes

Why cyber stalkers choosing online platforms? Because of anonymity. They


can easily create fake account in any name. They can access the account
from anywhere. So, They are anonymous? The answer is No. Even if they
use VPN, there is some possibility to find them. But it requires long
procedure and cooperation from other country's law enforcement agency
also. That is known as Mutual Legal Assistance.

Some phishing and financial frauds also happening in social media. Ex:
Marketplace frauds
FACEBOOK, INSTAGRAM,
TWITTER, ETC
Spreading fake
Circulating hate content
news/rumor
• Fake audio/picture about • Criticizing political or
implementation of media person
lockdown • Sending fake content
• 10 Rs coin ban & 2000 against a community,
Rs ban religion
• Death of pregnant
elephant in Kerala

Related Sections: 153A, 499, 504, 505 of IPC, 66C IT ACT


FACEBOOK, INSTAGRAM,
TWITTER, ETC

Uploading
Threat for Impersonation by Creating fake
inappropriate
ransom identity theft account
content
• Asking money • Fake accounts • To spread fake • Private
not to release of Police, news or to photos/videos
private photos Bankers, Other fraud people with contact
of victim government number details
officials, IT
employees

Related Sections: 153A, 354A, 354C, 419, 469, 499, 504, 505, 509, 507 of IPC,
66C, 66D, 67, 67A, 67 B of IT ACT
Taking control of Famous Facebook
pages
• The fraudster will contact Facebook pages in
the name of Facebook, which are having good
count of followers. They will tell the owner of
the page that they have more follower, so
they can run ads on their page by that they
can earn money. They sends a link which will
transfer the admin control to the scamster.
After that the scamster will use the page to
run obscene ads and to post fraudulent
websites related information.
• Related Sections: 406, 419, 420 – IPC, 66,
66C, 66D of IT act
Youtube

Obscene Content

Scammers promoting their apps,


websites

Spreading Hate content

Related Sections: 153A, 354A, 354C, 419, 469, 499, 504, 505, 509, 507 of IPC, 66C, 66D,
67, 67A of IT ACT
Threatening the victim for ransom by sending
morphed obscene photos of victim.

Impersonation by identity theft and asked money


from victim

Non-WhatsApp numbers are used for WhatsApp


Whatsapp by the fraudster and post inappropriate things in
the WhatsApp status.
Hack victim account to do illegal activities.

Make video call in nude and record it to do


sextortion.

Related Sections: 153A, 354A, 354C, 419, 469, 499, 504, 505, 509, 507 of IPC, 66, 66C, 66D,
67, 67A of IT ACT
Whatsapp call activation through call forwarding ussd
codes

• In mobile phones, there will be call forwarding facility. Telecom service


provider also gives call forwarding facility through USSD codes.
• BSNL - **21*<10-digit number># and press call
• Reliance Jio - *401*<10-digit number> and press call
• Airtel - **21*<10-digit number># and press call
• Vi- **21*<10-digit number># and press call
• #21# and press call to deactivate
• The scamster will call the victims, impersonates as customer care officer
and asking to enter USSD codes and call button. Thereafter all the calls will
be forwarded to a scamster mobile number.
• While installing WhatsApp, they verify the number by SMS and call.
Scamster will now verify the number by using the forwarded call. By this,
the scamster will take control of victim account.
• If they use 2 factor authentication, then this type of fraud will be avoided.
• Related Sections: 419, 420 - IPC, 66, 66C, 66D of IT ACT
E-mail

Impersonating Kids used E-mail


E-mail Threatening E- for gaming
Scam E-mail
(Personal/Busines mail account, used by
s) someone

Password leaked Malware


Job offer
threatening mail embedded mails

Related Sections: 153A, 354A, 354C, 419, 469, 499, 504, 505, 509, 507 of IPC, 66, 66C, 66D,
Cyber Safety Tips
(Do’s & Don’ts)
https://smsheader.trai.gov.in
Password Best Practices

• Use two-factor(2FA) or multi-factor authentication (MFA).


• e.g. password and OTP
• Use longer and complex passwords.
• Make passwords that are hard to guess but easy to remember.
• Include upper-case and lower-case letters, numbers, and special
characters in passwords.
• Don’t share passwords to anyone.
• Don’t store passwords on browser without proper security.
• Be aware of keyloggers.
• Use different passwords for different accounts.
Cyber Safety Tips

• Always download applications/software from trusted


sources. For example, Google Play store, Apple store
• Regularly update Operating System, Applications and Anti-
virus software of the system.
• Ensure backup of important data/files/documents at regular
intervals.
• Lock the computer screen when not in use.
• Always insist on using genuine/licensed software
applications. Don't install or use pirated copies of software.
Cyber Safety Tips

• Scan all the files/contents downloaded from websites, e-mails or USBs


• Don't click any links received from the unknown email addresses,
mobile numbers.
• Before sending confidential information and financial information
through E-mail, check the address of the communicator.
• Don't click untrusted, pop-up advertisements/programs.
• Be aware of remote access apps like Anydesk, Teamviewer.
• Don't dispose computer, Mobilephone, hard disc, pendrive memory
card without deleting data.
Cyber Safety Tips

• Don't use public systems to access banking/sensitive sites.


• Do not reveal password on questionnaires or security forms.
• Do not choose/ select “remember my password” option for
banking/sensitive sites.
• Verify the Authenticity and Identity of social media profiles before
getting involved in any correspondence.
• Be vigilant and verify the advertisements/sponsored contents on
search results or websites.
• Don't trust and share unverified content on social media and
messaging apps.
Cyber Safety Tips

• Keep your UPI PIN safe and do not share with anyone.
• UPI PIN is not needed while receiving payments. Account number
& IFSC code/UPI ID/mobile number only required.
• Verify the name of "Payee" before proceeding with the UPI
payment.
• Card Number, Expiry & CVV number are confidential. Never
share with anyone.
• Be aware of limit enhancement on Credit card.
• Be vigilant before revealing your personal information and
location over the internet.
Cyber Safety Tips

• Privacy settings must be carefully chosen before sharing any


content over internet.
• Turn off/remove unnecessary apps.
• Register for Do Not Disturb (DND) service with Telecom
Operators.
• Be aware of loan apps.
• Use Parental control mode, while handing over mobile phones
to kids or minors.
• Use device / SD card encryption to safeguard confidential data.
Cyber Safety Tips

• Check and verify your bank statement frequently.


• Don’t search customer care number on Google.
• Update OS from default settings only.
• Update Apps through Appstore, not from browsers.
• Don’t respond to update notifications from browser.
• Don’t scan official documents through mobile phones.
• It’s good to teach banking operations, but don’t allow kids to
use your bank accounts.
1930 HELPLINE
Helpline number -
Financial Fraud

• Any victim of financial cyber fraud

can dial helpline number

"1930“.
• They can report the incident on

National Cybercrime Reporting


Portal (www.cybercrime.gov.in).
Victim
giving
Victim lost money
details
Cyber Crime Control room,
Chennai
Name
Police
Mobile number
attendin
g calls E-mail Address(optional)

Address of the Complainant


Mobile number of the suspect
Complainant’s bank account number/UPI ID/Debit
Calling card number/Credit card number based on the
transactions
1930
Suspect’s bank account number/UPI ID
Transaction details: Transaction ID, lost amount,
Transaction Date, merchant/wallet involved in the
SMS Received by Complainant

www.cybercrime.gov.i
National Cyber Crime
Reporting Portal
Details need to be given

• Name, Mobile number, E-mail Address(optional), Address of the


Complainant

• Mobile number of the suspect

• Complainant’s bank account number/UPI ID/Debit card number/Credit


card number based on the transactions

• Suspect’s bank account number/UPI ID

• Transaction details: Transaction ID, lost amount, Transaction Date,


merchant/wallet involved in the particular transaction
Details need to be given

• Social media ID, email address, website address of suspect

• Bank statement

• Screenshots of transactions

• Any other evidence available


NCRP Complaint Monitoring

 Automated routing to concerned state/ UT based on


information furnished in the reported incident for
appropriate action in accordance with law.

 Facilitate complainants to view status of action taken


on the reported incident.

 Every Cyber Crime Police Station has access to the portal and
they can directly download the complaints. They need to give
disposal on the portal itself. The action taken on the reported
complaints should be regularly monitored by the unit officers of
each District/Commissionerate.
Thank you….!

You might also like