You are on page 1of 10

Cyber

cri
me

s
ubmi
ttedby:
vai
bha
vjai
n
rol
lno:
127
What does
Cybercrime mean?
Cybercrime is defined as a crime in
which a computer is the object of the
crime (hacking, phishing, spamming) or
is used as a tool to commit an offense
(child pornography, hate crimes etc.)

Out of the top 10 most targeted countries


by cyber attackers, India ranks 4th. It is
an illegal activity and is continuously
increasing in India for financial loot.
CYBER CRIME
CASES IN INDIA
 SIM Swap Fraud
 Cyber Attack on Cosmos bank
 Andhra Pradesh Tax case
 The bank NSP case
 ATM System hacked in Kolkata
1. SIM Swap Fraud
 In August 2018, 2 men from Navi Mumbai
were arrested. They transferred the money from
the bank accounts of numerous individuals by
getting their SIM card information through illegal
means.
 These fraudsters were getting the details of
people and later blocked their SIM cards with
the help of fake documents.
 They were accused of transferring 4 crore
Indian Rupees effectively and even dared to
hack the accounts of a couple of companies.

PREVENTION
 Fraudsters use the victim’s information in
various scams and trick them into fraudulent
activities.
 It is advisable that the site where an individual
is entering his banking or other details should
be verified for authenticity, as scammer uses
the fake site to get the information directly from
prospective victims.
2. Cyber Attack on Cosmos bank
 Hackers wiped out money and transferred it to
a Hong Kong situated bank by hacking the
server of Cosmos Bank. They attacked into the
ATM server of the bank stole details of many
Visa and rupee debit cards owners.
 The switching system which acts as an
interacting module between the payment
gateways and the bank’s centralized banking
solution was attacked and raised numerous
wrong messages confirming various payments
 In this attack, Cosmos Bank’s Pune branch saw
nearly 94 Crores rupees being siphoned off.
PREVENTION
 Hardening of the security systems by limiting its
function only to authorized people.
 Any unauthorized access to the network should
immediately set an alarm to block all the access
to the bank’s network.
 Enabling a two-factor authentication.
3. Andhra Pradesh Tax case
 Dubious tactics of a prominent businessman
from Andhra Pradesh was exposed after
officials of the department got hold of
computers used by the accused person.
 The owner of a plastic s firm was arrested and
Rs.22 crore cash was recovered from his house
by sleuths of the Vigilance Department. They
sought an explanation from him regarding the
unaccounted cash within 10 days.
 The accused person submitted 6000 vouchers
to prove the legitimacy and thought his offence
would go undetected.
 After careful scrutiny of vouchers, it later
revealed that the accused was running 5
businesses under the guise of one company.
 He used fake and computerised vouchers to
show sales and save tax.
4. The Bank NSP Case

 The bank NSP case is the one where a


management trainee of the bank was
engaged to be married. The couple
exchanged many e-mails using the
company computers.

 After sometime, they broke up and the girl


cheated fraudulent e-mail ids such as
“Indianbarassociations” and sent emails to the
boy’s foreign clients. She used the banks
computers to do this.

 The boy’s company lost a large number of


clients and took the bank to court. The bank
was held liable for the emails sent using the
bank’s system.
5. ATM System Hacked in
Kolkata

 In July 2018, fraudsters hacked into


Canara bank ATM servers and wiped off
almost 20 lakh rupees from different bank
accounts.
 The hackers steal the information of debit
card holders and made a minimum
transaction of INR 10000 and maximum
of INR 40000 per account.
 On 5 August, 2 men were arrested in
New Delhi who was working with an
international gang that uses skimming
activities to extract the details of bank
account.
PREVENTION
 Enhancement of security features in ATM
and ATM monitoring systems can prevent
any misuse of data.
 To minimize the risk of skimming by using
lockbox services to receive and transfer
money safely.
 This uses an encrypted code which is safer
than any other payments.
THANK
YOU!

You might also like