You are on page 1of 23

- o

yo/
,/
E' a

f
rl a
t

t
li

-aflfr-ar.
E --.-r
ata - L
+

CYBER SECURITY
AWAREN ESS - BOOKLET
CYBER CRIMESIN INDIA

ABOUT THE BOOKLET


lntbrmation & Communication Technology has become an integral part ofour
(lay to day life. It has changed the way we connect with friends, find jobs, find \
J*
rnntches for marriages, run businesses, play games, do shopping and so on.
With the cheap availability ofbroadband and smart-phones, almost everyone
has access to the cyber space, connecting virtually to millions of online users 1
rrcross the globe. Widespread use ofcyber space has also made us vulnerable to
arrt

cybercrime threats. A minor lapse/negligence in managing our digital life can


opcn the doors for cybercrimes and hence can Iead to financialloss, damage to
{
rcputation, harassment etc. So, we must be vigilant and careful while
( r)nnecting digitally to the outside world whether for financial transactions,

sr)cia I networking, playing games or searching things on the internet etc,

'l'he intbrmation provided in this booklet is intended to create awareness


Cyber frauds have witnessed a huge increase by each passing year as the
irm()ng citizens about various cyber threats that can impact them and provide
banking system and payment mechanisms have shifted to the online mode, the
some tips to safeguard themselves against cybercrimes.
cases sawan uptickduetothe lack ofawareness.
'I ho initial part of the booklet depicts the different types of cybercrimes being As per the Statista latest report, Internet penetration rate in India went up to
r r,po|tcd these days, categorized as per their modus operandi. For cybercrime nearly around 45 percent in 2021, from just about four percent in 2007.
oI(,irclr modus operandi, we have given its briefdescription in the boxatthetop, Although these figures seem relatively low it meant that nearly half of the
population of 1.37 billion people had access to the internet that year. This also
llclow that, is a pictorial representation of how cyber criminals commit that
ranked the country second in the world in terms ofactive internet users,
1r.r|ticular cybercrime on the victim. We have tried to keep it simple so that even
ir (ommon man can understand it. At the bottom of the page are the There are over 570 million active mobile internet users in India and the average
monthly data consumption is 73,462 MB.lndia also has the cheapest internet
t lps/possible ways by which one can avoid the particular cybercrime/fraud.
data services in the world, 108 of data costs $0.09 in India compared to an
'l'here might be certain overlapping tricks found in the various types of average $8 in the US and $1.4 in the UK. The global average cost of data stood at
just over $5 per GB.
cybercrimes explained in the booklet. Still they have been discussed separately
lrt,causc cyber criminals apply some common tricks with very subtle The company surveyed over 10,000 adults in L0 countries - Australia, France,
(llll'crcnces due to which many people become victims. Germany,lndia,ltaly, rapan, the Netherlands, New Zealand, the United Kingdom
(UKJ and the United States (USJ. Of these 1,000 adults were from India.
According to the report, a whopping 27 million Indian adults were victims of
identity theft in the past 12 months, and 5270 of adults in the country do not
know howto protect themselves from cyber crime

August,2021
IMPORTANCE OF CYBER SECURITY
TABLE OF CONTENTS
Advanced technologies have changed the modern way of life. The internet
Sr No Topic l'aBe No
provides us with many benefits. Be it communicating with friends, searching
1. lmportance of Cyber SecuritY t for information, doing banking transactions, availing online services, finding
z. Social Engineering Frauds 2-ll job, finding life partner or even running entire businesses. The internet touches
o CW/OTP Sharing Fraud 2 almost all aspects of our lives. Howevet it also makes us vulnerable to a wide
o UPI Phishing Fraud 3
range of threats. New and powerful cyber-attacks are striking the internet
. Fraud by Request Money QR code/Link on 4
regularly. A minor lapse in managing our digital lives can open the door to cyber
Google Pay/PhonePe/Paytm
criminals. Cyber criminals can steal our money or damage our reputation.
. Fraud During Covid-19 Pandemic 5-6
According to a study by a leading industry research organization, 90% of all
. Fraud through Google Docs App
. I cyber attacks are caused by human negligence. Therefore, cyber security
Fraud using olx/E-commerce Platforms
. Fraud through Fake Cashback offers I awareness is important for everyone today.
o Fraud through Screen Sharing Apps 10
We must be vigilant while making use of technology to reduce the risk of cyber
. slM Card swapping Fraud 77
threats.

3. Financial Frauds using Social Medla Platforms t2-13


o Fraud using Fake Social Media Account 12
. Sextortion on Facebook 13

4. Other Cyber crimes using Soclal Medla Platforms t4-L6


. Harassment through Fake Social Medla Proflles t4
. Cyber Bullying 15
. cyber stalking 16 /_.
,t=J
5 Other Cyber Crimes/Frauds t7-26
. ATM/Debit Card Cloning t7 t-'
',.1-I, \
o Iti CYBERSECUNITY
Edited Google Customer Carc nutttltct lrt,ltl(l
. Ransomware Attacks l9 )
. 2ll .(A,
r)
Juice lacking
. Lottery Fraud/ Nigerian Frattd 2t 1
o 0nline Job Fraud
. Computer or Device Hacking 23 \J
. Mobile Application Fraud 24
. Remote Access Application Irlautl
. Matrimonial Frauds 26

6 Cyber Safety Tips for Children, I'ilt'cllls rrtl(l Wrtrr('tl 27 -32

7 General Cyber Safety Tips 33.37


8 How to make a Complaint to Police 3B
1
SOCIAL ENGINEERING FRAUDS
cw/oTP SHARTNG FRAUD
Cyber criminals posing themselves as bank /RBI officials call pcople irnrl lcll
re,,
0n the pretext of helping in banking related issues, fraudsters ask victims to
forward an alphanumeric link to a particular number (depending upon the
them that their ATM card has been blocked or their KYC IKnow Your (]ustr)lncr) bank associated with the victim) from their registered mobile numbef, Once it
is not updated or their Aadhaar is not linked to their bank lcc0urrt & he rrt c t hcir is done, cyber criminals install the UPI wallet of the victim (using Wi-Fi)
account will be blocked. Then on the pretext of updating thc KY(i/liukirrg lrrrnk bypassing the SIM binding process onto their own mobile phone, thus gaining
account to Aadhaar or for resuming the services ofATM caltl/lct ivirt ion ol ncw access to the victim's bank accounts linked to the registered mobile number
ATM card asks for details related to victim's bank account likc AIM cirr.tl
number, CW number, OTP etc. After these details aro shat'c(l l)y vi(1in), ltr ltoy is
siphoned offfrom the victim's bank account.
n
,L t] Jl
S, S,
f.
bn ;n

II
+ tr-l
@

-
r-i"@ Fraudsters coll people on
the pretext
ofupdoting
KYc/Aodhaar & link his
account to UPI by convincing
I
Victim shares link
& OTP
Fraudsters get occess to
the UPI wallet which is
linked to victim's honk
a c co un t. F rau d s ters se t
Fraudsters coll On the pretext of KYC/ l;VV tto him to share the alphonumeit MPIN qlso
imperson0ting Aodhaar update or link & OTP to o porticular
os bank/RBl activation of new ATM cord, number ossociated to the
olJicials fraudsters qsk for ATM cqrd bank of the victim
number &OTP
G&
a
Paglrn
UPI'
ama4on
f, illit f
Froudsters transfer the monq/ to
e- wallet or UPI accounts or do
shopping immediotely
Victim's
bonk occount d
Victim duped of money in Fraudsters use the
his bank account victim's account as

E
until he gets his accountblocked their own

. Remember bank never asks for card number/CW numbcr/0TP


IT Never share any OTP or link to any number given by someone calling
. Never share the ATM card number, CW,OTP or any othcr conflditntiirl
oneselfas bank /RBI officials.
banking credentials with anyone oyer a phone call/SMS/WhatsApp.
People calling to customer care number of airlines/e-commerce entities
. E-mail should not be shared as this may lead to actlvatlon (ll lllternrl
obtained from Google search for rescheduling flights/getting refunds etc.
banking by cyber criminals,leading to siphoning offofone's moncy.
have become victims ofsuch frauds following their instructions. Never do
that.
2
3
FRAUD BY REQUEST MONEY QR CODE/LINK FRAUD DURING COVID.19 PANDEMIC
oN GOOGLE PAY/PHONEPE/PAYTM
*fl,*m,
Cyber fraudsters send debit links or QR codes to victims to scan and rL'ceivc
money in their bank accounts through Google Pay/PhonePe/Paytm. But
(S mrt rtrrs
"oih rqa [orning App' W
I€.
instead of receiving money, it actually gets debited from the victim's account as
fraudsters actually send a request money QR code/link.
qlrql0 6 qttn. srrqr 3lcfiti. 3116{-6
rdffi C
dlqn or ara o'rd iilram oqri 6{i qrd tq rRt
1!':t qqc/ir-{Ri d oi rq rt I o
fr, T
r

I I

I
{Ir{{ swti. dri 6i 3trr4 ,nA 6{r{
d d-{drrr h I ft}rr 6{i * Frq wet t
Fraudster calls the vendors
or ony shopkeeper or
businessman & requests for
V i c tim s ho res
mobile number &
receives a request
reg iste red
I
'Iltt l)ll r orlt ts
,ltl)t\1\l wtllt It)
nltkr il l li ltlir \ il
il ts l0t t t rltl lhourth
ai t, s-a M a ara ora i fu-5
hin qc$ ritosc rYfr tr
rt$ 3nrfui /tfi am frffia
i htr 6t ut{ aRa as ai s*( i rtsrsq
I
r,
$ $ I 4
Coogle Pay or PhonePe money link or QR code
lu
tq i frt* ori t rtl t
registered mobile number t lly tl t\ l t'tlrllil u,,u.ruJ,cVbercrime.gou.in

for moking poyment

6:t fm"
O rorr rnrnr K THIS CALL IS FRAUO.
BErlANE OF FNAUOSIERS!
I
Q t*t**a**
Just now my fraend recoived a call

d
lnsteod of recieving money, l'tt ltr,t t!tuttt t \ t lt' lt'\ I
.il*Frlemddtrr1
FrdJ4.*'

Q f"fdri9 1".
lrom ,r l.'.",Lrlr.i:l i.' asking him to
press l i, he had vaccinated. He
pressed 1. lmmediately the Phone

It
'{.hdbt w8s blocked S) and his Phone had
victim ends up paying tttt \\ttlt l t\ t't\\'tl t)n Ill tnft*oc.d/.d. t been hacked. So be ca
to the fraudster vio I ltltrtttr' ttrttttl,, t
r r'r 1t: t r't r'r
lnfor r fnryb'*ed you g€t slmilar calls 'dtrotr a
request money QR code
or link
rytllt t,tt'\ ltttltli ttt t ttttttl
b!*tutbrtu tr. colleague). Msg
F But be alert. Also

E
i

citizens. ,-and tri€n t


?t 1*
"k**d V
Never accept/click on any link or scan any QR code from unverlfled sources
as they may send you a manipulated one.
For receiving money, there is no need to enter MPIN or UPI PlN.
A
larP
o
hrfrs#'
I
o
I ffi
#PlBFaclCheck

5
q SeronqWaW
fufic.rcW*nE q ltuilafrsrH FRAUD USING GOOGTE DOCS APP
Apps for online [orms lil<e Google Docs etc. are widely Llsed to collect data.

ry ry
Irraudsters take advantage ofsuch applications ancl nrisguide the vjctim to fill or
subnrit his/her confidential bank rclated data like ATM nurnber; llpl plN,
password ctc. As soon as they fill up thc forn) and submit thcir data, it is clirectly

E I E
tra nsferred to thc creator ofthe fbrtrr.

Iraudn r.r.l!ln|C@ld,. hmk..an


uinl
oDPo.uolty to rhadvr lnn .rnt clt&.nr
EIr.q ltrrE t| rifit itvEftr ihi Gl
v.riou! ucti6 llt. ofhrlq
alloranaa
hL amdoF.nt
crilnrlital tr, FiI
dll
arlIF

lrtrid tmrn arlrn0 qnr dfi l{lt ft


S,
.rl ro rallnrr on F,*a w.tdt$ ruah .t
Tll.y ln.,
"tr.dh.nmrnrri b.ro4ar th.tra yojn.' o. rnay r.'d trullftuc d I nq q xl I q qrqrrr.
L|l r.tln atlon mqust tirouglt S, cr l cr fl!qlfitrl {iltql d!*a t rllr tdl ((trF!
r8hlcdlr I
o t ?n hl fi.d|. phthrmr
Cyber crimlnals send a
AYold napoodlnl/.llcUlt .ny luai n ini M t rit d lttlHl$ rrq t irta link for Google Docsform.
i.ll,tm.aaa!!/.ln.lk or ndlll.l! tl.lt .nd do not tt(rtqtrltr/ tulltrdnrt[t I rft rqi
They misleod you by
lhan FUr panooal datalb
qfiFF rEdl irn r dl writing
it is Ior money refund -
l'IT
I
c
w
r"
--{OvEAFFAtes
I€ @ Cyber criminals misguide the
victim to fill or submit
s/ h er c o nfi d e n tia I bo nk
hi

related data like ATM numbet

K'tech ' \
b t
6r t:t
I ,
UPI PlN, passwords etc.

!o0f h dcc.iYrd b, luclt St S rd m.ll3


wltr mdhlou! [ib'i . Clwli tr.
ody pod.l ur.d to nettat
h

REGISTER FOR COVI}VACCOIE


frcm r0€ t8+
Rlgist€. lor vaccine ush9
Y.ccl hn
fo, CoYlD.l9
. lhnl cllct m u*mrn llnlr, vlrlt olficld
wrt|ha tor llcclna raglflardlfi,
d
Cyber fraudster then
JI
As soon as the victim
. siphons off money from tht submits the form, conlidential
CoV|}19 rpp. IIrr. h m.uthodrd mouh.rp/r.hlf
Dorn{oad fmm below. victim's bankoccount dota is received by
tor l.glrlrtl| lo. vrcll|ltlor h tidll using the credentials

E
Lhk hnp://rirY.cc/C0\,DVACCNE the cyber froudster
.rclpl Arogr. S.E xd Co.Wn

V
\,1 o N ever share confidential banking details in onlin e forms Iike Google Docs.
I
o
f-r rGorl{ I Bank never asks their customers to fillsuch forms.

7
FRAUD THROUGH FAKE CASHBACKOFFERS
Cyber fraudster uses the e-commerce platforms like Olx/Quikr/Facebook for Irraudsters lure victints by offering cashback offers flonr PhonePe/Google Pay
publishing fake advertisements to sell commodities at lucrative prices When ('tc. :rnd request the victims to clicl( on a request moltoy link or scan a QR code to
someone intends to buy, cyber fraudster asks for advance payment in the form .rvail the same. Once the link is clicked or QR code is scanned, moncy is debited
of packaging/transportation/registration charges etc. Buyer Pays the nroney lrom the victim's bank account instead of being creditcd as he enters MPIN or
believing him/her to be a real seller and the fraudster disappears with the llPI PIN. Link can be of type http ll8629a7f l.ngrok.io or SMS
money. Frauds are also committed by ryber criminals posing themselves as I5 3 3c608933b85f4 4Ba7 428b4365aO42ae6
buyers to real sellers. In this modus operandi, cyber criminals get the seller's
account debited on the pretext of paying advance money by sendlng request n
money link/QR code instead ofthe creditlink/QR code.
a
:!!:'
I
+ r ilr"" "- + f. & OR
=$:
fr EfETT la 4a
Cy ber c r i m in o ls co n to ct Froudsters then use the
Froudsters lure "0
Army / para - m i I i tary fo rce victims by offering
per son nel u p I oad com mo dity these personnel & get id prool & other documenLs cashbackofers OR
(v ehicle /fr idg e / mo bile their id prool canteen of army / poro -mll lto ry fo rce

+
Fraudsters
phone etc.) to be sold on olx smortcard and other personnelos thelr own Do nt
get confused ? 2000.oo
mislead by
/Quikr/Facebook etc. documents on the & post loke adv for sole by whot is disployed here editing the QR
pretext ofbuying the on 0l x / Qu I kr/ Foce boo k e tc.
code by writing

t
advertised item 'poyment refund':

r> "money receive"

I o etc. instead
of"p1y"

On the pretext of GsT/transportation charge/ lluyL't' st't'itr.tl t1l I t ttt I t|t' lrt tt t
hints(!ll rottltI l \ t ln' I t tt tt l\l t' t'
fi
lnsteod of receiving money,
v ictim hi m se lf/ he r se lf pay s
.2,OOO
t

'oo
Victims don't
pay attention to
what is written here
p qcka g i n g ch o rg e/ re g i statio n cha rg eT I P S/ oth e r t
to the fraudster via q
advances, fraudster keeps duping the victim tussutrtit4l hitn tt rt rtnv/ request money link or QR code Ei
ofhis/her money until the victim reolizes the frqud lot' -t iIitttt'y Iot't't' It t st)tttt(l after entering MPIN/UPl PIN

E Never pay advance moneywithoutseeing the article physically and meeting


E
. N ever forward /click on any s uspicious link from u nverified sou rces.
the seller in person. . Remember the thumb rule: You need to enter MPIN or UPI PIN only for
For receiving any type of payment via link or QR code, there ls no need ttr
debiting morrey from your account; it is never required for receiving money,
enter MPIN orUPl PIN.
Always remember entering MPIN or UPI PIN is required only for paying
money.
;: SIM CARD SWAPPING FRAUD
Cyber fraudsters on the pretext ofaiding or citing the policy ofa company guide It is a type of identity theft where cyber criminals manage to get a new SIM card
the victim to install screen sharing apps like Quick Support/Teamviewer/ issued for your registered mobile number through the Telecom Service
AnyDesk etc. and thus get control of the victim's phone, thereby getting access Provider. With the help of the new SIM card, fraudsters get OTP & other
to banking credentials like OTP/MPIN/username/ password for internet confidential details required for financial transaction from your bank account.

I
banking etc. The fraudster then siphons off money from the victim's account
using those credentials. By the time the victim realizes it, a lot of money is
already siphoned off. F f5

AnyDesk
a> Jn
+
JI
+
.-J
+
i
I
People contact Iake OR
Cyber criminals Cyber criminals call In furtherance of Victim forwards
customer care number
get a blank SIM the victim pretending their fraud, cyber the SIM no. from
of bankor e-commerce
platforms after [lr.-v,n ' card from retaile\ as customer cofe criminals provide his mobile phone
who is olso a executive of a TSe one SIM no. & ask considering the
searching it from
Froudster gets qccess gang member to initiate 4G SIM the victim to send
Google search engine OR froudster as
to the victim's phone upgrodation by that SIM no. genuine customet
Victim shares
& steols banking themselves otherwise through SMS to care operotor of
the codewith
Quick Support credentiols services oftheir SIM customer care the TSP
thefroudstet

Froudster, posing os a
customer care operator,
willget blocked

SIM Card
number to avoil
the services
t
asks the victim to install I Swapping

any ofthe above screen


shoring apps and share the
L
t
E qD)
code to ollow victim's screen
access to help him
I Now, the cyber criminal is able to
occess o
the bonk account detoils
The TSP closes the
services of victim's
Froudster tronsfers linked to the victim's mobile old SIM qnd issues
money to his occount number and withdraws the money the victim's mobile
without the need of shoring number to the blonk
the OTP by the victim SIM card

H Never install any screen sharing app when asked to do so over a phone call
E Never share any information related to your account and SIM over a phone
call. The zo-digit SIM number mentioned on the back of the SIM is a very
by customer care,/help desk representative ofany entity. sensitive data.
Banks/E-commerce entities etc. never ask to install third party application Ifyour mobile number is inactive/out ofrange for a few hours, enquire from
your mobile operator immediately.
for screen sharing.
Register for regular SMS as well as e-mail alerts for your banking
transactions (this way, even ifyour SIM is de-activated, you shall continue to
receive the alerts via your email).
FINANCIAL FRAUDS USING SOCIAT MEDIA PTATFORMS .:!

FRAUD USING FAKE SOCIAL MEDIA ACCOUNT Live video chat is done on Facebookvia Messenger by cyber criminals posing as
Fraudsters target accounts on popular social media platforms like Facebook female. Cyber criminals convince the victim for video call in compromising
and Instagram. They commit fraud by creating a similar fake account of the positions, following which fraudsters take screenshots ofthe sameordoscreen
target profile and requesting his/her friends for instant money transfer citing recording ofthe video call. Cyber criminals then threaten the victim to circulate
some medical emergency etc, Target profile's friends transfer the money the photographs/videos in compromising positions on various online
considering him/her as his/her friend. By the time the target profile comes to platforms, ifthe demanded money is not paid.
know of it, many ofhis friends become victims ofthe fraud. Similar fraud is also
committed by hacking the target account.

E
I_ I

$,
b
n
+
t
'tS 'fS + l[:
lrI
[-- J
,l
a

E Or + o '"
I_
+ 6 chs

-
EiiilHn

A similor profile
rE -E-!

Originol Fake Facebook


i-t
l- ,I

Sends request to
Cyber criminol sends
friend request on
Mqny a times cyber
criminols odvise the
After several chats,
cyber criminol
convinces the
victim to come for
of target social Facebook profile profile creoted those who are in Facebook bosed on victim to downlood video calling
media account is using the some the friend list of the videos and posts several types ofvideo
creoted by a fraudster disploy picture the impersonoted liked by you chat 0pplications

:---'* "'i?
occount +
J: Cyber criminalstarts
t-
L
fi
blockmoiling victim & \

fi
extorts money or else threotens
to uplood noked photo on porn
websites, YouTube etc.

lfanyone sends money


-
lmposter contacts those in the friend list of Person sends money Cyber criminol seduces the
without verilying from one's impersonated account via Messenger & then requests infear and becomes a victim to go naked and then
friend, he/she becomes o for money on the pretext of some medical emergency. victim ofblackmoiling saves the screenshot or screen
victim of the froud He provides PhonePe/Google Pay/Paytm account or o & extortion recording ofongoing video call
in which the victim is nude

E
bank occount for moking poyment

.
o
Keep the privacy setting as "My friends" only.
Before transferring the money requested via Facebook, WhatsApp or other
E
o
o
Avoid friendship with unknown people on socialmedia platforms.
Never make video calls to unknown people on Facebook or any othersocial
social media account, verify the authenticity ofthe message by meeting the
mediaplatform.
concerned person or calling him.
. Turn on 2-step verification for all your social media accounts.
o Keep your password strong and maintain the privacy ofthe password.
2 13
OTHER CYBER CRIMES USING SOCIAT MEDIA PLATFORMS
HARASSMENT THROUGH FAKE SOCIAL MEDIA PROFILES Cyber bullying is bullying with the use ofdigital technologies. It can take place
Cyber criminals morph the photographs ofthe victim which they get from social on social media, messaging platforms, gaming platforms etc. It is a sort of
media and upload it on social media platforms. After that they demand money repeated behavioui aimed at scaring, angering or shaming those who are
to remove the morphed pictures from social media. Victim falls prey to the trap targeted. Examples include: spreading lies about or posting embarrassing
and transfers the money,
photos of someone on social media, sending hurtful messages or threats via
messaging platforms, impersonating someone and sending mean nressages to
a others on his/her behalf.

, a E
r o
r5 G E
Victim usuolly accepts oll
the friend requests without
knowing the person sending it.
OR

b,
Because ofpoor privocy settings of
the victim's dccount, everyone has
access to his/her photographs or posts
on social medio platforms which cyber
criminals take advontoge oI
I
Perpetrotors ofcyber Perpetrotors of cyber bullying
bullying (usually known to create a fake occount either in
the victim) get the personol the nome of the victim or a
photographs and detoils of random name &post severol
the victim from various memes ond videos moking fun
sociol media sites of the victim, which goesviral

E
Cy be r c rim i nal s d ow nl oa d
photogrophs and create afoke occount
impersonatlng the victim and upload the
morphed obscene photogrophs etc.
hqrassing the victim . Learn about the privacy settings ofthe social media apps being used by you.
. Ensure your personal information, photos and videos are accessible only to

H Social media sites offer privacy settings to manage who can viewyour posts,
.
.
yourtrusted ones.
Think twice before posting or sharing anything online - it may stay online
foreverand could beused to harmyou later.
Make your children aware that cyber bullying is a punishable crime so that
photos, or send you friend request etc. Restrictaccess to your profile. neither do they indulge in cyberbullying nor do they Ietanyone bully them.
Ensure your personal information, photos and videos are accessible only to . Report hurtful comments, messages and photos and request to the
yourfriends. concerned Social Media Platforms to remove them. Besides,unfriendlng,,
you can completely block people to stop them from seeing your profile or
Refrain from making friendship with unknown persons over social media
contactingyou,
platforms.
T4
CYBERSTALKING OTHER CYBER CRIMES/FRAUDS
Cyber stalking is online stalking. It involves the repeated use ofthe internet or ATM/DEBIT CARD CLONING FRAUD
other electronic means to harass, intimidate or frighten a person or group. Each ATM/debit card has a magnetic strip in it containing confidential data,
Common characteristics of cyber stalking may include false accusations or Cyber criminals use a skimmer machine to read this strip and capture the
posting derogatory statements, monitoring someone's online activity or confidential data related to the card. Then they copy the data onto a blank card,
physical location, Cyber stalkers may use email, instant messages, phone calls, which is used for fraudulent transactions. They use overlay dev ices/pin-hole
and other communication modes to stalk you. Cyber stalking can take the form camera/ spy camera or peep from behind in the queue to read ATM/Debit card
ofsexual harassment, inappropriate contact or an unwelcome attention in your PIN while it is being entered by the user on the ATM keypad/POS machines.
life and your family's activities.

s'
Victim uses check in feature of Stalker keeps a watch on the
Sffr
Dato ofATM cqrcl
skimmedwhile
withdrqwing money from
l>
Cyber criminals rewrite
the ATM card dqta on a
blank ATM card, thus
H
Withdraws money
using cloned card
and peeped PIN
social media to inform one's posts of the victim from
ATM kiosk & Cyber cloning. Nowadays, they far off ATM kiosks
friends and followers about his/her Criminol stealing the PIN are dlso cloning ATM/debit
whereabouts ( locations, places ) by peeping from behind card ddta by guessing the
and also about onee future plans card number & PIN
on social media platforms

Stalker takes advantage of


the future whereabouts of 0 "E I
the victim and intimidates
0
or frightens him/het when
the oppoftunity is ripe I

E
. Enter the PIN yourselftaking due care to hide the PI N (as in image 1).

H
. Be careful while uploading your personal information, photos and videos
o
.
.
Check for hidden cameras/skimmer devices while withdrawing cash fas in
image 2).
Physically checkthe keypadto ensure itdoes nothave an overlay device.
Do not allow anyone to stand beslde or behind you while carrying out
on social media, Ensure thatthese are accessible onlyto your trusted ones. transaction with ATM/Debit card/Credit card.
o Never add unknown people to your friend list. . Do notkeep a PIN which can be guessed easily. Keep changingyour PIN.
. Review all the privacy and security settings of social media and restrict
t Ensure you get transaction receipt or confirmation through SMS.
. Ensure that any part ofthe ATM machine is open or loosely attached.
them to "my friends only".

17
RANSOMWARE ATTACKS
Cyber fraudsters edit the customer care number of banks/airlines/food
outlets/e-commerce entities etc. on Google page and customize it in such a Ransomware is a category of malicious software which, when run, disables the
manner that whenever someone searches on Google for the customer care functionality ofa computer in some way. The ransomware program displays a
numbe4 the edited number of cyber criminals appears on top of the search message that demands payment to restore functionality. The malware, in effect,
results for that entity. Victim ends up calling the fraudsters instead ofthe real holds the computer system to ransom. ln other words, ransomware is an
helpline numbers. The fraudsters portraying themselves as helpers actually extortion racket. Ransomware typically spreads through phishing emails or by
give instructions to dupe the callervictim. unknowingly visiting an infected website.

ro';'''
State Bank of lndia
Suggest an edit

/'

\ i-
bruic*lt.'br.dtc.iir
.*dbfuhrffuldb.oro.t
ltftcd qf xrlara. + t

Fraudsters take benefit of


'Suggest on edit" option on
the Google page
Cyber criminals send an email to
-
Once the infected file is opened,
the victim contoining s(spicious victim's system gets locked ond oll
attachmeht or phishing links. files get encrypted, Alert messoge on
VIctim downloads the attachment computer screen demands ronsom to
ond opens the Jile be paid to unlock the screen or
n Froudsters feed their own
b number as the bank's
helpline number. People call
encrypted data

IE I ta on the edited number


assuming it as genuine & get
defrouded by following their
instructions

Always search for customer care number from the official website of the
bank/airlines/food or retail outlets/other e-commerce entity and not by
searching the entity name on Google search.
E Do not open emails from unknown sources containing suspicious
attachment or phishing links.
Toll free number for any bank is given on back/flip side ofdebit/credit card. Keep your antivirus up-to-date and windows firewall turned on and
Call on the given numbers only. properly configured.
Always remember that Google does not give verified information on Back up your most important files on a regular basis. Keep the important
searches. data on a separatehard disk.
Have properspam filters enabled in your e-mail account.
18
-.:
JUICE JACKING (victim) that
Cyber fraudsters send e-mails/SMSs informing the recipient
Juicc jacl(ir)g is a l<ind
ofcybel fiaucl where clata is copied from a smart phonc,
he/she has won a lottery/prize worth millions of rupees/dollars and the
tablet or other clcctron ic deviccs using a USB charging port that is actually usecl
recipientonly needsto clickonthe Iinksenton their e-mail/mobile phone or to
fol botlr data connectioll ancl charging. The victim llelieves it to be a charging
tell how they want to receive the prize money. However, on responding
llort only. positively, the recipient is asked to pay money in the name of
registration/shipment/service charges, GST etc. one after the other for
releasing the prize money. This way the recipient keeps on paying the

'
fl fraudsters until he/she realizes the fraud The fraudsters were initially mainly
from Nigeria and hence the terminology.

j3
I

Hocker uses the same charging point to steql


dato through USB port using dota coble

Froudsters give
information through
email/SMS/coll to the
+
lf the victim replies
positiv ely, fra u dste rs
then ask how they
+
On
I
klling the mode
receiving, they then
ask for registration/
of

!I
victim obout the prize would like to receive shipment/ se rv i c e cho rg es,
money won by them the prize moneY GST etc, for releasing the
This type ofsteoling through lottery prize money
Victim's mobile/device
of dato from the
plugged into a chorging
port at o public place
victim's mobile is
called luice
6r
lacking

The person (victim) falls into


the trqp and sends the moneY to
the fraudster one by one until
he/she reqlizes the fraud

d
E
. D isable data transfer on you r phone while charging.
E Never respond to calls/SMSs/e-mails related to winning a lottery/prize or
seeking personal or financial details.
. Switch offyourdevice before charging in public places.
Have proper spam filters in your email account to stop receiving unsolicited
. Carry your own portable power pack/bank.
emails.
. Buya data disabled chargingcable. Follow the thumb rule: Never transfer funds to unknown persons or entities
in promise ofhigher returns/winning prizes or lottery
2L
COMPUTER OR DEVICE HACKING
Cyber criminals advertise fake job offers using various platforms either online
IIacl<ing is thc act of gailting nccess to a conrl)utcr/device without lcgal
via hke websites. Victim, in search of a iob, goes through these fake job offers
,rLrthorisation. Cybcr criminai rrses various nrethods tbr ltacking a victirn's
and contactthe cybercriminal. Upon contacting cyber criminals, victim is
asked t onrputer/device slrch as jnfecting a contl)Llter/devicc lty :r vinrs or ntallvare.
to pay registration fee or make an advance payment (which they claim is I lilcking may lcad to data co rruptjon/d eletjon or data Ioss
refundable) to avail their services for getting a iob. Victim transfers the money ol- stealing ofclata.

and follows tle guidelines ofthe fraudster for getting a


rob and falls prey to the
cyber crime. In some cases, a fake website phishes financial data through a fake
pa5nnentchannel.

+ OR

Cyber criminqls send mqlicious Victim downloods the ottachment or apps


attochments to the victim from an un-trusted website at'ter which
People share their Cyber criminqls contoct victims
Tech-sovvy cyber hidden in the form of his/her computer/device geB infected
data on different using these data and in the
criminols creote Iqke a ttrac tiv e adv ert[ se m e nts with the virus
websites or sociql name ofproviding a good job,
they demand money such as websites to steol
medla platforms in
search ofjobs registration fee, service charge, financial detoils
etc. while never intending to through foke
provide a job payment chonnels

*
*
Victim has not instolled qny antivirus
Victim ends up into his system ond ignored the standard
losing/paying money for a security feotures. Victim's system starts
job which didn't exist working slowly and later he loses his
personal photos, videos ond other
important document

E To avoid such frauds, it is necessary to submit your application to a


E
. Computers/laptops should have a firewall and antivirus installed, enabled
registered website only. and updated with latestversions.
. Never download or install pirated software, applications etc. on your
Do not make any advance payments for getting a job.
computer, laptops or hand- held devices.
. Always scan external devices forviruses, while connecting to the computer.
. Be careful while browsing through a public Wi-Fi and avoid logging in to
personal and professionalaccounts while using public Wi-Fi systems.

23
@:''
Mobile applications may be mediums of cyber-attacks, stealing ofconfidential
REMOTE ACCESS APPLICATION FRAUD

data or mode of getting access to the controls of your phone/device People


download mobile applications from unknown sources ignoring security
warnings. These applications may have viruses which pass sensitive
informaiion or give control ofyour phone/device to some outside agent' who
gets access to your contacts, passwords, financial data etc' Several mobile
Ipplications from unknown sources ask for unnecessary permissions for
ffi f6 q'{Kq
s MINISTRY OF
HOME AFFAIRS I€
,.."., to your phone/device, which one grants without due diligence' Thus'
these mobile applications can access a huge amount of personal information'
photographs etc. from your phone/device.
Beware ol KYC/
Bemote access App Frauds

II + + Iil Eeware hautulent


w-rifualist.
9ttl5 or calls peftaining h Klt

s
Victim, a habitual user of Cyber criminals take
certoin mobile advantage of this qnd
applicotion downloads ottqck the victim's device Q Ih not sfrare personal details on Sfil|/Pfione.
by infiltrating into it using ttnt gur arcou wi
the mobile applicotion O yutf rereiw any tti slding get
the 0pplicstion. TheY
ignoring securitY
wornings ond/or grants infect the op\lication with blo ed or suspemled, if KY( is not tmfleful, tonlad iltffi
u nn ecesso ry pe rmi ssi o n s
malicious sofrware and rushmr care of lfie baafr/e-wallet/suvke pnvida for
get access to the victim's
to the application, which
is not required in the
functioning of the oPP
messaget cqmeros)
contacts, Photos etc. for
malicious activities
1
CKY| can onty fu cuillr:tett dt aulfiorized KYC Pfi s N

E]--Ilrrr* in.tull ,pplications from trusted sources like for Android devices'
;;; e;;;i; Piry,'f6rApple devices use App Store Please ensure thatthe app A rc*
I

fu*toud uog App hF,e


by autfwized represenlalive,

Qutfrsupyt, Anydesfr u
a
is havins Plav Protect shield.
. ii iih.o'i.pir.tant to read reviews about the app lfit has a negative review
."rJ **"i" see if anybody noted any securiry concerns like bugs or
Qfud
TeanViewer ek, for KYC

Apps gires renote arcess


on elion.
h gour fuvkes. wfikfi
hni arru
o
unencrvDted Dasswords.
dbvs fraulslers h fimw your PN, 0fP, =*
tHaik ek for canni ing haul.
. u;;;i"'y;;..;ft*are and mobile applications on a regular basis so thatyou
don't miss on important security patches 4
. g" irt"frl while granting app ir6rmissions like a document scanning app
a"*'""i."qri.? perm"isiibn to access your location,
Som"ti.ut applicitlons are filled with spyware
.call
logs etc'
and other types of
www.cybercrime.gov.in | @cvburdo,t
malware.
25
CYBER SAFETY TIPS FOR CHILDREN
MATRIMONIAL FRAUDS

T6 l[{rdq
ffi
o MINISTRY OF
Do's
@ HOMEAFFAIRS
When you feel

L- _.-J
uncomfortable with any
social media post/mail/
chatting, immediotely
share your concern
withyour parents
How to detect fraudstels on matrimonial websites? or ony trustworthy
person
ln case of any of the following, please be careful:

o lf o person is reluctont to come on video chot or to meet in person,


he/she con be o froudster os the profile picture posted on
motrimoniol website moy not be of his/ her.
Real life etiquettes
o
Password should be
A froudster moy express his/ her love in just o short spon of strong with alpha- and manners apply

o
ocquointonce. numeric symbols
and special characters
,flr equqlly to the
virtual space
Froudsters will usuolly coll from multiple numbers. He/ She usuolly
don't give o number to coll bock. Even if he/ she give o number,
they don't pick up when you coll. Loter, he/ she colls you bock from
e -fF
o new number.

o lf o person enquires obout your finoncioi stotus ot initiol stoge of


interoction. Always add persons
whom you know in

o A Froudster moy not hcrve o sociol medio profile or hove few friends
on socio medlo.
real life & with the
permission of
your porents

$
q {rt
a

27
CYBER SAFETY TIPS FOR CHILDREN CYBER SAFETY TIPS FOR PARENTS

DON'TS Do's

Never shore your


personol details like
oddress, phone number, Have on open
date ofbirth etc. on any conversation with your
online platform such os kids obout safe
Facebook, lnstogram, browsing ond
Blogs, Twitten chat- Moke sure that your computer use Check online octivity
Don't sign up for rooms etc. Do not respond to
children understand olyour child on
sites that require a indecent/ofrending/
that they will not get Facebook WhatsApp etc
certain age criteria horossing emoils/
into trouble if they especia I ly if you noti ce
Ior registration chots or posts
tell you obout their a sudden change
problem in behaviour

Don't buy anything


aa
- Never shore Explain it to your
? Educate yourself
online without
discussing with
,
your occount
passwords with
child thot oll sociol
networking profiles !? also on social mediq
safety ond have
your parents anyone must be set to open discussions
private with teens

Don't add people qs


online ftiends unless
J TL,

Do not post indecent/ Keep computer in an


fi lfyou hove found
inoppropriate content
offending/ harassing open area. Make a
you know them in real aboutyour child,
emails/chots /posts rule that doors are
life or have metthem please contqct the
Never ogree to meet on sociol media plotJorms always left open when
in person nearest Police Station
an online friend unless kids are online
qt the eorliest
Tellyour children to
and until you do so
immediately exit ony
underyour
parents/guardian's site that makes them
guidance and feel uncomfortable
or worried
supervision

28
CYBER SAFETY TIPS FOR PARENTS CYBER SAFETY TIPS FOR WOMEN

Do's
DON'TS

Be selectiveabout what
information you make
public. Sensitive
Don't allow your
child to have informotion includes
sociol media reol nome, dote of birth,
genden town, e-moil
occounB ifthere
address, school nome,
is an age limit
Periodically review place ofwork, and
for the same Block people
your internet personolphotos
you don't
contacts ond want to interoct
online activities with

Do not let young


children browse
? Don't allow your
On social media On WhotsApp ond othet
'Google' or
search engines
other l? child to use apps
like Snapchat that
occounts keep your
privocy settings to the
messoging opps, ensure

unnecessarily without immediqtely delete


most stringent levels.
\ that'medio outo"
download' is
the posts

fi
supervision Only share information d ea c tivd ted, es pec ia I ly
about yourself on 'need from senders who are
to know'bosis not in your contact list

Do not reploce Be extremely cqutious


Usestrong passwords
physical parentql while posting
and use different
supervision of photographs and
Contact the neorest passwords for
computer use ot home control who con
Police Stotion different accounts
with ony safe seorch view them
immediotely if you feel
engine or any other tool your privacy/safery has
been compromised
online. You can also
reportyour problems
online at
/
http s : / cy be rc ri m e.g ov.i n

30 31
CYBER SAFETY TIPS FOR WOMEN
GENERAL CYBER SAFETY TIPS
GENERAL CYBER SAFETY TIPS

DON'TS Keep your antivirus and operating system updated at alltimes.


Backup your sensitive/important data at regular intervals.
Be careful while opening suspicious web links/URLs.
Never, try to meet a Always scan external storage devices (e.g. USB) for viruses, while
person with whom
you've interocted only
connecting to your device,
online withouttaking To prevent unauthorized access to your device, consider activating your
somebody else along wireless router's MAC address filter to allow authorized devices only,
and such meetings must Wireless router can screen the MAC addresses of all devices connected to
always be in o public
Don't shoreyour it, and users can set their wireless network to accept connections only from
place Don't trade
possword with anyone devices with MAC addresses recognized by the router.
or let anybody else personal information
Secure all your wireless access points with a strong password. Hackers
handle your occount for "freebies."
usually scan for open access points and may misuse it to carry out
unwanted activities. Log records may make you more vulnerable for such
misuse.
Merely deleting sensitive material is not sufficient, as it does not actually
Don't qccept "friend
Don't post personal remove the data from your device. 'File Shredder Software, should be used
requests" from people
totolly unknown to L informqtion such as
to delete sensitive files on computers.
you qnd from those mobile numbers and
Delete unwanted files or data from your computer device. It prevents
with whomyou don't \ ry
personalemail ids on
wont to interact with
J socia I networking sites unauthorized access to such data by others.
:
t ? Use 'Non-Administrator Account' privileges for login to the computer and
avoid accessing with Administrator' privileges for day-to-day usage of
computers.
Don't share any Don't accept a ftiend Make sure to install reputed mobile anti-virus protection to protect your
OTP or other request only on the
mobile from prevalent cyberthreats and also keep it updated.
posswords, even basis that the person is
a mutual friend ofa
In case of loss or theft of your mobile device, immediately get your SIM
with friends Don't click on
unsolicited links sent friend ofyours deactivated and change passwords of all your accounts, which were
over Facebook configured on that mobile.
messenger or other Do not leave your phone unattended in public places and refrain from
messaging services,
sharingyour phone password/ pattern lock with anybody.
even if they ore sent
Always enable a password on the home screen to restrict unauthorized
from your friend's
account access to your mobile phone. Configure your device to automatically lock
beyond a particular duration.
Always lock your computer before leaving your workplace to prevent
unauthorized access. A user can lock one's computer by pressing ,Ctrl +Alt
+ Del' and choosing'Lock this Computer' or "Window button+ Ui
Remove unnecessary programs or services from computer which are not
required for day to day operation.

32
I FOR SAFE INTERNET BROWSING
. Beware ofvarious fraudulent lucrative advertisements regarding d iscount . Always use virtual keyboard for accessing net banking facility and log off
coupons, cashback and festival coupons offering payments through Upl
from banking portal/website after completion of online transaction. Also
apps popping u p wh ile browsing.
. ensure deletion ofbrowsing history from web browser after completion of
Some URL links on the internet are advertising to provide fake mobile
online banking activity.
Oxymeter apps to check your oxygen level. Do not download such fake
Oxymeter apps on your mobile, as these apps may steal your personal or
. Use multiple factor authentications for login into your bank accounts.

biometric data from your mobile phone.


. Avoid writing down or storing in mobile phones the information used to
. Avoid using third-party extensions, plug-ins or add-ons for your web access digital wallets/bankaccounts.
browser as it may trackyour activity and stealyour personal details. o 0ne should not use the same password for internet banking ofall accounts.
. Always browse/visit the o riginal website for purchasing. . One should not keep the same mobile number registered for all bank
. Always type the information in online forms and not use the auto-fill accounts.
option on web-browser to fill online forms as these forms may store your o Always enable getting notification oftransactions from the banks via both
personal inforntation such as card numbe4 CW number, bank account SMS&e-mail.
number etc. . Login and view your bank account activity regularly to make sure that
. Be careful about the name of a website. A malicious website may look
there are no unapproved transactions. Report discrepancies, ifany, to your
identical to a legitimate one, but the name may use variation in spelling or
bankimmediately.
a different domain (eg.,Idot]com,
.
[dot]net etc.J
ln general all the government websites have Idot]gov[dot]in or
. It is preferable to have two separate e-mail accounts, one for
communicatingwith peopleand anotherforyourfinancial transactions.
[dot] nic[dot] in ending.
. Avoid clicking'Keep me logged in'or'Remember me'options on websites,
especially on public computers.
. Beware of fraudulent charity activities or non-existent charitable
FOR E-WAIIET SECURITY
organizations having names identical to government charity funds, . Enable password/PlN on your mobile phones, tablets & other devices that
requesting money for victims, products or research. Always check the you use.
credentials of charity organizations before donation. . While doing transactions using your e-wallet, you should never save the
. Never allow the browser to store your username/password, especially if
details ofyour debit or credit cards.
you use a shared computer device. Also make it a habit of clearing history . Use multiple factor authentications for logging into your e-wallets.
from the browser after each use session to protectyour privacy. .
. Avoid writing down information used to access the digital wallets in
Be cautious with tiny or shortened URLs (it appears like
mobile phones.
htlpt/ /riny.cc/ba1.j5yJ. Don't click on it as it may take you to a malware
infected website.
. Install e-wallet accounts from sources you trust. Do not install e-wallet
. Prior to registering on a job search portal, check the privacy policy ofthe apps via links shared over e- mail, SMS or social media. Always verify and
website to know the type of information collected from the user and how it install authentic e-wallet apps directly from the app store fGoogle/ ioS
will be processed by the website. store) on your smart phone. Please check if the app is having the ,,play
. Many social networking sites prompt to download a third-party Protect" shield.
application that lets you access more pages, Do not download unverified
third-party applications withoutascertaining its safety.
. Beware of e-commerce websites and advertisements selling items at
highly discounted prices.

34
SOCIAL RUMORS :

. Never keep the same password for all your e-mailaccounts.


.
.
Use secure network connections,
*, Government is dolng no such thingl
Avoid the use of public Wi-Fi networks. More secure Wi-Fi connections
require passwords & are easily identified as,,WpA or WpAz,i Highly ffi All crlls m rxorded
insecure Wi-Fi is open for anyone to connect to & may be labelled as a
"WEP" (Wired Equivalent PrivacyJ.
All phom call retordings sa,red
. Don't click on the links provided in suspicious e-mails even if they look
genuine as this may lead you to malicious websites and this mav be an
WuMpp is monrtored
attemptto defraud your hard earned money.

Twitter rs moniloted

t I
o
.
Never leave t}le discarded photo copy ofyour identity proofs at shops.
Never allow the shopkeeper to keep a copy ofyour identity proofs in
computer.
tleir
Facebook

All socral media


rs monrlor

r
I
rumJ Jre monttor

. Never share your identity proofs to unknown persons on social media


lntorm thore wh n
platforms including WhatsApp.
. Never share your property papers or other personal information on social
Your devtces ,re e a1
mediaplatforms.

FOR PASSWORD SECURITY


Iake (are not to se
ry essa9e9
+
. Keep a strong password of at least 13 characters with alphanumeric, lnform you, children, ,*or,,f,,m*o t0 ta
special character, upper case & lower case combination.
. Keep two factor authentications for all yo ur accou nts. Don't forward any postr or iE politics/preseot
. If you suspect that any of your account has been hacker], immediately ,tuetDfl about GovemmenvPM 9l

change the password and contact the nearest police Station.


fulicQ hat/e put out a notiliation termed ..Cyter Cnm€... and eclon will b€
t ken-jun donl delete .-

Io check ifany CentralGovt. rehted Polhy/Schemer is a factor nol.

&ntaclljs Oflffied q18mfl 12$ n/ffird$d M phchhd@gm*Lm

36 37
HOWTO MAKE A COMPLAINT TO POLICE
nelrcst I'olice Statiotr oq ifspecilically rlotilietl,
You can loclge a cot'ttpLlint at the
the Cybe| Policc Station in yotlr district. Cybct'critncs catr also be registcrcd
()nlillc at https://cybe|crinte.govitr. antl Phonc No. 155260. |or ptoper
ilvestigatio11, please lranclover the tollowing to the I'olice Statiorr Olficer-alotlg
with thc comPla inI or its soon as possil)le ilfior the con]]llaillt.

For Facebook or other Social Media Account related complaints


. If a fake Facebook or Instagram account has been created then take a
screenshot ofthe fake profile along with the URL or mention the URL of
the profile in the apPlication.
. Attach self-attested identity card along with the complaint copy.

ForFinancial Frauds
. Self-attested passbook/cred it card transaction statement copy should
be submitted, highlighting the fraudulent transactions along with
bank account numbeE debit card/credit card number & registered
mobile number with the bankaccount or credit card.
. Screenshot oftext messages offraudulent transactions received on the
registered mobile phone number should be preserved and attached
withthe complaint coPY.
. Screenshot of any suspicious link or OTP received for fraudulent
transactions should also be preserved and attached with the complaint
copy.

For Fake website related Frauds


. Screenshot of the fake website along with the URL of the website
should be taken and submitted alongwith the complaint copy
o Self-attested copy offraudulent transactions, ifany, should be attached
with complaint coPY.
EPPEALI
il
wrnl ro hpo , .ybe..rihc1

I
Please help us in fighting cybercrime by being aware and not falling into the
traps laid by cyber criminals. Also, please report all attempted cyber frauds lt
I E
wiil help us in nabbing the cyber criminals and bringing them to,ustice before
they can defraud someone else.
AWAREN ESS . BOOKLET
3B
o I
o
5 T
a
a a /, r/
t; t 4 a

I
o T!tD at a A'fi t
I*
ll
I
T
l-!
at-aIE.artr -a
-- ra,t.
.€-- ;^ ., .r --.,rE
-
aat I

You might also like