Professional Documents
Culture Documents
yo/
,/
E' a
f
rl a
t
t
li
-aflfr-ar.
E --.-r
ata - L
+
CYBER SECURITY
AWAREN ESS - BOOKLET
CYBER CRIMESIN INDIA
August,2021
IMPORTANCE OF CYBER SECURITY
TABLE OF CONTENTS
Advanced technologies have changed the modern way of life. The internet
Sr No Topic l'aBe No
provides us with many benefits. Be it communicating with friends, searching
1. lmportance of Cyber SecuritY t for information, doing banking transactions, availing online services, finding
z. Social Engineering Frauds 2-ll job, finding life partner or even running entire businesses. The internet touches
o CW/OTP Sharing Fraud 2 almost all aspects of our lives. Howevet it also makes us vulnerable to a wide
o UPI Phishing Fraud 3
range of threats. New and powerful cyber-attacks are striking the internet
. Fraud by Request Money QR code/Link on 4
regularly. A minor lapse in managing our digital lives can open the door to cyber
Google Pay/PhonePe/Paytm
criminals. Cyber criminals can steal our money or damage our reputation.
. Fraud During Covid-19 Pandemic 5-6
According to a study by a leading industry research organization, 90% of all
. Fraud through Google Docs App
. I cyber attacks are caused by human negligence. Therefore, cyber security
Fraud using olx/E-commerce Platforms
. Fraud through Fake Cashback offers I awareness is important for everyone today.
o Fraud through Screen Sharing Apps 10
We must be vigilant while making use of technology to reduce the risk of cyber
. slM Card swapping Fraud 77
threats.
II
+ tr-l
@
-
r-i"@ Fraudsters coll people on
the pretext
ofupdoting
KYc/Aodhaar & link his
account to UPI by convincing
I
Victim shares link
& OTP
Fraudsters get occess to
the UPI wallet which is
linked to victim's honk
a c co un t. F rau d s ters se t
Fraudsters coll On the pretext of KYC/ l;VV tto him to share the alphonumeit MPIN qlso
imperson0ting Aodhaar update or link & OTP to o porticular
os bank/RBl activation of new ATM cord, number ossociated to the
olJicials fraudsters qsk for ATM cqrd bank of the victim
number &OTP
G&
a
Paglrn
UPI'
ama4on
f, illit f
Froudsters transfer the monq/ to
e- wallet or UPI accounts or do
shopping immediotely
Victim's
bonk occount d
Victim duped of money in Fraudsters use the
his bank account victim's account as
E
until he gets his accountblocked their own
I I
I
{Ir{{ swti. dri 6i 3trr4 ,nA 6{r{
d d-{drrr h I ft}rr 6{i * Frq wet t
Fraudster calls the vendors
or ony shopkeeper or
businessman & requests for
V i c tim s ho res
mobile number &
receives a request
reg iste red
I
'Iltt l)ll r orlt ts
,ltl)t\1\l wtllt It)
nltkr il l li ltlir \ il
il ts l0t t t rltl lhourth
ai t, s-a M a ara ora i fu-5
hin qc$ ritosc rYfr tr
rt$ 3nrfui /tfi am frffia
i htr 6t ut{ aRa as ai s*( i rtsrsq
I
r,
$ $ I 4
Coogle Pay or PhonePe money link or QR code
lu
tq i frt* ori t rtl t
registered mobile number t lly tl t\ l t'tlrllil u,,u.ruJ,cVbercrime.gou.in
6:t fm"
O rorr rnrnr K THIS CALL IS FRAUO.
BErlANE OF FNAUOSIERS!
I
Q t*t**a**
Just now my fraend recoived a call
d
lnsteod of recieving money, l'tt ltr,t t!tuttt t \ t lt' lt'\ I
.il*Frlemddtrr1
FrdJ4.*'
Q f"fdri9 1".
lrom ,r l.'.",Lrlr.i:l i.' asking him to
press l i, he had vaccinated. He
pressed 1. lmmediately the Phone
It
'{.hdbt w8s blocked S) and his Phone had
victim ends up paying tttt \\ttlt l t\ t't\\'tl t)n Ill tnft*oc.d/.d. t been hacked. So be ca
to the fraudster vio I ltltrtttr' ttrttttl,, t
r r'r 1t: t r't r'r
lnfor r fnryb'*ed you g€t slmilar calls 'dtrotr a
request money QR code
or link
rytllt t,tt'\ ltttltli ttt t ttttttl
b!*tutbrtu tr. colleague). Msg
F But be alert. Also
E
i
5
q SeronqWaW
fufic.rcW*nE q ltuilafrsrH FRAUD USING GOOGTE DOCS APP
Apps for online [orms lil<e Google Docs etc. are widely Llsed to collect data.
ry ry
Irraudsters take advantage ofsuch applications ancl nrisguide the vjctim to fill or
subnrit his/her confidential bank rclated data like ATM nurnber; llpl plN,
password ctc. As soon as they fill up thc forn) and submit thcir data, it is clirectly
E I E
tra nsferred to thc creator ofthe fbrtrr.
K'tech ' \
b t
6r t:t
I ,
UPI PlN, passwords etc.
E
Lhk hnp://rirY.cc/C0\,DVACCNE the cyber froudster
.rclpl Arogr. S.E xd Co.Wn
V
\,1 o N ever share confidential banking details in onlin e forms Iike Google Docs.
I
o
f-r rGorl{ I Bank never asks their customers to fillsuch forms.
7
FRAUD THROUGH FAKE CASHBACKOFFERS
Cyber fraudster uses the e-commerce platforms like Olx/Quikr/Facebook for Irraudsters lure victints by offering cashback offers flonr PhonePe/Google Pay
publishing fake advertisements to sell commodities at lucrative prices When ('tc. :rnd request the victims to clicl( on a request moltoy link or scan a QR code to
someone intends to buy, cyber fraudster asks for advance payment in the form .rvail the same. Once the link is clicked or QR code is scanned, moncy is debited
of packaging/transportation/registration charges etc. Buyer Pays the nroney lrom the victim's bank account instead of being creditcd as he enters MPIN or
believing him/her to be a real seller and the fraudster disappears with the llPI PIN. Link can be of type http ll8629a7f l.ngrok.io or SMS
money. Frauds are also committed by ryber criminals posing themselves as I5 3 3c608933b85f4 4Ba7 428b4365aO42ae6
buyers to real sellers. In this modus operandi, cyber criminals get the seller's
account debited on the pretext of paying advance money by sendlng request n
money link/QR code instead ofthe creditlink/QR code.
a
:!!:'
I
+ r ilr"" "- + f. & OR
=$:
fr EfETT la 4a
Cy ber c r i m in o ls co n to ct Froudsters then use the
Froudsters lure "0
Army / para - m i I i tary fo rce victims by offering
per son nel u p I oad com mo dity these personnel & get id prool & other documenLs cashbackofers OR
(v ehicle /fr idg e / mo bile their id prool canteen of army / poro -mll lto ry fo rce
+
Fraudsters
phone etc.) to be sold on olx smortcard and other personnelos thelr own Do nt
get confused ? 2000.oo
mislead by
/Quikr/Facebook etc. documents on the & post loke adv for sole by whot is disployed here editing the QR
pretext ofbuying the on 0l x / Qu I kr/ Foce boo k e tc.
code by writing
t
advertised item 'poyment refund':
I o etc. instead
of"p1y"
On the pretext of GsT/transportation charge/ lluyL't' st't'itr.tl t1l I t ttt I t|t' lrt tt t
hints(!ll rottltI l \ t ln' I t tt tt l\l t' t'
fi
lnsteod of receiving money,
v ictim hi m se lf/ he r se lf pay s
.2,OOO
t
'oo
Victims don't
pay attention to
what is written here
p qcka g i n g ch o rg e/ re g i statio n cha rg eT I P S/ oth e r t
to the fraudster via q
advances, fraudster keeps duping the victim tussutrtit4l hitn tt rt rtnv/ request money link or QR code Ei
ofhis/her money until the victim reolizes the frqud lot' -t iIitttt'y Iot't't' It t st)tttt(l after entering MPIN/UPl PIN
I
banking etc. The fraudster then siphons off money from the victim's account
using those credentials. By the time the victim realizes it, a lot of money is
already siphoned off. F f5
AnyDesk
a> Jn
+
JI
+
.-J
+
i
I
People contact Iake OR
Cyber criminals Cyber criminals call In furtherance of Victim forwards
customer care number
get a blank SIM the victim pretending their fraud, cyber the SIM no. from
of bankor e-commerce
platforms after [lr.-v,n ' card from retaile\ as customer cofe criminals provide his mobile phone
who is olso a executive of a TSe one SIM no. & ask considering the
searching it from
Froudster gets qccess gang member to initiate 4G SIM the victim to send
Google search engine OR froudster as
to the victim's phone upgrodation by that SIM no. genuine customet
Victim shares
& steols banking themselves otherwise through SMS to care operotor of
the codewith
Quick Support credentiols services oftheir SIM customer care the TSP
thefroudstet
Froudster, posing os a
customer care operator,
willget blocked
SIM Card
number to avoil
the services
t
asks the victim to install I Swapping
H Never install any screen sharing app when asked to do so over a phone call
E Never share any information related to your account and SIM over a phone
call. The zo-digit SIM number mentioned on the back of the SIM is a very
by customer care,/help desk representative ofany entity. sensitive data.
Banks/E-commerce entities etc. never ask to install third party application Ifyour mobile number is inactive/out ofrange for a few hours, enquire from
your mobile operator immediately.
for screen sharing.
Register for regular SMS as well as e-mail alerts for your banking
transactions (this way, even ifyour SIM is de-activated, you shall continue to
receive the alerts via your email).
FINANCIAL FRAUDS USING SOCIAT MEDIA PTATFORMS .:!
FRAUD USING FAKE SOCIAL MEDIA ACCOUNT Live video chat is done on Facebookvia Messenger by cyber criminals posing as
Fraudsters target accounts on popular social media platforms like Facebook female. Cyber criminals convince the victim for video call in compromising
and Instagram. They commit fraud by creating a similar fake account of the positions, following which fraudsters take screenshots ofthe sameordoscreen
target profile and requesting his/her friends for instant money transfer citing recording ofthe video call. Cyber criminals then threaten the victim to circulate
some medical emergency etc, Target profile's friends transfer the money the photographs/videos in compromising positions on various online
considering him/her as his/her friend. By the time the target profile comes to platforms, ifthe demanded money is not paid.
know of it, many ofhis friends become victims ofthe fraud. Similar fraud is also
committed by hacking the target account.
E
I_ I
$,
b
n
+
t
'tS 'fS + l[:
lrI
[-- J
,l
a
E Or + o '"
I_
+ 6 chs
-
EiiilHn
A similor profile
rE -E-!
Sends request to
Cyber criminol sends
friend request on
Mqny a times cyber
criminols odvise the
After several chats,
cyber criminol
convinces the
victim to come for
of target social Facebook profile profile creoted those who are in Facebook bosed on victim to downlood video calling
media account is using the some the friend list of the videos and posts several types ofvideo
creoted by a fraudster disploy picture the impersonoted liked by you chat 0pplications
:---'* "'i?
occount +
J: Cyber criminalstarts
t-
L
fi
blockmoiling victim & \
fi
extorts money or else threotens
to uplood noked photo on porn
websites, YouTube etc.
E
bank occount for moking poyment
.
o
Keep the privacy setting as "My friends" only.
Before transferring the money requested via Facebook, WhatsApp or other
E
o
o
Avoid friendship with unknown people on socialmedia platforms.
Never make video calls to unknown people on Facebook or any othersocial
social media account, verify the authenticity ofthe message by meeting the
mediaplatform.
concerned person or calling him.
. Turn on 2-step verification for all your social media accounts.
o Keep your password strong and maintain the privacy ofthe password.
2 13
OTHER CYBER CRIMES USING SOCIAT MEDIA PLATFORMS
HARASSMENT THROUGH FAKE SOCIAL MEDIA PROFILES Cyber bullying is bullying with the use ofdigital technologies. It can take place
Cyber criminals morph the photographs ofthe victim which they get from social on social media, messaging platforms, gaming platforms etc. It is a sort of
media and upload it on social media platforms. After that they demand money repeated behavioui aimed at scaring, angering or shaming those who are
to remove the morphed pictures from social media. Victim falls prey to the trap targeted. Examples include: spreading lies about or posting embarrassing
and transfers the money,
photos of someone on social media, sending hurtful messages or threats via
messaging platforms, impersonating someone and sending mean nressages to
a others on his/her behalf.
, a E
r o
r5 G E
Victim usuolly accepts oll
the friend requests without
knowing the person sending it.
OR
b,
Because ofpoor privocy settings of
the victim's dccount, everyone has
access to his/her photographs or posts
on social medio platforms which cyber
criminals take advontoge oI
I
Perpetrotors ofcyber Perpetrotors of cyber bullying
bullying (usually known to create a fake occount either in
the victim) get the personol the nome of the victim or a
photographs and detoils of random name &post severol
the victim from various memes ond videos moking fun
sociol media sites of the victim, which goesviral
E
Cy be r c rim i nal s d ow nl oa d
photogrophs and create afoke occount
impersonatlng the victim and upload the
morphed obscene photogrophs etc.
hqrassing the victim . Learn about the privacy settings ofthe social media apps being used by you.
. Ensure your personal information, photos and videos are accessible only to
H Social media sites offer privacy settings to manage who can viewyour posts,
.
.
yourtrusted ones.
Think twice before posting or sharing anything online - it may stay online
foreverand could beused to harmyou later.
Make your children aware that cyber bullying is a punishable crime so that
photos, or send you friend request etc. Restrictaccess to your profile. neither do they indulge in cyberbullying nor do they Ietanyone bully them.
Ensure your personal information, photos and videos are accessible only to . Report hurtful comments, messages and photos and request to the
yourfriends. concerned Social Media Platforms to remove them. Besides,unfriendlng,,
you can completely block people to stop them from seeing your profile or
Refrain from making friendship with unknown persons over social media
contactingyou,
platforms.
T4
CYBERSTALKING OTHER CYBER CRIMES/FRAUDS
Cyber stalking is online stalking. It involves the repeated use ofthe internet or ATM/DEBIT CARD CLONING FRAUD
other electronic means to harass, intimidate or frighten a person or group. Each ATM/debit card has a magnetic strip in it containing confidential data,
Common characteristics of cyber stalking may include false accusations or Cyber criminals use a skimmer machine to read this strip and capture the
posting derogatory statements, monitoring someone's online activity or confidential data related to the card. Then they copy the data onto a blank card,
physical location, Cyber stalkers may use email, instant messages, phone calls, which is used for fraudulent transactions. They use overlay dev ices/pin-hole
and other communication modes to stalk you. Cyber stalking can take the form camera/ spy camera or peep from behind in the queue to read ATM/Debit card
ofsexual harassment, inappropriate contact or an unwelcome attention in your PIN while it is being entered by the user on the ATM keypad/POS machines.
life and your family's activities.
s'
Victim uses check in feature of Stalker keeps a watch on the
Sffr
Dato ofATM cqrcl
skimmedwhile
withdrqwing money from
l>
Cyber criminals rewrite
the ATM card dqta on a
blank ATM card, thus
H
Withdraws money
using cloned card
and peeped PIN
social media to inform one's posts of the victim from
ATM kiosk & Cyber cloning. Nowadays, they far off ATM kiosks
friends and followers about his/her Criminol stealing the PIN are dlso cloning ATM/debit
whereabouts ( locations, places ) by peeping from behind card ddta by guessing the
and also about onee future plans card number & PIN
on social media platforms
E
. Enter the PIN yourselftaking due care to hide the PI N (as in image 1).
H
. Be careful while uploading your personal information, photos and videos
o
.
.
Check for hidden cameras/skimmer devices while withdrawing cash fas in
image 2).
Physically checkthe keypadto ensure itdoes nothave an overlay device.
Do not allow anyone to stand beslde or behind you while carrying out
on social media, Ensure thatthese are accessible onlyto your trusted ones. transaction with ATM/Debit card/Credit card.
o Never add unknown people to your friend list. . Do notkeep a PIN which can be guessed easily. Keep changingyour PIN.
. Review all the privacy and security settings of social media and restrict
t Ensure you get transaction receipt or confirmation through SMS.
. Ensure that any part ofthe ATM machine is open or loosely attached.
them to "my friends only".
17
RANSOMWARE ATTACKS
Cyber fraudsters edit the customer care number of banks/airlines/food
outlets/e-commerce entities etc. on Google page and customize it in such a Ransomware is a category of malicious software which, when run, disables the
manner that whenever someone searches on Google for the customer care functionality ofa computer in some way. The ransomware program displays a
numbe4 the edited number of cyber criminals appears on top of the search message that demands payment to restore functionality. The malware, in effect,
results for that entity. Victim ends up calling the fraudsters instead ofthe real holds the computer system to ransom. ln other words, ransomware is an
helpline numbers. The fraudsters portraying themselves as helpers actually extortion racket. Ransomware typically spreads through phishing emails or by
give instructions to dupe the callervictim. unknowingly visiting an infected website.
ro';'''
State Bank of lndia
Suggest an edit
/'
\ i-
bruic*lt.'br.dtc.iir
.*dbfuhrffuldb.oro.t
ltftcd qf xrlara. + t
Always search for customer care number from the official website of the
bank/airlines/food or retail outlets/other e-commerce entity and not by
searching the entity name on Google search.
E Do not open emails from unknown sources containing suspicious
attachment or phishing links.
Toll free number for any bank is given on back/flip side ofdebit/credit card. Keep your antivirus up-to-date and windows firewall turned on and
Call on the given numbers only. properly configured.
Always remember that Google does not give verified information on Back up your most important files on a regular basis. Keep the important
searches. data on a separatehard disk.
Have properspam filters enabled in your e-mail account.
18
-.:
JUICE JACKING (victim) that
Cyber fraudsters send e-mails/SMSs informing the recipient
Juicc jacl(ir)g is a l<ind
ofcybel fiaucl where clata is copied from a smart phonc,
he/she has won a lottery/prize worth millions of rupees/dollars and the
tablet or other clcctron ic deviccs using a USB charging port that is actually usecl
recipientonly needsto clickonthe Iinksenton their e-mail/mobile phone or to
fol botlr data connectioll ancl charging. The victim llelieves it to be a charging
tell how they want to receive the prize money. However, on responding
llort only. positively, the recipient is asked to pay money in the name of
registration/shipment/service charges, GST etc. one after the other for
releasing the prize money. This way the recipient keeps on paying the
'
fl fraudsters until he/she realizes the fraud The fraudsters were initially mainly
from Nigeria and hence the terminology.
j3
I
Froudsters give
information through
email/SMS/coll to the
+
lf the victim replies
positiv ely, fra u dste rs
then ask how they
+
On
I
klling the mode
receiving, they then
ask for registration/
of
!I
victim obout the prize would like to receive shipment/ se rv i c e cho rg es,
money won by them the prize moneY GST etc, for releasing the
This type ofsteoling through lottery prize money
Victim's mobile/device
of dato from the
plugged into a chorging
port at o public place
victim's mobile is
called luice
6r
lacking
d
E
. D isable data transfer on you r phone while charging.
E Never respond to calls/SMSs/e-mails related to winning a lottery/prize or
seeking personal or financial details.
. Switch offyourdevice before charging in public places.
Have proper spam filters in your email account to stop receiving unsolicited
. Carry your own portable power pack/bank.
emails.
. Buya data disabled chargingcable. Follow the thumb rule: Never transfer funds to unknown persons or entities
in promise ofhigher returns/winning prizes or lottery
2L
COMPUTER OR DEVICE HACKING
Cyber criminals advertise fake job offers using various platforms either online
IIacl<ing is thc act of gailting nccess to a conrl)utcr/device without lcgal
via hke websites. Victim, in search of a iob, goes through these fake job offers
,rLrthorisation. Cybcr criminai rrses various nrethods tbr ltacking a victirn's
and contactthe cybercriminal. Upon contacting cyber criminals, victim is
asked t onrputer/device slrch as jnfecting a contl)Llter/devicc lty :r vinrs or ntallvare.
to pay registration fee or make an advance payment (which they claim is I lilcking may lcad to data co rruptjon/d eletjon or data Ioss
refundable) to avail their services for getting a iob. Victim transfers the money ol- stealing ofclata.
+ OR
*
*
Victim has not instolled qny antivirus
Victim ends up into his system ond ignored the standard
losing/paying money for a security feotures. Victim's system starts
job which didn't exist working slowly and later he loses his
personal photos, videos ond other
important document
23
@:''
Mobile applications may be mediums of cyber-attacks, stealing ofconfidential
REMOTE ACCESS APPLICATION FRAUD
s
Victim, a habitual user of Cyber criminals take
certoin mobile advantage of this qnd
applicotion downloads ottqck the victim's device Q Ih not sfrare personal details on Sfil|/Pfione.
by infiltrating into it using ttnt gur arcou wi
the mobile applicotion O yutf rereiw any tti slding get
the 0pplicstion. TheY
ignoring securitY
wornings ond/or grants infect the op\lication with blo ed or suspemled, if KY( is not tmfleful, tonlad iltffi
u nn ecesso ry pe rmi ssi o n s
malicious sofrware and rushmr care of lfie baafr/e-wallet/suvke pnvida for
get access to the victim's
to the application, which
is not required in the
functioning of the oPP
messaget cqmeros)
contacts, Photos etc. for
malicious activities
1
CKY| can onty fu cuillr:tett dt aulfiorized KYC Pfi s N
E]--Ilrrr* in.tull ,pplications from trusted sources like for Android devices'
;;; e;;;i; Piry,'f6rApple devices use App Store Please ensure thatthe app A rc*
I
Qutfrsupyt, Anydesfr u
a
is havins Plav Protect shield.
. ii iih.o'i.pir.tant to read reviews about the app lfit has a negative review
."rJ **"i" see if anybody noted any securiry concerns like bugs or
Qfud
TeanViewer ek, for KYC
T6 l[{rdq
ffi
o MINISTRY OF
Do's
@ HOMEAFFAIRS
When you feel
L- _.-J
uncomfortable with any
social media post/mail/
chatting, immediotely
share your concern
withyour parents
How to detect fraudstels on matrimonial websites? or ony trustworthy
person
ln case of any of the following, please be careful:
o
ocquointonce. numeric symbols
and special characters
,flr equqlly to the
virtual space
Froudsters will usuolly coll from multiple numbers. He/ She usuolly
don't give o number to coll bock. Even if he/ she give o number,
they don't pick up when you coll. Loter, he/ she colls you bock from
e -fF
o new number.
o A Froudster moy not hcrve o sociol medio profile or hove few friends
on socio medlo.
real life & with the
permission of
your porents
$
q {rt
a
27
CYBER SAFETY TIPS FOR CHILDREN CYBER SAFETY TIPS FOR PARENTS
DON'TS Do's
28
CYBER SAFETY TIPS FOR PARENTS CYBER SAFETY TIPS FOR WOMEN
Do's
DON'TS
Be selectiveabout what
information you make
public. Sensitive
Don't allow your
child to have informotion includes
sociol media reol nome, dote of birth,
genden town, e-moil
occounB ifthere
address, school nome,
is an age limit
Periodically review place ofwork, and
for the same Block people
your internet personolphotos
you don't
contacts ond want to interoct
online activities with
fi
supervision Only share information d ea c tivd ted, es pec ia I ly
about yourself on 'need from senders who are
to know'bosis not in your contact list
30 31
CYBER SAFETY TIPS FOR WOMEN
GENERAL CYBER SAFETY TIPS
GENERAL CYBER SAFETY TIPS
32
I FOR SAFE INTERNET BROWSING
. Beware ofvarious fraudulent lucrative advertisements regarding d iscount . Always use virtual keyboard for accessing net banking facility and log off
coupons, cashback and festival coupons offering payments through Upl
from banking portal/website after completion of online transaction. Also
apps popping u p wh ile browsing.
. ensure deletion ofbrowsing history from web browser after completion of
Some URL links on the internet are advertising to provide fake mobile
online banking activity.
Oxymeter apps to check your oxygen level. Do not download such fake
Oxymeter apps on your mobile, as these apps may steal your personal or
. Use multiple factor authentications for login into your bank accounts.
34
SOCIAL RUMORS :
Twitter rs moniloted
t I
o
.
Never leave t}le discarded photo copy ofyour identity proofs at shops.
Never allow the shopkeeper to keep a copy ofyour identity proofs in
computer.
tleir
Facebook
r
I
rumJ Jre monttor
36 37
HOWTO MAKE A COMPLAINT TO POLICE
nelrcst I'olice Statiotr oq ifspecilically rlotilietl,
You can loclge a cot'ttpLlint at the
the Cybe| Policc Station in yotlr district. Cybct'critncs catr also be registcrcd
()nlillc at https://cybe|crinte.govitr. antl Phonc No. 155260. |or ptoper
ilvestigatio11, please lranclover the tollowing to the I'olice Statiorr Olficer-alotlg
with thc comPla inI or its soon as possil)le ilfior the con]]llaillt.
ForFinancial Frauds
. Self-attested passbook/cred it card transaction statement copy should
be submitted, highlighting the fraudulent transactions along with
bank account numbeE debit card/credit card number & registered
mobile number with the bankaccount or credit card.
. Screenshot oftext messages offraudulent transactions received on the
registered mobile phone number should be preserved and attached
withthe complaint coPY.
. Screenshot of any suspicious link or OTP received for fraudulent
transactions should also be preserved and attached with the complaint
copy.
I
Please help us in fighting cybercrime by being aware and not falling into the
traps laid by cyber criminals. Also, please report all attempted cyber frauds lt
I E
wiil help us in nabbing the cyber criminals and bringing them to,ustice before
they can defraud someone else.
AWAREN ESS . BOOKLET
3B
o I
o
5 T
a
a a /, r/
t; t 4 a
I
o T!tD at a A'fi t
I*
ll
I
T
l-!
at-aIE.artr -a
-- ra,t.
.€-- ;^ ., .r --.,rE
-
aat I