IR.B.4 English
IR.B.4 English
Table of Contents
1. What is Cyber Crime? ................................................................................................... 4
1.1. What are we Protecting? ........................................................................................ 4
1.2. Evolution of Cyber Crime ...................................................................................... 5
2. Types of Cyber Crimes .................................................................................................. 8
2.1. Frauds Against Individuals.................................................................................... 8
2.2. Frauds Against organisations .............................................................................. 12
2.3. Frauds Against Society ........................................................................................ 13
3. Most Common Types of Financial Frauds ................................................................. 16
4. Investigation of Cyber Crimes .................................................................................... 19
4.1. Process Flow of Cyber Crime Investigation ........................................................ 19
4.2. Challenges to Cyber Crime Investigations .......................................................... 19
4.3. Safeguarding from Cyber Crimes ........................................................................ 19
5. The Nodal Agencies in India ...................................................................................... 21
6. Do’s and Don’ts for Cyber Crime Investigation ......................................................... 23
7. Reference: .............................................................. Error! Bookmark not defined.
2|Page
Introduction to Cyber Crimes and Cyber Crime Investigation
3|Page
Introduction to Cyber Crimes and Cyber Crime Investigation
Some of the most commonly reported cybercrime’s statistics include the following:
4|Page
Introduction to Cyber Crimes and Cyber Crime Investigation
• Cyber Crime is expected to cost the world $11.4 million (approx. 80 crore
rupees) every minute in 2021.
• In the year 2021, there will be a cyber-attack incident every 11 seconds.
• Here are the most commonly reported cybercrimes according to NCRB
as of 2019.
• Criminal Anonymity
• Trans-boundary
• International Jurisdiction Issues
• Technology Advancement
• Dynamic Modus Operandi
• Non-Physical Evidence
There is a thin line between a Traditional Crime and a Cyber Crime. A thief can
enter the victim’s household, break the lock and steal money. Similarly, a cyber-
criminal can hack into victim’s bank account and steal money without even
entering the household of the victim.
5|Page
Introduction to Cyber Crimes and Cyber Crime Investigation
6|Page
Introduction to Cyber Crimes and Cyber Crime Investigation
7|Page
Introduction to Cyber Crimes and Cyber Crime Investigation
Often hackers play with the minds of the users to trap them with lucrative
offers and thus exploit them by either stealing money or sensitive personal
information.
8|Page
Introduction to Cyber Crimes and Cyber Crime Investigation
• Lottery Frauds
• Job Related Frauds
• Unbelievable discount offers
• Free medicines, vaccines
• Email Frauds
• User Account Locked Frauds
Some of the common ways of carrying out psychological tricks are described
as follows:
b. Vishing
Let us take an example: a person receives a call asking for their credit or
debit card PIN and CVV to reactivate the blocked bank account. When
the person gives all these details, he gets notified that Rs. 10,000 have
been debited from the same amount.
9|Page
Introduction to Cyber Crimes and Cyber Crime Investigation
3. Social Media Frauds: Sharing your personal life details on social media
such as photographs of self or family, locations updates, personal views and
thoughts may also pose a threat to an individual. The frauds carried out
using social media are called social media frauds.
10 | P a g e
Introduction to Cyber Crimes and Cyber Crime Investigation
Some of the common ways of carrying out social media fraud are described
as follows:
11 | P a g e
Introduction to Cyber Crimes and Cyber Crime Investigation
1. Hacking
• Theft of passwords
• Transferring malicious software through emails or links
• Injecting malicious advertisements
• Hacking bank accounts, e-wallets and
• Hacking using keylogger
2. Denial of Service (DoS)
DoS attack is a cyber attack in which the attacker sends a large amount of
data to a network to make it unavailable for the intended users by
temporarily or indefinitely disrupting services. DoS attack typically targets
high profile website servers belonging to banks and credit card payment
gateways. These attacks use multiple systems to flood the bandwidth of the
target system.
12 | P a g e
Introduction to Cyber Crimes and Cyber Crime Investigation
• ICMP Flooding
• Application-level flooding
• Distributed DoS attacks
• Teardrop attack
3. Data Breach
a. Data Leakage: Data leakage refers to illegally copying the master file
information from a computer for ransom, blackmailing, or any other
fraudulent purpose.
b. Data Spying: Data Spying refers to accessing the files or digital data
from a remote location by using legitimate password or cracking the
password.
c. Scavenging: Scavenging refers to obtaining and reusing the
information, which have been left over as temporary files that were
generated by the installation of some software packages.
13 | P a g e
Introduction to Cyber Crimes and Cyber Crime Investigation
• Data Leakage
• Data Spying
• Scavenging
3. Cyber Warfare; Cyber warfare encompasses all the actions and processes
that aim to attack a nation to cause harm that is comparable to traditional
warfare.
• Espionage
• Sabotage
• Electrical Power Grid attacks
• Propaganda
• Economic disruption
• Denial of Service attacks
14 | P a g e
Introduction to Cyber Crimes and Cyber Crime Investigation
15 | P a g e
Introduction to Cyber Crimes and Cyber Crime Investigation
1. UPI fraud: Hacker sends "request money" links to the customer and when
the customer clicks on the link the amount gets deducted from their UPI
account.
2. E-wallet fraud: The customer receives a call, SMS or email from a fraudster
claiming to be from the wallet firm to either confirm KYC details or encash
offers.
4. OTP frauds: OTP or One Time Password and is enabled by a Bank for
verifying whether the transaction is initiated by the user or not. On sharing the
OTP, the criminal would get access to your account and can complete the
transaction.
5. Net banking related fraud: The hacker misuses your login credentials for
unauthorised transaction or to withdraw money from your bank account.
Knowing what type of criminal, you are dealing with helps you use the right strategy for
investigation. We can categorise criminals as Individual, oraganised, and sponsored.
These are explained further below
16 | P a g e
Introduction to Cyber Crimes and Cyber Crime Investigation
1. Individual criminal
• Identity theft
• Bullying
• Cyberstalking
• Distribution of pornography content
• Trafficking
2. Organized criminals: They are involved in various crimes such as frauds,
hacking, DDoS attacks, blackmail, malware creation, distribution & intellectual
property crime. They utilise Information and Communication Technology (ICT)
to facilitate organised crime activities.
3. Sponsored criminals: Sponsored criminals are individuals or a group of cyber
criminals, who may have a sponsorship by a particular organisation or group to
conduct an attack. They use advanced persistent threat attack methods to gain
access to an unauthorised system or network
17 | P a g e
Introduction to Cyber Crimes and Cyber Crime Investigation
18 | P a g e
Introduction to Cyber Crimes and Cyber Crime Investigation
19 | P a g e
Introduction to Cyber Crimes and Cyber Crime Investigation
20 | P a g e
Introduction to Cyber Crimes and Cyber Crime Investigation
21 | P a g e
Introduction to Cyber Crimes and Cyber Crime Investigation
• Quarterly review the implementation of the cyber security and resilience policy
by the Oversight Standing Committee Technology of the stock exchanges and
of the clearing corporations and the IT strategy committee.
• Quarterly reports containing info on cyber-attacks and threats and what
measures were taken to mitigate these threats and vulnerabilities
d. NCIIPC: NCIIPC (National Critical Information Infrastructure Protection
Centre) Responsibilities include the following:
• To facilitate safe, secure and resilient information infrastructure for Critical
Sectors of the nation.
• To take all necessary measures to facilitate protection of Critical info
infrastructure from unauthorised access, modification, use, disclosure,
disruption, incapacitation or destruction through coherent coordination,
synergy and
• To revamp cyber security apparatus of critical infrastructures in India, such as
power, transportation, water, telecommunication and defence.
• To install sensors on all critical systems to give real-time info to its command
and control centre about any cyber-attacks to formulate quick response
e. MHA- CIS (Cyber & Information Security Division): Some of the divisions
of the MHA-CIS are as follows:
i. CIS-I Desk: Co-Ordination Wing
• Co-ordination within the Division.
• Co-ordination within the Division.
• Parliament Questions, RTI applications, Public Grievance, etc. not
pertaining to any specific desk of CIS Division.
• Miscellaneous reports, viz. Monthly Reports, Quarterly Reports, Annual
Report, etc.
ii. CIS-II Desk: Cyber Crime Wing
iii. CIS-III Desk: Information Security
iv. CIS-IV Desk: Monitoring Unit
v. I4C: Indian Cyber Crime Coordination Center
vi. NCCC
22 | P a g e
Introduction to Cyber Crimes and Cyber Crime Investigation
Don’ts: Some of the major don’ts for cyber-crime investigation include the following:
• The evidence collected for investigation must not be tampered in any form.
• The entire investigation must be done without any bias towards any of the
parties, organizations or people.
• Don’t derive conclusions based on the insight gained from one evidence.
23 | P a g e
Introduction to Cyber Crimes and Cyber Crime Investigation
24 | P a g e