Get Updates
Get notified of breaking news, exclusive insights, and must-see stories!

The Modus Operandi Of Cybercrime In India

Cybercrime in India has evolved significantly, with criminals becoming increasingly sophisticated in exploiting vulnerabilities. Techniques such as phishing, email spoofing, social engineering, and malware attacks, often using cryptocurrencies for anonymity, are prevalent. Notable cases like the SP Oswal scam and the Cosmos Bank heist demonstrate that even secure organizations can be targeted.

The Modus Operandi Of Cybercrime In India

Key cybercrime methods include:

1.Business Email Compromise (BEC)
2.ATM Cloning and Skimming
3.SIM-Swap Fraud
4.Phishing and Vishing Attacks
5.Cryptojacking and Ransomware
6.Ponzi Schemes
7.Social Media Impersonation and Extortion

Understanding their modus operandi sheds light on how these criminals execute their scams. For instance, in BEC scams, attackers compromise legitimate business email accounts, often through social engineering. Once inside, they monitor communications and impersonate trusted entities to reroute large payments.

ATM cloning and skimming involve attaching devices to ATMs that capture card details and PINs during transactions. This method was notably used in the 2018 Cosmos Bank heist, where criminals cloned over 450 debit cards to steal approximately ₹94.42 crore across 28 countries.

SIM-swap fraud allows criminals to take control of a victim's mobile number by fraudulently acquiring a new SIM card. With access to one-time passwords (OTPs), they can reset banking app passwords and make unauthorized transactions.

Phishing and vishing (voice phishing) have become common. Phishing involves deceptive emails that lure victims into revealing sensitive information, while vishing entails phone calls where attackers pose as legitimate officials to extract personal data.

Cryptojacking covertly utilizes victims' computers for cryptocurrency mining without their consent, while ransomware attacks encrypt files and demand cryptocurrency for decryption keys. In severe cases, if ransoms are unpaid, attackers might deploy cryptojacking malware using the victim's resources.

Ponzi schemes are particularly insidious, enticing victims with promises of high returns on investments. Once enough funds are collected, the scammers vanish, often through seemingly legitimate websites and apps that attract those seeking easy income.

Social media impersonation involves creating fake profiles or hacking existing accounts to extort money from victims' contacts. Criminals may use sensitive information for blackmail or pose as distressed acquaintances to solicit urgent funds.

As cybercriminals continuously adapt, it is essential to recognize that everyone is at risk. Awareness is a powerful defense against these sophisticated tactics. By understanding how these scams operate, individuals and businesses can identify warning signs early.
Simple preventive measures, such as enabling two-factor authentication, being wary of unsolicited communications, and regularly updating security protocols, can significantly reduce vulnerability. Ultimately, awareness and vigilance are key to safeguarding against the evolving threats of cybercrime.

Notifications
Settings
Clear Notifications
Notifications
Use the toggle to switch on notifications
  • Block for 8 hours
  • Block for 12 hours
  • Block for 24 hours
  • Don't block
Gender
Select your Gender
  • Male
  • Female
  • Others
Age
Select your Age Range
  • Under 18
  • 18 to 25
  • 26 to 35
  • 36 to 45
  • 45 to 55
  • 55+