SlideShare a Scribd company logo
1 of 8
Dr.SNS RajalakhsmiCollege of Arts and Science
(An Autonomous Co-Education Institution)
Coimbatore – 641049
www.drsnsrcas.ac.in
Presentationby
Mrs.S.Janani
Assistant Professor
Departmentof Information Technology
pc.fin@drsnsrcas.ac.in
I
Department of
Information
Technology
Slide No : 1
DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023
Emerging Cyber Crimes in India
INTRODUCTION
Cyber extortion is a digital form of Blackmailing
cyber criminals do not do real-life kidnapping for demanding ransom money but they
employ various new and innovative tricks to threaten potential victims through
online mediums.
According to a research paper“Cyber extortion can take many forms. It can be very
lucrative, netting attackers millions of dollars annually. A typical cyber-attack may
result in a demand for thousands of U.S. dollars. Furthermore, payment does not
guarantee that further attacks will not occur, whether the attacks continue from the
same cyber extortionists or a different group attacks.”
IT
Department of
Information
Technology
Slide No : 2
DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023
www.snsgroup.com
CONT
www.snsgroup.com
IT
Department of
Information
Technology
Slide No : 3
 According to a recent report published in Indian Express, India is among the top
10 sextortion mail source countries.
 Sextortion is a type of phishing crime where the criminals send emails to the
victims demanding money by claiming to have private photos or videos of an
individual.
Modus Operandi:
1. Criminals send emails to vulnerable persons. They claim that they have accessed
the compromised photographs or videos of the victims.
2. Victims get afraid and try to negotiate with the criminals without informing
anyone.
3. Criminals demand ransom and continue to exploit.
DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023
PROBLEM IDENTIFICATION
www.snsgroup.com
IT
Department of
Information
Technology
Slide No : 4
DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023
 During the past few months, many suicides have been reported in Telangana
for which the reason is said to be the blackmailing of young men and
women by the app-based (PowerBank, Tesla Power Bank) loan providers.
 The fraud was so massive that Telangana Police hired data analysts to track down
the web of fraudsters from across the state.
 Alarmingly, Telangana Police reported that 1.40 Crore money lending
transactions were reported involving Rs 21,000 Crores. Police also apprised the
RBI working group and sought appropriate intervention to regulate the malicious
money lending apps.
News Source: The Hindu
https://www.thehindu.com/news/cities/Hyderabad/police-interact-with-rbiofficials-
on-loan-app-fraud/ article33762148.ece
www.snsgroup.com
IT
Department of
Information
Technology
Slide No : 5
DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023
Modus Operandi:
1. People in need of money trying to find out loan providers by searching several
mobile apps claiming to be trusted loan providers in quick and easy steps. Such
apps also promise less paperwork, low-interest rates and low processing fee etc.
2. People get attracted to such apps without realizing that such apps are never
regulated by government financial controllers.
3. When people start failing loan repayment deadlines then app administrators
start exploiting and threatening them for dire consequences etc.
4. It has been revealed through investigations, that the cheated money was
siphoned off through bank accounts of shell companies, by way of crypto
currency to foreign country.
www.snsgroup.com
IT
Department of
Information
Technology
Slide No : 6
DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023
 Use strong passwords
 Update your software
 Manage your social media settings
 Strengthen your network
 Keep up to date on major security breaches
 Talk to children about the internet
 Protect yourself from identity theft
 Install anti-virus software
 Develop a cyber defense plan
 Continuously implement, monitor, and upgrade prevention systems and
technologies
CYBER CRIME PREVENT
Resolution in Inter-state water disputes within a
Nation
www.snsgroup.com
IT
Department of
Information
Technology
Slide No :7
DrSNSRCAS/Cyber Extoration/Monday, December 25, 2023
Some other ways to prevent cyber crime include:
 Using a Virtual Private Network (VPN)
 Using a secure internet connection
 Using password managers
 Getting security awareness training
www.snsgroup.com
I
Department of
Information
Technology
8
DrSNSRCAS/Cyber Extoration/Monday, December 25, 2023

More Related Content

Similar to Case Study : Emerging Cyber crimes in India

A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
IJCI JOURNAL
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
mattinsonjanel
 
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr. Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
EvonCanales257
 
Online Attack Types of Data Breach and Cyberattack Prevention Methods
Online Attack Types of Data Breach and Cyberattack Prevention MethodsOnline Attack Types of Data Breach and Cyberattack Prevention Methods
Online Attack Types of Data Breach and Cyberattack Prevention Methods
BRNSSPublicationHubI
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
bkbk37
 

Similar to Case Study : Emerging Cyber crimes in India (20)

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
A Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks TodayA Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks Today
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
 
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr. Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
 
Online Attack Types of Data Breach and Cyberattack Prevention Methods
Online Attack Types of Data Breach and Cyberattack Prevention MethodsOnline Attack Types of Data Breach and Cyberattack Prevention Methods
Online Attack Types of Data Breach and Cyberattack Prevention Methods
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 

Recently uploaded

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Case Study : Emerging Cyber crimes in India

  • 1. Dr.SNS RajalakhsmiCollege of Arts and Science (An Autonomous Co-Education Institution) Coimbatore – 641049 www.drsnsrcas.ac.in Presentationby Mrs.S.Janani Assistant Professor Departmentof Information Technology pc.fin@drsnsrcas.ac.in I Department of Information Technology Slide No : 1 DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023 Emerging Cyber Crimes in India
  • 2. INTRODUCTION Cyber extortion is a digital form of Blackmailing cyber criminals do not do real-life kidnapping for demanding ransom money but they employ various new and innovative tricks to threaten potential victims through online mediums. According to a research paper“Cyber extortion can take many forms. It can be very lucrative, netting attackers millions of dollars annually. A typical cyber-attack may result in a demand for thousands of U.S. dollars. Furthermore, payment does not guarantee that further attacks will not occur, whether the attacks continue from the same cyber extortionists or a different group attacks.” IT Department of Information Technology Slide No : 2 DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023 www.snsgroup.com
  • 3. CONT www.snsgroup.com IT Department of Information Technology Slide No : 3  According to a recent report published in Indian Express, India is among the top 10 sextortion mail source countries.  Sextortion is a type of phishing crime where the criminals send emails to the victims demanding money by claiming to have private photos or videos of an individual. Modus Operandi: 1. Criminals send emails to vulnerable persons. They claim that they have accessed the compromised photographs or videos of the victims. 2. Victims get afraid and try to negotiate with the criminals without informing anyone. 3. Criminals demand ransom and continue to exploit. DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023
  • 4. PROBLEM IDENTIFICATION www.snsgroup.com IT Department of Information Technology Slide No : 4 DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023  During the past few months, many suicides have been reported in Telangana for which the reason is said to be the blackmailing of young men and women by the app-based (PowerBank, Tesla Power Bank) loan providers.  The fraud was so massive that Telangana Police hired data analysts to track down the web of fraudsters from across the state.  Alarmingly, Telangana Police reported that 1.40 Crore money lending transactions were reported involving Rs 21,000 Crores. Police also apprised the RBI working group and sought appropriate intervention to regulate the malicious money lending apps. News Source: The Hindu https://www.thehindu.com/news/cities/Hyderabad/police-interact-with-rbiofficials- on-loan-app-fraud/ article33762148.ece
  • 5. www.snsgroup.com IT Department of Information Technology Slide No : 5 DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023 Modus Operandi: 1. People in need of money trying to find out loan providers by searching several mobile apps claiming to be trusted loan providers in quick and easy steps. Such apps also promise less paperwork, low-interest rates and low processing fee etc. 2. People get attracted to such apps without realizing that such apps are never regulated by government financial controllers. 3. When people start failing loan repayment deadlines then app administrators start exploiting and threatening them for dire consequences etc. 4. It has been revealed through investigations, that the cheated money was siphoned off through bank accounts of shell companies, by way of crypto currency to foreign country.
  • 6. www.snsgroup.com IT Department of Information Technology Slide No : 6 DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023  Use strong passwords  Update your software  Manage your social media settings  Strengthen your network  Keep up to date on major security breaches  Talk to children about the internet  Protect yourself from identity theft  Install anti-virus software  Develop a cyber defense plan  Continuously implement, monitor, and upgrade prevention systems and technologies CYBER CRIME PREVENT
  • 7. Resolution in Inter-state water disputes within a Nation www.snsgroup.com IT Department of Information Technology Slide No :7 DrSNSRCAS/Cyber Extoration/Monday, December 25, 2023 Some other ways to prevent cyber crime include:  Using a Virtual Private Network (VPN)  Using a secure internet connection  Using password managers  Getting security awareness training