SlideShare a Scribd company logo
Dr.SNS RajalakhsmiCollege of Arts and Science
(An Autonomous Co-Education Institution)
Coimbatore – 641049
www.drsnsrcas.ac.in
Presentationby
Mrs.S.Janani
Assistant Professor
Departmentof Information Technology
pc.fin@drsnsrcas.ac.in
I
Department of
Information
Technology
Slide No : 1
DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023
Emerging Cyber Crimes in India
INTRODUCTION
Cyber extortion is a digital form of Blackmailing
cyber criminals do not do real-life kidnapping for demanding ransom money but they
employ various new and innovative tricks to threaten potential victims through
online mediums.
According to a research paper“Cyber extortion can take many forms. It can be very
lucrative, netting attackers millions of dollars annually. A typical cyber-attack may
result in a demand for thousands of U.S. dollars. Furthermore, payment does not
guarantee that further attacks will not occur, whether the attacks continue from the
same cyber extortionists or a different group attacks.”
IT
Department of
Information
Technology
Slide No : 2
DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023
www.snsgroup.com
CONT
www.snsgroup.com
IT
Department of
Information
Technology
Slide No : 3
 According to a recent report published in Indian Express, India is among the top
10 sextortion mail source countries.
 Sextortion is a type of phishing crime where the criminals send emails to the
victims demanding money by claiming to have private photos or videos of an
individual.
Modus Operandi:
1. Criminals send emails to vulnerable persons. They claim that they have accessed
the compromised photographs or videos of the victims.
2. Victims get afraid and try to negotiate with the criminals without informing
anyone.
3. Criminals demand ransom and continue to exploit.
DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023
PROBLEM IDENTIFICATION
www.snsgroup.com
IT
Department of
Information
Technology
Slide No : 4
DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023
 During the past few months, many suicides have been reported in Telangana
for which the reason is said to be the blackmailing of young men and
women by the app-based (PowerBank, Tesla Power Bank) loan providers.
 The fraud was so massive that Telangana Police hired data analysts to track down
the web of fraudsters from across the state.
 Alarmingly, Telangana Police reported that 1.40 Crore money lending
transactions were reported involving Rs 21,000 Crores. Police also apprised the
RBI working group and sought appropriate intervention to regulate the malicious
money lending apps.
News Source: The Hindu
https://www.thehindu.com/news/cities/Hyderabad/police-interact-with-rbiofficials-
on-loan-app-fraud/ article33762148.ece
www.snsgroup.com
IT
Department of
Information
Technology
Slide No : 5
DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023
Modus Operandi:
1. People in need of money trying to find out loan providers by searching several
mobile apps claiming to be trusted loan providers in quick and easy steps. Such
apps also promise less paperwork, low-interest rates and low processing fee etc.
2. People get attracted to such apps without realizing that such apps are never
regulated by government financial controllers.
3. When people start failing loan repayment deadlines then app administrators
start exploiting and threatening them for dire consequences etc.
4. It has been revealed through investigations, that the cheated money was
siphoned off through bank accounts of shell companies, by way of crypto
currency to foreign country.
www.snsgroup.com
IT
Department of
Information
Technology
Slide No : 6
DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023
 Use strong passwords
 Update your software
 Manage your social media settings
 Strengthen your network
 Keep up to date on major security breaches
 Talk to children about the internet
 Protect yourself from identity theft
 Install anti-virus software
 Develop a cyber defense plan
 Continuously implement, monitor, and upgrade prevention systems and
technologies
CYBER CRIME PREVENT
Resolution in Inter-state water disputes within a
Nation
www.snsgroup.com
IT
Department of
Information
Technology
Slide No :7
DrSNSRCAS/Cyber Extoration/Monday, December 25, 2023
Some other ways to prevent cyber crime include:
 Using a Virtual Private Network (VPN)
 Using a secure internet connection
 Using password managers
 Getting security awareness training
www.snsgroup.com
I
Department of
Information
Technology
8
DrSNSRCAS/Cyber Extoration/Monday, December 25, 2023

More Related Content

Similar to Case Study : Emerging Cyber crimes in India

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Kolluru N Rao
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
Ankush saini
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
Michele Thomas
 
A Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks TodayA Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks Today
Deja Lewis
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
IJCI JOURNAL
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
RithikaD1
 
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
IJMIT JOURNAL
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
Cybersecurity's_Role_in_Digital_Governance_Dr_Sameer_Kharel.pdf
Cybersecurity's_Role_in_Digital_Governance_Dr_Sameer_Kharel.pdfCybersecurity's_Role_in_Digital_Governance_Dr_Sameer_Kharel.pdf
Cybersecurity's_Role_in_Digital_Governance_Dr_Sameer_Kharel.pdf
ssuser1f5946
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
Nikhil Chaudhary
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
mattinsonjanel
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
IJARIIT
 
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr. Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
EvonCanales257
 
Online Attack Types of Data Breach and Cyberattack Prevention Methods
Online Attack Types of Data Breach and Cyberattack Prevention MethodsOnline Attack Types of Data Breach and Cyberattack Prevention Methods
Online Attack Types of Data Breach and Cyberattack Prevention Methods
BRNSSPublicationHubI
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
Md Nazmul Hossain Mir
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
Accenture
 

Similar to Case Study : Emerging Cyber crimes in India (20)

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
A Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks TodayA Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks Today
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
 
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity's_Role_in_Digital_Governance_Dr_Sameer_Kharel.pdf
Cybersecurity's_Role_in_Digital_Governance_Dr_Sameer_Kharel.pdfCybersecurity's_Role_in_Digital_Governance_Dr_Sameer_Kharel.pdf
Cybersecurity's_Role_in_Digital_Governance_Dr_Sameer_Kharel.pdf
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr. Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
 
Online Attack Types of Data Breach and Cyberattack Prevention Methods
Online Attack Types of Data Breach and Cyberattack Prevention MethodsOnline Attack Types of Data Breach and Cyberattack Prevention Methods
Online Attack Types of Data Breach and Cyberattack Prevention Methods
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

Case Study : Emerging Cyber crimes in India

  • 1. Dr.SNS RajalakhsmiCollege of Arts and Science (An Autonomous Co-Education Institution) Coimbatore – 641049 www.drsnsrcas.ac.in Presentationby Mrs.S.Janani Assistant Professor Departmentof Information Technology pc.fin@drsnsrcas.ac.in I Department of Information Technology Slide No : 1 DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023 Emerging Cyber Crimes in India
  • 2. INTRODUCTION Cyber extortion is a digital form of Blackmailing cyber criminals do not do real-life kidnapping for demanding ransom money but they employ various new and innovative tricks to threaten potential victims through online mediums. According to a research paper“Cyber extortion can take many forms. It can be very lucrative, netting attackers millions of dollars annually. A typical cyber-attack may result in a demand for thousands of U.S. dollars. Furthermore, payment does not guarantee that further attacks will not occur, whether the attacks continue from the same cyber extortionists or a different group attacks.” IT Department of Information Technology Slide No : 2 DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023 www.snsgroup.com
  • 3. CONT www.snsgroup.com IT Department of Information Technology Slide No : 3  According to a recent report published in Indian Express, India is among the top 10 sextortion mail source countries.  Sextortion is a type of phishing crime where the criminals send emails to the victims demanding money by claiming to have private photos or videos of an individual. Modus Operandi: 1. Criminals send emails to vulnerable persons. They claim that they have accessed the compromised photographs or videos of the victims. 2. Victims get afraid and try to negotiate with the criminals without informing anyone. 3. Criminals demand ransom and continue to exploit. DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023
  • 4. PROBLEM IDENTIFICATION www.snsgroup.com IT Department of Information Technology Slide No : 4 DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023  During the past few months, many suicides have been reported in Telangana for which the reason is said to be the blackmailing of young men and women by the app-based (PowerBank, Tesla Power Bank) loan providers.  The fraud was so massive that Telangana Police hired data analysts to track down the web of fraudsters from across the state.  Alarmingly, Telangana Police reported that 1.40 Crore money lending transactions were reported involving Rs 21,000 Crores. Police also apprised the RBI working group and sought appropriate intervention to regulate the malicious money lending apps. News Source: The Hindu https://www.thehindu.com/news/cities/Hyderabad/police-interact-with-rbiofficials- on-loan-app-fraud/ article33762148.ece
  • 5. www.snsgroup.com IT Department of Information Technology Slide No : 5 DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023 Modus Operandi: 1. People in need of money trying to find out loan providers by searching several mobile apps claiming to be trusted loan providers in quick and easy steps. Such apps also promise less paperwork, low-interest rates and low processing fee etc. 2. People get attracted to such apps without realizing that such apps are never regulated by government financial controllers. 3. When people start failing loan repayment deadlines then app administrators start exploiting and threatening them for dire consequences etc. 4. It has been revealed through investigations, that the cheated money was siphoned off through bank accounts of shell companies, by way of crypto currency to foreign country.
  • 6. www.snsgroup.com IT Department of Information Technology Slide No : 6 DrSNSRCAS/Cyber Extoration /Monday, December 25, 2023  Use strong passwords  Update your software  Manage your social media settings  Strengthen your network  Keep up to date on major security breaches  Talk to children about the internet  Protect yourself from identity theft  Install anti-virus software  Develop a cyber defense plan  Continuously implement, monitor, and upgrade prevention systems and technologies CYBER CRIME PREVENT
  • 7. Resolution in Inter-state water disputes within a Nation www.snsgroup.com IT Department of Information Technology Slide No :7 DrSNSRCAS/Cyber Extoration/Monday, December 25, 2023 Some other ways to prevent cyber crime include:  Using a Virtual Private Network (VPN)  Using a secure internet connection  Using password managers  Getting security awareness training