
or
Cyber crimes are difficult to detect due to the expanse of the virtual space. Here’s a quick guide providing A to Z of Phishing that would not only help you identify this menace but prevent it as well…
The increasing level of e-mail communication on the internet is making it one of the most common medium for fraud and virus infections. Phishing is one of the most feared cyber crimes affecting millions of people all around the world. It is Internet’s biggest identity theft scam and is widely prevalent in India. Phishing is practiced in various ways like via emails, fraudulent websites etc. For instance:
Bank Phishing scams: In some recent cases of phishing (offence which involves identity theft) reported in India, the modus operandi was same i.e. a fake target bank web site was created and the bank’s customers received an e-mail message asking them to renew certain services, claiming that failure to do so would result in the suspension or deletion of their accounts. The e-mail provided a link to a phishing site, in an illegal attempt to collect personal data and account information.
Email Phishing: Many times an email is received in one’s inbox from an unknown company congratulating him for winning a free or an inexpensive deal on a resort vacation or cruise. This kind of solicitation will most likely be a travel scam via phishing. Such emails would come with a link which would connect the email-holder with a site asking for his credit card number to avail the freebies and some personal information, hence, possibly compromising his credit card information for fraudulent online transactions.
Man-in-the-middle attacks: In this type of attack, the attacker surrogates all communications between the system of the customer and the real web-based application. The customer connects to the attacker’s server as if it was the real site, while the attacker’s server makes a simultaneous connection to the real site. The server of the attacker proxies all communication transpired between the customer and the real web-based application server in real-time.
URL Obfuscation Attacks: URL obfuscation techniques involve minor changes to the URL wherein the fraudster tricks the user to follow a hyperlink (URL) to the attacker’s server, without the user realizing that he has been duped.
XSS (Cross-Site Scripting): In this class of attack, the attacker uses custom URL or code inspection into a valid web based application URL or imbedded data field. In general, these XSS techniques are the result of failure of a site to validate the user input before returning it to the client’s web-browser.
Criminals are developing new techniques to counter awareness of customers. These techniques include URL obfuscation to make phishing emails and web sites appear more legitimate and exploitation of vulnerabilities in web browsers that allow downloading and execution of malicious code from a hostile web site. Hackers use false and fraudulent websites and URL Links to deceive people into disclosing their valuable personal data later to be used in phishing schemes to swindle money from the victim’s account. Thus, it is an offence of cheating that is punishable u/s 420, the Indian Penal Code, 1860 (IPC). There is also criminal conspiracy between various people perpetrating the crime, like the person who opens the beneficiary account or who receives the funds in their account in conspiracy with the fraudster. Thus, Section 120-B IPC which relates to criminal conspiracy is also applicable. The forgery of website which is in the nature of electronic record to cheat the gullible bank customers is punishable u/s 468, IPC. Fraudulently or dishonestly using as genuine, the fake website in the nature of electronic record is punishable u/s 471, IPC. Alok Lakhanpal, Advocate, Delhi High Court & District Courts and Guest Faculty, University of Delhi, adds, “Apart from attracting the provisions of IPC, when the hacker uses false and fraudulent websites to lure the victim to disclose his personal information and take control of the internet account with the intention to cheat him by deleting or altering any information/data residing in bank server electronically (for example; changing the mobile phone number of victim with his own) the offender commits the offence of hacking which is punishable u/s 66 Information Technology Act, 2000 (IT Act).”
Thus, the account of the victim is compromised by the hacker which is not possible unless he affects some changes by way of deletion or alteration of information/data electronically in the account of the victim residing in the bank server. Thus, this Act is squarely covered and punishable u/s 66 IT Act.
“Apart from attracting the provisions of IPC, when the hacker uses false and fraudulent websites to lure the victim to disclose his personal information and take control of the internet account with the intention to cheat him by deleting or altering any information/data residing in bank server electronically (for example; changing the mobile phone number of victim with his own) the offender commits the offence of hacking which is punishable u/s 66 Information Technology Act, 2000 (IT Act).”
Adarsh (name changed on request) had his account with a bank and availed the Net Banking facility. He was fraudulently cheated by the accused person by unauthorized debit of an amount of INR 1, 75,000/- from his account. The accused used to practice Phishing or send fake emails to bank customers in bulk. The credentials of the fake email used to appear as genuine as the accused utilised Bank’s logo in email. The accused thereafter used to request customers to enter on the link attached in the fake mail & asked customers to disclose their customer ID and password. If any customer used to respond to his queries, accused with help of that information fraudulently siphoned money from the innocent customer’s account. After this, fraudsters used to get that money transferred in their newly opened fake bank accounts and withdrew the whole amount from there.
Banks not only make their customers aware through messages, mails and statements, they also keep their internal data protection system foolproof.
Manager of a private bank, Delhi, informed Witness Bureau about a case of phishing wherein a foreigner accused, (who was expert in breaking the passwords of bank customers through internet) required some banks accounts for illegal net banking transfer of money. For this he contacted the Indian accused who shared the details of the accounts of this private bank (which were opened on the basis of fake documents). Using these details, the foreign accused, through phishing, transferred Rs. 2,26,000 to these accounts, this was later withdrawn by the Indian accused.
Delete any email without opening it if you don’t recognize the sender. Never respond to an unsolicited email that asks for personal financial information, requests your authentication or indicates a problem with your accounts using urgent or exaggerated claims. Instead of opening the attachment, it is advisable to contact the organization that has seemingly sent the e-mail. Do not open attachments. Read the text of the e-mail several times and ask yourself why the requested information would really be needed. Contact the organization that has sent the e-mail to report anything suspicious in the e-mail. Use a telephone number that you know to be legitimate. Use virus protection software and keep the virus lists current and updated. Keep your computer operating system and web browser up- date. If you think you have received a suspicious e-mail, pop-up ad or have been directed to a suspicious looking website, file a complaint with investigating agencies located in your city.
Phishing is a threat to the modern ecommerce environment and there is no strait jacket formula to deal with it or to insulate or protect oneself from phishing. Apart from mitigating or preventive measures, awareness of customer or customer education is the key to fight this menace. The law enforcement agencies, the legislature and the industry should come together and coordinate in this fight against Phishing.
Lex Witness Bureau
Lex Witness Bureau
For over 10 years, since its inception in 2009 as a monthly, Lex Witness has become India’s most credible platform for the legal luminaries to opine, comment and share their views. more...
Connect Us:
The Grand Masters - A Corporate Counsel Legal Best Practices Summit Series
www.grandmasters.in | 8 Years & Counting
The Real Estate & Construction Legal Summit
www.rcls.in | 8 Years & Counting
The Information Technology Legal Summit
www.itlegalsummit.com | 8 Years & Counting
The Banking & Finance Legal Summit
www.bfls.in | 8 Years & Counting
The Media, Advertising and Entertainment Legal Summit
www.maels.in | 8 Years & Counting
The Pharma Legal & Compliance Summit
www.plcs.co.in | 8 Years & Counting
We at Lex Witness strategically assist firms in reaching out to the relevant audience sets through various knowledge sharing initiatives. Here are some more info decks for you to know us better.
Copyright © 2020 Lex Witness - India's 1st Magazine on Legal & Corporate Affairs Rights of Admission Reserved