Cyber Swachhta Abhiyaan:
Combating the Surge in Cyber Fraud
Sujeet Yadav
Cyber frauds have regrettably become the norm in India, with the National Cybercrime Reporting Portal (NCRP) revealing approximately 7,40,000 complaints in the first quarter of 2024 alone. A staggering 46% of these complaints pertain to various scams, including trading, investment, and romance-related schemes. Victims collectively lost around Rs. 1,776 crore, highlighting the pressing need for action.
Prime Minister Shri Narendra Modi recently cautioned the citizens about the rising threat of digital arrest scams during his "Mann ki Baat" address. In a disturbing trend, Indians lost Rs. 120.3 crore to digital arrest frauds in the first quarter of 2024. Digital arrest scams typically involve fraudsters impersonating law enforcement officials, falsely claiming that victims are under investigation or involved in illegal activities. These scammers then pressure individuals into transferring money to avoid arrest or legal consequences, exploiting fear and urgency to perpetrate their schemes.
The Prime Minister outlined a three-step strategy to combat digital arrest scams, stressing that legitimate agencies do not threaten individuals over the phone or demand money. The steps are: Stop-remain calm and don't panic; Think-recognise that no government agency operates this way; and Act-report incidents to the national cyber helpline at 1930 or through cybercrime.gov.in.
The Government of India is reinforcing cyber cleanliness through the Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre), part of the Digital India initiative. This centre aims to secure cyberspace by identifying and combating botnet infections, thereby notifying users and helping them clean their systems to prevent further infections. Operating under the Indian Computer Emergency Response Team (CERT-In), it collaborates with Internet Service Providers and antivirus companies, aligning with the National Cyber Security Policy.
Understanding Botnets and Malwares
Botnets and malware are critical threats in the digital landscape, often working in tandem to exploit vulnerabilities and carry out cybercrimes.
Botnets are networks of compromised computers controlled by cybercriminals to perform malicious tasks, such as launching attacks or distributing spam. Malware, short for malicious software, includes viruses, worms, and trojans designed to damage or gain unauthorised access to systems. Both botnets and malware pose significant threats to individuals and institutions by compromising sensitive data, disrupting services, and leading to financial losses. By providing users with tools and information to secure their devices, the Cyber Swachhta Kendra aims to create a safer digital environment for all.
Cybercriminals exploit botnets and malware to execute crimes like digital arrest scams through a systematic approach. They use malware to infiltrate devices, turning them into bots that can send out fraudulent messages or calls impersonating law enforcement agencies.
These scams often create a sense of urgency, convincing victims they are under investigation. The botnet can overwhelm victims with multiple communications, increasing the chances of compliance. By leveraging stolen personal information, criminals gain credibility, further manipulating victims into transferring money or divulging sensitive details under the pretense of legal repercussions.
How Botnets Work?
A botnet is a collection of internet-connected devices, often compromised without the owner's knowledge. Cybercriminals deploy malicious software (malware) to infect these devices, converting them into "bots" or "zombies" under the hacker's control.
· Infection: Devices are typically infected through phishing emails, malicious downloads, or vulnerabilities in software.
· Control: Once compromised, the devices receive commands from a central server known as a Command and Control (C2) server.
· Execution: Botnets can execute various tasks, including sending spam, stealing personal information, launching Distributed Denial of Service (DDoS) attacks, or facilitating further malware distribution.
How Malware Works?
Malware encompasses a variety of malicious software designed to harm, exploit, or otherwise compromise devices and data.
Types of Malware: This category includes viruses, worms, trojans, ransomware, and spyware, each with distinct functionalities.
Delivery: Malware can be delivered through infected attachments, compromised websites, or bundled with legitimate software.
Impact: Once installed, malware can steal sensitive information, encrypt files for ransom, create backdoors for future access, or manipulate device functions for unauthorised purposes.
Threats to Users and Institutions
The combined threat of botnets and malware can result in significant financial losses, data breaches, and reputational damage. Institutions may face operational disruptions, regulatory penalties, and loss of customer trust. Individuals may experience identity theft, financial loss, and unauthorised access to personal accounts. Governments and organisations must remain vigilant against these evolving threats, employing robust cybersecurity measures to protect their networks and users.
Government of India's Initiatives to Combat Cyber Crime
To strengthen its response to cybercrime, the Government of India has implemented several key initiatives:
1. Indian Cyber Crime Coordination Centre (I4C): Established by the Ministry of Home Affairs, this center acts as a national hub for coordinating responses to cybercrime. It provides a comprehensive framework for dealing with various cybercrime issues, ensuring effective collaboration between law enforcement agencies.
2. Joint Cyber Coordination Teams (JCCTs): Formed in seven strategic locations across India, these teams enhance coordination among state and union territory law enforcement agencies. They focus on cybercrime hotspots and multi-jurisdictional issues, promoting collaborative efforts to tackle complex cybercrime cases.
3. National Cyber Forensic Laboratory (Investigation): Located in New Delhi, this lab supports state police with cyber forensic assistance. It offers expertise in areas such as mobile and memory forensics, helping law enforcement agencies analyse and investigate cybercrime cases effectively.
4. National Cyber Crime Reporting Portal: This online portal enables citizens to report all types of cybercrimes, with an emphasis on incidents targeting women and children. The portal facilitates the registration of FIRs and tracks the progress of reported cases, streamlining the process for law enforcement agencies.
5. Citizen Financial Cyber Fraud Reporting and Management System: This system allows individuals to report financial frauds promptly, helping to mitigate losses. By facilitating immediate action, it has saved substantial amounts of money for victims and provided a toll-free helpline for assistance.
6. CyTrain Portal: This Massive Open Online Course (MOOC) platform is designed to build the capacity of police and judicial officers through comprehensive online training in cybercrime investigation and forensics. It aims to equip law enforcement personnel with essential skills and knowledge.
7. Awareness Campaigns: To enhance public awareness about cybercrime, the Central Government has initiated several awareness strategies. These include disseminating messages via SMS and social media channels such as X (formerly Twitter) @CyberDost, Facebook (CyberDostI4C), Instagram (cyberDostI4C), and Telegram (cyberdosti4c). Additionally, the government conducts radio campaigns, partners with MyGov for widespread outreach, organises Cyber Safety and Security Awareness Weeks with states and UTs, and publishes handbooks for adolescents and students. States and UTs have also been encouraged to engage in awareness activities to maximise outreach.
8. Capacity Building Funding: Financial support is provided to states and union territories to develop cyber forensic labs and train personnel. This funding enhances local capabilities in addressing cybercrime and strengthens the overall infrastructure to combat it.
Innovative Initiatives to Tackle Cyber Crime
CyberGuard AI Hackathon:
The recently launched CyberGuard AI Hackathon is a novel initiative of the Government of India in combating cybercrime through innovative initiatives. This hackathon, part of the IndiaAI Application Development Initiative, aims to harness artificial intelligence to enhance cyber-security measures. By encouraging collaboration among innovators and tech enthusiasts, the government is not only addressing the rising threat of cyber fraud but also fostering a skilled workforce equipped to navigate the complexities of the digital landscape.
Key aspects of the event include:
Theme: Participants will focus on creating a Natural Language Processing (NLP) model to assist citizens in accurately filing cybercrime reports via the National Cyber Crime Reporting Portal (NCRP).
Format: The hackathon comprises three stages: a virtual phase followed by an in-person event for the top 20 teams, culminating in a pilot project for the top three teams.
Prizes: Significant cash prizes are offered, with the first-place team receiving up to Rs. 25 lakhs, along with opportunities for national rollout of their solutions.
Empowerment of Women: There's a special prize for all-women teams, highlighting the government's commitment to gender inclusivity in technology.
This initiative not only aims to combat cybercrime but also seeks to build a skilled workforce adept in AI and cybersecurity, showcasing the government's holistic approach to ensuring digital safety.
The Quad Cyber Challenge
The Quadrilateral Security Dialogue, known as Quad, is a strategic partnership involving India, the United States, Japan, and Australia, aimed at enhancing cooperation in the Indo-Pacific region. Established in response to shared security concerns, the Quad focusses on promoting stability, democracy, and a rules-based order in the face of emerging challenges. Recently, the Quad countries announced the continuation of the 'Quad Cyber Challenge,' emphasising cybersecurity education and workforce development, reinforcing their commitment to safeguarding digital security in a rapidly evolving technological landscape.
This year's Quad Cyber Challenge theme emphasises the promotion of cybersecurity education and the development of a robust workforce, reflecting the growing recognition of cyber threats in today's interconnected world. The initiative aims to bolster awareness and skill development, aligning with India's broader efforts to create a secure cyber ecosystem as part of its national strategy.
On October 29, the National Security Council Secretariat (NSCS) and the United Service Institution of India (USI) organised the Quad Cyber Challenge as part of the "Cyber Swachhta Abhiyaan" - India's Cyber Hygiene Campaign. The event included:
1. Workshops led by cybersecurity experts for students and faculty from ten Kendriya Vidyalaya schools.
2. Focus on Cyber Hygiene, emphasising the importance of adopting safe online practices.
3. Encouragement for Career Paths in cybersecurity, particularly for women.
4. Discussions on integration of Cybersecurity Education into school curricula to address cyber threats.
5. Discussions on Cyber Law and Digital Forensics to enhance awareness of the cybersecurity landscape.
As cyber threats evolve, continuous adaptation and collaboration will be essential in maintaining a secure digital environment. Ultimately, the success of this initiative relies on collective efforts-government agencies, law enforcement, technology experts, and citizens-working together to ensure that the benefits of the digital age are realised while minimising the risks associated with cybercrime.
Cyber Crime Description
· Cyber Slavery - Cyber slavery refers to the exploitation of individual through forced labour facilitated by online platforms. Victims, often vulnerable populations, can be manipulated or coerced into working under inhumane conditions, sometimes through deceptive job offers. The anonymity of the internet complicates enforcement and detection, allowing traffickers to operate more freely. This modern form of slavery is a grave violation of human rights and poses significant challenges for law enforcement and support organisations trying to combat it.
· Digital Arrest -"Digital arrest" fraud typically involves scammers impersonating law enforcement or government officials to coerce individuals into providing sensitive information or funds. This may occur through phone calls, emails, or text messages claiming that the victim is under investigation or has outstanding fines, creating a sense of urgency. Victims are often threatened with arrest unless they comply with payment or provide personal details. This type of fraud exploits the public's fear of legal repercussions, making it a particularly insidious form of cybercrime.
· Doxxing - Doxxing refers to the act of publicly revealing private or personally identifiable information about an individual without their consent, typically sourced from online profiles, social media, or other digital footprints. This information can include addresses, phone numbers, email addresses, or even sensitive data. Doxxing is often used as a form of harassment, intimidation, or revenge, and can lead to severe consequences for the targeted individuals, including stalking, identity theft, and other forms of abuse.
· Phishing - Phishing is a cybercrime in which attackers impersonate legitimate organisations or individuals to deceive victims into revealing sensitive information, such as passwords, credit card numbers, or personal data. This is typically done through emails, text messages, or websites that appear trustworthy. Phishing often exploits social engineering techniques, creating a sense of urgency or fear to prompt victims to act quickly. Successful phishing attacks can lead to identity theft, financial loss, and unauthorised access to accounts.
· Ransomware - Ransomware is a type of malicious software that encrypts a victim's files or system, rendering them inaccessible. The attackers then demand a ransom, typically in cryptocurrency, in exchange for the decryption key needed to restore access. Ransomware can spread through phishing emails, malicious downloads, or vulnerabilities in software. It poses a significant threat to individuals and organisations, potentially leading to data loss, financial damage, and operational disruption. Preventive measures include regular data backups, using security software, and employee training on cyber hygiene.
· Identity Theft - Identity theft occurs when someone unlawfully obtains and uses another person's personal information, such as their name, Social Security number (like Aadhar), or financial details, to commit fraud or deception. This can result in unauthorised transactions, damaged credit ratings, and significant financial loss for victims. In the context of cybercrime, identity theft often occurs through phishing attacks, data breaches, or malware. Individuals and organisations must implement strong cybersecurity measures and monitor for suspicious activity to mitigate the risks associated with identity theft.
· Cyberbullying - Cyberbullying involves the use of digital platforms to harass, intimidate, or harm individuals, particularly among adolescents. This can manifest through mean-spirited messages, spreading rumours, or sharing private information without consent. Cyberbullying can lead to serious emotional distress for victims, affecting their mental health and well-being. Unlike traditional bullying, cyberbullying can occur 24/7, making it harder for victims to escape. Addressing cyberbullying requires awareness, open communication, and support from parents, educators, and peers to foster a safer online environment.
· Online Scams - Online scams are deceptive schemes conducted over the internet to defraud individuals or organisations. They often involve tricking victims into providing personal information, financial details, or access to accounts. Common types include phishing emails, lottery scams, fake online shopping sites, and investment frauds. Scammers often use emotional appeals or create a sense of urgency to prompt immediate action. Awareness and skepticism are crucial in protecting against these scams, and individuals should verify the authenticity of offers and communications before responding.
· Credential Stuffing - Credential stuffing is a type of cyber attack where hackers use stolen usernames and passwords from one breach to gain unauthorised access to multiple user accounts on different platforms. This is effective because many people reuse credentials across various sites. Once the attacker gains access, they can exploit these accounts for various malicious purposes, such as stealing personal information, making fraudulent transactions, or spreading malware. To mitigate this risk, users are advised to use unique passwords and enable two-factor authentication.
· Ad Fraud - Ad fraud refers to deceptive practices that exploit online advertising systems to generate revenue through false or misleading methods. This includes techniques like click fraud, where automated bots or individuals falsely click on ads to inflate metrics; impression fraud, which involves generating fake ad views; and ad stacking, where multiple ads are layered in a single ad placement, leading to fraudulent impressions. Ad fraud undermines trust in digital advertising and can result in significant financial losses for businesses. Organisations combat ad fraud through improved tracking, transparency, and sophisticated detection techniques.
(The author is correspondent of an international multi-media platform. Feedback on this article can be sent to feedback.employmentnews@gmail.com).
Views expressed are personal