top of page

STATE OF FRAMEWORK IN INDIA FOR ONLINE BANKING TO DEAL WITH CYBER-ATTACKS ON CRITICAL INFRASTRUCTURE

~Authored by: Ashwinee Singh

1.     INTRODUCTION

During the globalization era, an essential activity of our contemporary twenty-first century has undergone a revolution thanks to internet banking or online banking. Banking is the practice of taking Money that is deposited from the common people with the sole intention of lending, to finance, reimbursing money upon demand, and withdrawing money using any financial instrument. Today, the digital world permeates every aspect of our lives. The strong digital infrastructure supports strong armed forces, active research groups, thriving businesses, open governments, and free market societies. Every day, millions of people all around the country depend on the technological services that are available online.

The term “cybercrime” generally refers to any crime committed online or using a computer to steal someone else's identity, sell illegal goods, kidnap victims, or disrupt business operations via malicious software. As technology becomes more and more important in people's lives, there will be an increase in the number of cybercrimes.

The primary security precautions taken by any company are still data security and confidentiality. We currently live in a world where every piece of information is stored digitally or electronically. Utilizing social networking websites allows users to communicate with their friends and family in a setting where they feel secure. In the case of users at home, cybercriminals will continue to target social media sites in an effort to steal personal information. A person must exercise all necessary security precautions while engaging in financial transactions and using social networking websites.

Information and Communication Technologies (ICT) facilitates international communication and enable the movement of information, goods, and services at a global scale unlike anything that has come before. Our daily lives and the nation's economy both heavily rely on these social and commercial ties nowadays Information network systems are crucial for managing, supplying water, air traffic and electricity, maintaining communications, providing high-speed Internet access, and supporting our institution of finance. The use of network technology is extensive and universal.

The recent infrastructural developments in the digital world has developed into a crucial national resource for all nations. Therefore, it is vital for India's future to improve and secure this digital infrastructure in all of its facets, including the continuous availability of cutting-edge high-speed Internet access, customer-focused apps and services, and information security. The internet has been dubbed the “highway of information” because of its ability to instantly connect billions of people around the world. At the same time, the internet uses I.P. (Internet Protocol Addresses) to identify, locate, and detect servers across its system to communicate information in bytes across the network set up by the Network Operator. In order to facilitate the sharing of ideas, information, and knowledge, man has developed a wide range of communication techniques.

The development of electronic technology, which accelerates financial transactions with a single click, greatly streamlines the process. You may carry out your banking operations quickly and easily thanks to online and mobile banking services. E-banking and Internet banking are not different, both are supplements for one another. World is moving toward E Financing and Internet Banking is one of the best supporters of this campaign. We need this E-financing because the world is shrinking in one financial system. As mentioned above, this is the impact of globalization.

Cybercrimes on a local & worldwide scale appeared as a consequences of the misuse of digital technologies in cyber world. It is obvious that any technology will have two sides at the same time. It depends on the society how they will take this technology.

It comes with a higher percentage of hazards and difficulties. However, the security of online and mobile banking is never guaranteed. The field of banking has benefited greatly from information technology. Customers of financial organizations can conduct financial transactions using online banking services, also known as online banking services, using a website managed by the organization, including brick-and-mortar banks, virtual banks, cooperative credit unions and construction companies. The goal of an online bank is to deliver financial goods and services over the internet. Customers that use this banking strategy do their electronic transactions online. The process of moving money between bank accounts is known as an electronic fund transfer (TEF), as opposed to physically moving money or checks.

Because anybody can connect to the outside world from wherever, crime has increased. Cybercrimes, often referred to as “attacks on computer networks,” occur when one computer intentionally uses another to alter, disrupt, reject, degrade, or erase data that is stored on the targeted system or network. The interrupter causes an interruption by writing malicious code that is directed at the logical or computer code. These attacks are carried out with the goal of stealing the necessary data while leaving no evidence of the intrusion. The term “crime in black” sometimes known as “financial crime” refers to a wide range of illegal acts, many of which have an international component. The word “cyber aggression” is frequently used to describe crimes committed online. Due to the significant financial losses they cause, these crimes have a negative effect on the entire economic and social system,affecting private individuals, businesses, organizations, and even entire nations. These offences may include stealing intellectual property from a company, stealing online bank accounts, infecting other computers with viruses, leaking confidential customer information online, and destroying vital national infrastructure. The most significant result of a cyberattack is the loss of or improper use of informational assets.

Online banking is the term used to describe the expansion of both small- and large-scale financial services provided through the Internet. It includes card transactions, bank transfers, payments and regulations, as well as verified credits and recoveries, financing for households and businesses, and other things. It is addressed at both individuals and businesses. The client-server architecture serves as the foundation for the information architecture of electronic banking. A customer who is using an Internet-connected PC to access his or her bank accounts visits the bank's dedicated E-Banking website, opens it, and enters a series of secure codes. The technology has made it feasible for people and organizations to have the security tools they need to protect themselves from cyberattacks. The three most at-risk targets are the tactics of the terminals, which include PCs, mobile phones, routers, systems and the cloud. Newer generation pares- feu, DNS transmission through a filter, protection against malicious software, antivirus software, and email security results are only a few of the solutions that have been abandoned to safeguard these components.

It is possible to distinguish cyber as having some kind of connection to a network or a collection of job postings. From there, he may study them and make any required payments and transfers from his personal accounts. The term "security" can also refer to a system of defense for anything. This is the time period that was not in focus for a sometime when Internet initiated to rapidly develop. Thanks to cybersecurity, every group or user may protect their sensitive data from pirates. Even though he disdains piracy at this point, he has really used ethical piracy to implement cybersecurity in any building. Because of this, the terms "cyber" and “security” have been used to describe the strategy for protecting user information during or after malicious attacks that might point to a security flaw. These banks send him or her a new combination of digits for every transfer of funds after the transaction number is used up. The bank occasionally offers specially designed software. The bank software may be used offline as well. Each number is sent to the client separately, primarily via mail. The bank also offers customers comparable amenities on its property so that customers are connected to the primary terminal facility known as MultiMate.


Computer used as a target for crime- There are several ways that electronic crime is used as a target for crime, including

Sabotage of computer networks or systems Sabotage of software and operating systems Data or information flow. A breach of intellectual property, such as software Volume of marketing data based on information obtained from digital files, such as medical information, personal antecedents, financial information, etc.


The computer is used as a tool for crime

Bank robbers use a variety of electronic platforms, including the Internet, electronic mail, and encrypted flash messaging, among others, to carry out their crimes. The victim of this computer network crime is the banking industry.


2.     ONLINE BANKING IN INDIA

The first instances of electronic crime date back to the 1960s and take the form of theft. As a result of the emergence of computers in the 1970s, new crimes known as "computer crimes" have emerged, including invasions of privacy, phone eavesdropping, intrusions, and the spread of illegal goods. Later, in the 1980s, crimes involving electronic systems such as software theft, infringement of intellectual property rights, and virus introduction started to surface. The extent of the damage increased after the 1980s owing to highly advanced electronic systems. These cybercrimes have had a significant impact on the Indian market, the global market, the banking sector, and other sectors as well.

Consequently, the global worry about Cybercrime has recently increased. The concept of electronic crime is a crucial component. Because recently available information is not always reliable, it is frequently hard to identify crimes based on it. In this report, researchers are attempting to evaluate major crimes and electronic crimes committed in the Indian banking sector. In the current globalized environment, information technology is the primary driver of future growth and development of the Indian banking sector. In this rapidly changing environment, customers may struggle to understand and comprehend their financial activities, particularly when using online or Internet banking services.

The banks from both the public and private sectors in Indian banking nowadays heavily rely on technology. Currently, the banking industry places a strong emphasis on making sure that customers' needs are addressed and that their pleasure is maximized. Following the financial sector's embrace of "electronics," a number of issues have emerged, including;

Data theft and theft of data are both common crimes, as are the malfunction of automatic cash dispensers, money laundering, and credit card theft

Net banking, commonly referred to as internet banking, is a computerized way to carry out financial transactions online. Any person with a bank account can activate and utilize this computerized system for their financial transactions. The majority of physical banking methods and activities may be carried out online.

Applications previously unimaginable are now available because of the expansion of high-speed networks, a component of information technology and communication. In the age of cyber technology, voice, picture, and data transmissions may now be sent in microsecond intervals. The banking sector is transitioning from paper & branch banking to digitization of core banking as a result of the technological boom. Information and communication technologies' wide competitive pressures cause irreversible changes that enable new entrants, disinter-mediation, innovation, and consumer changes on a much larger scale than has previously been possible.

The delivery methods that banks employ to communicate with customers are fundamentally altering the age of IT, according to the Evolution of Hi-Tech Banking in India. The groundbreaking report of the Dr. Rangarajan Committee, which was established in September 1988 under the chairmanship of Dr. Rangarajan to draft a prospective plan of computerization for the financial sector for a five-year period beginning in 1990 to 1994, provided the first guidelines for the adaptation of IT in banks.

In order to achieve these goals, banks were found to need to transition away from the usage of specialized, stand-alone devices towards an online real-time payment processing environment for branch banking in order to improve customer service and ease workload strain on the back office.

A new revolution in everyday life for the average person has been brought on by internet banking. Our country as a whole has advanced in addition to the average person. Modern computers are becoming increasingly advanced. Customers of banks now have high standards.

Technology advancements have made it easier to deliver banking goods and services, which has increased competition. A direct marketing strategy, accountable client service, and modern, streamlined corporate procedures provide the bank a competitive edge. Increased use and greater dependence on technology have been brought about by the expansion of the banking industry, global dispersion of operations, consumer demand for faster service, requirement for accurate data, and need for increased effectiveness. The introduction of the Internet has further advanced information technology. Both businesses and individuals are able to perform their transactions from their offices. For banks, having an online banking system is becoming essential.

Banking methods, techniques, and processes are now simpler, easier, quicker, and more effective thanks to the integration of the internet with banking. Since the internet relies on large amounts of data, malicious actors like hackers, spammers, drudges, and infection vector executive producers target and compromise financial services data by using illegal means to jeopardize the safety, protection, and privacy of numerous people who confide in, depend on, and trust the Indian banking infrastructure.

The need for physical and paper financial instruments has been eliminated by the online banking system since funds, money, and capital can be easily obtained and transferred to the recipient on this platform online. Therefore, issues including geographic barriers, a lack of infrastructure, costs, difficulty obtaining loans, and time consumption have been brought on by online banking services. Therefore, it is essential to comprehend the legal restrictions related to the current online banking systems.

The Ministry of Information Technology has the option to issue a notification on October 17 thanks to the 2000 Information Technology Act. In response to this advice, RBI published a notice dated June 14, 2001 and established the S.R. Committee of the Mittal Group of Work. The previous notification from June 14th, 2001 was subsequently modified by the RBI notification from July 20th, 2005, which eliminated the requirement for RBI approval.Here are the minimal security requirements established by the RBI.

  • For authentication, digital signatures based on Security Socket Layer 128 bits and high encryption are used. Each bank should have a security officer who is fully responsible for information technology and who will enforce the application of the laws governing information technology. Among other things,the administration council must understand the bank's security policy.

  • The banks had to adjust since new ideas like connection identification, passwords, and biometric verification were introduced at the time. As part of this adaption, banks were required to maintain a firewall based on a proxy server to ensure that the Internet and digital banking system adheres to security and confidentiality standards. All security measures must undergo testing prior to the launch of any online banking service, and software updates,bug fixes, and other security-related software are considered to be crucial to implement.

  • Future regulations should be developed while keeping in mind the sporadic security cracks that may appear. Every security breach that can occur when doing e-banking must be reported and treated right away. In the meanwhile, it is the bank's responsibility to preserve the coded and decoded records of all transactions and messages received during electronic transactions.

The Reserve Bank of India Act of 1934 and The Banking Regulation Act of 1949 primarily regulate online banking, but the Information Technology Act also controls all forms of systems related to Digital payments and cybercrime. It is important to remember that the law on information technology contains the following key provisions;

  • All electronic papers and digital signatures are recognized in accordance with IT act, which must be preserved and carefully examined by the bank since all electronic contracts and transactions are valid and enforceable in accordance with this law. This law's legislative goal is to make electronic commerce and governance easier.

  • Given that the provisions of the current law must be followed for the protection of personal privacy and the authentication of electronic transactions based on cryptographic function, and that this law makes it illegal to transfer data through unethical means, create viruses, or spread them, no banking transaction can survive if it is not in compliance with the provisions of the computer law. To be fair, the law must also provide protection to Internet service providers and middlemen to prevent harm from illegal activities carried out on their networks.

  • With the immunity granted, the Bank (the intermediary) is required to keep a record and keep it, in accordance central government orders from time. In the interim, any breach of the security or confidentiality of electronic transactions during connection, the taking of the password, and the gathering of other personal information is protected under the authority of the current law, which has made any violation of it punishable.

3.     CYBER ATTACKS ON ONLINE BANKING

According to the ASSOCHAM report, mobile fraud worries businesses, and 35 to 40% of financial transactions are already carried out via mobile devices. According to the study, this percentage should reach 55 to 60% by the end of 2015.

India has grown to be a favorite in the communities of cyber criminals who use infected software to attack on online banking transactions. The study ASSOCHAM-Mahindra SSG places[1]India 3rd on the list of countries most affected by malicious electronic banking software in 2014, behind United States and Japan. This is the reason as to why, country's increasing Internet penetration and the rising popularity of online banking services.

The primary criterion for determining whether or not to categorize a piece of software as belonging to the subclass of viruses and worms is how it spreads, that is, how the infected programme makes copy of themselves using network or local resources. The distribution of the virus includes pieces attached to emails, FTP resources or links to online, references in IRC or ICQ communications, P to P file sharing networks, etc. Some viruses spread through network packets; once inside the computer's memory, they immediately activate the virus code.

In order to get access to remote computers and launch clones of themselves, the adversaries use social engineering, network setup errors, the exploitation of flaws in operating system and application security, among other techniques. An electronic message encouraging the user to open a shared file is an example of social engineering.

The following categories of viruses can be used to categorize them according to how they infect computers;

· Virus of the mortgage sector

· Large virus of the files

· Virus of the script

This Subclass of software enables the addition of Trojan-Cavalry functionality to any application.

It is important to remember that many authors have a variety of strategies for disseminating copies online. These sorts of angles must be categorized in accordance with the rules for classifying seen objects with various functions.

  • SPAM EMAILS

Emails that are unwanted or spam publications on discussion groups are referred as as spam emails. Unwanted mail is sent at the recipient's request and may result in a variety of issues if it is not properly filtered. Spam is frequently sent with commercial intentions. Even while some people believe that spam violates ethical standards, many businesses nonetheless utilize it. Because the cost per message is so low, businesses may send a lot of emails continuously. Another possibility is an intrusion attempt that uses spam to get access to your computer.

Because they may originate from botnets, spams can be challenging to eradicate. The term “botnet” refers to a previously compromised computer network. As a result, it could be difficult to spot and block the original spammer.

Mark any communications you get that seem strange to be spam, such as those coming from senders you are unfamiliar with, in your messaging application. Do not click any joint or link, not even the ones for unsubscribing or unregister. These URLs may be used by spammers to check the validity of your email address or they may start downloading or launching malicious websites.

  • TROJAN

A software under the name of Trojan horse is one that seems trustworthy. Once activated, however, it either searches for pass code info. Or makes the computer weaker to upcoming assaults. A Trojan horse can just delete all the files or programme on the hard drive.

The term “Trojan horse” refers to a dangerous codes or piece of software that imitates legitimate software but possess the capacity to regulate your computer. A Trojan horse is designed to destroy your data or your network by flying them, causing disruptions, or carrying out other nefarious deeds. To trick you, “Trojan horsea portrait to be a valid app or file. It attempts to persuade you to download and run the virus on your computer. Once it has been installed, a Trojan horse may carry out the task for which it was designed. It is improper to call to a Trojan horse as Trojan virus horse or Trojan horse. The capacity to execute and replicate themselves is possessed by viruses. Not a single Trojan horse. Users are required to execute the Trojan Chevaliers. However, the terms Trojan horse virus and Trojan horse malware are sometimes used interchangeably.

  • DENIAL OF SERVICES

DoS occurs when hackers attempt to disable or disable certain computers, websites, or networks, frequently by bombarding them with messages. An attempt at a denial of service (DoS) attack aims to stop targeted users from using an IT system or network. The victims of DoS attacks receive an overwhelming amount of traffic or information, which results in a plantae. When a denial-of-service attack occurs, it prevents authentic users from accessing the service or resource they were expecting, such as employees, members, or account holders. DoS attacks typically target the Web servers of well-known companies, including the media, financial and commercial businesses, as well as governmental and commercial organizations. Even though they frequently do not result in the loss of significant data or other operational components, DoS attacks can cost the victim a lot of time and money.

A malicious software is a piece of computer code that stealthily accesses a user's computer and uses it to spread malware to other users' devices or social media accounts. With the use of such software, a botnet—often referred to as a group of computers controlled remotely by pirates—can be built to spread spam or viruses.

  • SCAREWARE

Some online scammers manipulate users into downloading certain software by employing fear tactics. Even though they are advertised as antivirus programme, these software eventually start to target the user's PC. In order to be freed from this malicious software, the user must pay the fines. Even companies are working to reduce malware attacks.[3]

  • PHISHING

The popular social engineering method is used to gather user information such as login credentials and credit card information. This occurs when a perpetrator tricks a victim in to opening an email, an instant chat, or an SMS while impersonating a reliable source. The recipient then receives a broken link to click on. This might result in the installation of malicious software on the recipient's computer, the imposition of anti-ransomware on that device,or the disclosure of private information. Aggression can result in disastrous consequences.

It covers any illegal transaction, including the theft of money or identity. Additionally, phishing is frequently used as part of a larger attack called a persistent advanced threat to compromise government or commercial network infrastructure (APT). In the latter Case the staff members focus on defining the security measures, disseminating risky software in a secure environment, or gaining access to private information. An attack of this nature typically translates into a significant financial loss for a business as well as a loss of market share, consumer trust, and reputation. Depending on its scope, a phishing attempt may develop into a security issue that a company would find challenging to resolve.

  • FISCAL FRAUD

Illegal measures used by a contributor (individual or company) to avoid paying taxes, which are often due because of personal income. By focusing on the established online payment channels, hackers on the internet may disrupt legitimate operations like tax collection or the submission of fake service requests.

  • STATE CYBER ATTACKS

According to analysts, certain governmental organizations may employ cyber attacks as a brand-new kind of warfare. One of these attacks took place in 2010, when the Iranian nuclear programme was silently attacked using the computer virus Stuxnet[4] The virus's intended outcome was to disable Iranian nuclear enrichment centrifuges.

  • CARDERS

The theft of financial or credit card information is another significant kind of cybercrime. Then, double-sided cards are used to withdraw money from automatic cash registers and merchants.



By far most of business tasks are done internet, making information and assets powerless against different cyberattacks. The framework's information and assets act as the establishment whereupon the association is constructed, subsequently any danger to them is verifiably a danger to the gathering in general. A danger could go from a straightforward programming mistake to complex cloud-dispersion obligation. On account of the gamble evaluation and remaking cost forecast, the business might be ready and expect misfortunes. Accordingly, it is vital to fathom and make network safety objectives that are one of a kind to every business to safeguard delicate information. A method called “network safety” was created to defend convoluted information from assaults, cancellations, and unapproved admittance to gadgets and the Web. Online protection plans to give a safe and hazard-free climate to defend information, organizations, and gadgets against cyberattacks.


APTs and Targeted Attacks- The term “APT” refers to a new category of cybercriminal software(Advanced Persistent Threat). For years (often after first penetration), intrusion prevention systems (IPS) and web filtering systems have worked together to identify targeted hacking attempts. To identify assaults as attackers get more forceful and utilize more inconsistent strategies, network security should team up with other security administrations. Accordingly, we should fortify our safety efforts to stop the development of new dangers later on.


Mobile Networks- We can speak with anybody, any place on the planet, right now. Then again, these portable organizations treat security extremely in a serious way. Asadditional individuals use gadgets like tablets, telephones, computers, and other comparable gadgets these days, safety efforts, for example, secret word insurance and other safety efforts are turning out to be more porous. These gadgets additionally call for new safety efforts that go past those found in the program being utilized.We should never fail to focus on how secure these portable organizations are. Moreover, versatile organizations are very helpless to these cybercrimes; subsequently, intense wariness should be shown in the event of safety issues.


IPv6- New Internet Protocol- The ongoing Web convention, IPv6, has supplanted the past convention, IPv4, which filled in as the fundamental structure block of the Web before IPv6. Something beyond moving IPv4 usefulness is required for IPv6 insurance. Regardless of whether IPv6 is a finished substitution as far as an expansion in the quantity of IP tends to that are accessible, certain extremely essential convention changes should be considered in Security strategy. Hence, it is dependably desirable over move to IPv6 at the earliest opportunity to lessen the dangers related with cybercrime.


Encryption of the code- Sepulcher age is the most common way of scrambling messages to keep privateers or secretive audience members from understanding them. In a sepulcher age approach, a calculation is utilized to transform the message or data into a confused tangle of hogwash. Ordinarily, a sepulcher key that indicates how the message ought to be encoded is utilized for this. The most rudimentary degree of encoding shields both the secrecy and honesty of information. In any case, the developing utilization of encryption makes new issues for network protection. Moreover, encryption is utilized to shield information on the way, including information moved across networks (like the Web or web based business), cell phones, cordless receivers, cordless inter phones, and so forth. Hence, by scrambling the code, one might determinewhether there was any data spillage.


Firewalls- An equipment or programming part known as a pare-feuhelps with forestalling programmers, infections, and other web dangers from endeavoring to get toyour PC. The firewall that is as of now set up checks each correspondence as it enters or leaves the Web and blocks those that don't stick to the laid out security necessities. Subsequently, the utilization of pare-feu is fundamental in the recognition of malevolent programming.


Anti-virus software- A PC program known as antivirus programming empowers clients to perceive, stop, and make a move against hazardous programming programs including infections and deceptions. Most of antivirus items have a programmed update include that empowers the product to download profiles of new infections so it can search for them when they are found. Each framework must have no less than one antivirus program. The main goal of cybersecurity is to safeguard data against theft or collaboration.


To do this, we will examine three key cybersecurity objectives

Ø Maintaining information confidentiality

Ø Maintaining the accuracy of the information

Ø Only allowing those who have been given permission to access the information.


These objectives set up as a regular occurrence the CIA's confidential, honesty, and accessibility triangle, which frames the foundation of all security program. The CIA's triangle security model is a security rule expected to coordinate inside data security procedures in associations.

This model is additionally utilized instead of the AUS (Availability, Uprightness, and Secrecy)to stay away from disarray with the Focal Insight Organization.

The three most huge basic security components are reflected in the essential atriadic standards. Most of society and organizations adhere to the CIA's directions at whatever point another solicitation is associated, a recording is made, or admittance to data is ensured. These extra rooms should prompt the ideal result for the information to be totally secure.


4.     PROVISIONS OF INDIAN PENAL CODE 1860 AND INFORMATION TECHNOLOGY ACT, 2000

Section 66-B[5] of the IT law, which violates Section 411[6] of the IPC, forbids and punishes those who are accused of stealing data and information from any sort of computerized device. However, the combination of Section 378[7] and Section 424[8] of the IPC prohibits and penalizes those who cause data loss through theft, the Development of infection vectors, or the spread of viruses. Even the creation of false electronic documents or their fabrication is punishable under IPC Section 468[9], despite the fact that no equivalent punishment has yet been established by IT law.

Using an electronic tool to steal from someone else constitutes theft by personification, a felony punishable under section 66-C[10] of the computer law, and violates section 411[11] of the criminal procedure code (IPC), which prohibits receiving stolen property dishonestly. However, Section 425 of the IPC, which punishes offenses, has not been made punishable in accordance with the IT law; as a result, committing offenses by disseminating viruses and blocking access to people's personal data may result in a fine. Legal remedies through using existing legal structure.

Hence, the accessibility of network to the rest of the world from any area has prompted an expansion in wrongdoing. Assaults on PC organizations, frequently known as cybercrimes, happen when one PC intentionally utilizes one more to change, disturb, deny, corrupt, or erase information put away on a particular framework or organization. The dangers have expanded because of the rising utilization of tablets and cell phones for web based banking and other monetary exchanges.

Because of a disturbing pace of development that could present huge monetary and security gambles, the quantity of cybercrimes in the nation might fourfold to arrive at 3 lakh in 2015.In each of the, 13 301, 22 060, 71 780, and 1 49 254 digital violations were accounted for in 2011, 2012, 2013, and 2014, separately, as per the review's discoveries. These monstrosities began in a few different nations, including China, Pakistan. The dangers have expanded because of the rising utilization of tablets and cell phones for web-based banking and other monetary exchanges. Because of a disturbing pace of development that could present huge monetary and security chances, the quantity of Cybercrimes in the nation might fourfold to arrive at 3 lakh in 2015. In every one of the, 13,301, 22,060,71,780, and 1,49,254 digital violations were accounted for in 2011,2012, 2013, And 2014, separately, As indicated by the review's discoveries. These monstrosities began in a few different nations, including China, Pakistan. Bangladesh, and Algeria. Occurrences including the robbery of charge/ATM cards or goes after on internet banking accounts by hacking are normal. The dangers have expanded because of the rising utilization of tablets and cell phones for web-based banking and other monetary exchanges. Because of a disturbing pace of development that could present huge monetary and security chances,the quantity of cybercrimes in the nation might fourfold to arrive at 3 lakh in 2015.


5.     Case Study of Cosmos Bank

According to SecuronixThreat Research, Cosmos Bank's (COSDINBB), an Indian cooperative bank with 112 years of history and the second-oldest in the nation, recently became the target of a new, highly publicized cyberattack. As a result, more than 13.5 million US dollars have been pre levied12. Here is a summary of the facts we currently know about this well-known attack, along with advice on security assessments and Securonix prediction indicators to increase your chances of discovering similar attacks targeting SWIFT and financial services.

The bank's inner organization and ATM were taken on August 10 and 11, 2018, because of an earlier persistent break and a side movement. The assault included a few designated programming diseases, then, at that point, utilized a bunch of ISO8583- contradictory libraries and brought about code infusions to design a noxious POS/ATM switch (malevolent Focal or MC) simultaneously with the current Focal, before specifically removing the association between the Focal and the back end/Center Financial Framework (CBS).


6.     CONCLUSION

Cyber-attacks that target public infrastructures are one type of attack. Government and private organizations are involved. Sometimes the government has supported these kinds of attacks against other countries. Confidential data is typically obtained from foreign nations or any competitive company in the course of this attack. The motivations might change, such as a military, economic, or political advantage. Secret knowledge may be obtained and used inappropriately once obtained. With these attacks, the pirates have the ability to disturb the world order, affect politics, influence the government, and cause havoc at any major event. Banks are frequently the target of cyberattacks.


References: [1] Cybercrimes in India is likely to cross. 3,00,000 by 2015: ASSOCHAM-Mahindra SSG study, Business standard, 5 Jan, (2015),https://www.business -standard.com/article/news-cm/cyber -crimes-in-india-is- likely-to-cross-3-00-000-by-2015-assocham- mahindrass-study115010500991_1.html. [2] Devices: Finding EvasiveMalware Associated Website:TheHackerNews Researchers in cybersecurity have developed a unique method that uses the electromagnetic fields emitted by Internet of Things (IoT) devices as a side-channel to get accurate information on the many types of malware that attack embeddedsystems. Even if malware has the highestdegree of privilegeon the computer, it has no influence over the hardware outside of the computer. When executing various malware programmes, this method includesmonitoring electromagnetic emissions. By observing only the electromagnetic emanations from a monitored device, it is feasible to obtain considerable information about the condition of thedevice using straightforward neural networkmodels [3] Microsoft Fights Against Malware and Password-theft Source: https://www.bleepingcomputer.com/ In order to effectively stop a common technique for virus dissemination, Microsoft has stated that various Microsoft Officeproducts would make it harderto activate VBA macrosobtained via the Internet. Source: Bill Toulus,Ukraine says Russianhacktivists use new Somnia ransomware. Nov, (2022),https://www.bleepingcomputer.com/. [4] “Israel- appears to confirm it carried out cyber-attacks- on Iran Nuclear Facility”, The Gaurdia, Apr(2021) https://www.theguardian.com/world/2021/apr/11/israel-appears-confirm-cyberattack-iran-nuclear- facility [5] 66B Punishment for dishonestly receivingstolen computer resourceor communication devices. [6] 411 Dishonestly receiving stolen property [7] 378- Theft -Whoever, intending to dishonestly take any movable property out of the possession of any person without that person's consent, moves that property in order to such taking,is said to committheft [8] 424. Dishonest or fraudulent removal or concealment of property.—Whoever dishonestly or fraudulently conceals or removes any property of himself or any other person, or dishonestly or fraud-ulently assists in the concealment or removal thereof, or dishon-estly releases any demand or claim to which he is entitled, shall be punished with imprisonment of either description for a term which may extend to two years, or with fine, or with both.. [9] . 468 Forgery for the purposeof cheating. Whoever commits forgery,intending that the 1 [document or electronic record forged]shall be used for the purpose of cheating, shallbe punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine. [10] 66 C. Punishment of identity theft -Whoever, fraudulently or dishonestly makes use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh. [11] 411 Dishonestly receiving stolen property- Whoever dishonestly receives or retains any stolen property, knowing or having reason to believe the same to be stolen property, shall be punished with imprisonment of either description for a term which may extend to three years,or with fine, or with both

29 views0 comments
bottom of page