The document presents a case study report on three types of cyber-crimes: phishing attacks, ransomware attacks, and online child exploitation scams. Each case highlights the methods used by criminals, the outcomes for victims, and the significant financial and emotional impacts, along with prevention measures to mitigate such risks. The report emphasizes the importance of user education, secure practices, and robust cybersecurity measures to combat these prevalent threats.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0 ratings0% found this document useful (0 votes)
23 views4 pages
Practical 6 CSDF
The document presents a case study report on three types of cyber-crimes: phishing attacks, ransomware attacks, and online child exploitation scams. Each case highlights the methods used by criminals, the outcomes for victims, and the significant financial and emotional impacts, along with prevention measures to mitigate such risks. The report emphasizes the importance of user education, secure practices, and robust cybersecurity measures to combat these prevalent threats.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
Aim:-Prepare a case study report on 3 different types of cyber-crimes.
( https://gujaratcybercrime.org) (https://cybercrime.gov.in).
1. Phishing Attacks
Phishing is one of the most prevalent forms of cybercrime, where attackers impersonate
legitimate entities to trick victims into disclosing sensitive personal information, such as
passwords, credit card numbers, and bank account details. These attacks are often carried out
through emails, text messages, or fake websites that appear to be from trustworthy sources,
Case Study:
Incident: A resident of Gujarat, who was a frequent online shopper, received an email
purportedly from an online shopping platform. The email notified the victim about an issue with
their recent purchase and asked them to verify their account by clicking on a link, The email
appeared authentic, with logos and design matching the official website.
The victim clicked on the provided link, which redirected them to a fake webpage that closely
resembled the original shopping platform. The page asked the victim to log in with their account
credentials and provide payment details for verification. Upon entering their details, the vietim
unknowingly gave away sensitive information to the cybercriminals
Outcome:
‘The attacker accessed the vietim’s bank account linked to the online shopping platform and made
‘unauthorized transactions, The victim lost significant funds and faced difficulty in reversing the
transactions due to the lack of timely reporting.
Impact:
Financial Loss: The victim suffered a financial loss of INR 50,000 through unauthorized
transactions,
Identity Theft Risk: The stolen login details were used to access other personal accounts,
creating a risk for further identity theft.
Emotional Distress: The victim faced significant stress dealing with the loss and attempting to
recover the stolen funds.
Prevention Measures:Educating Users: Individuals must be aware of the signs of phishing attacks, such as unfamiliar
URLs and suspicious email addresses.
Secure Email Practices: Always verify the sender's email address and avoid clicking on links in
unsolicited messages.
‘Two-Factor Authentication: Enabling two-factor authentication (2FA) on sens
can significantly reduce the chances of unauthorized access.
2. Ransomware Attacks
Ransomware is malicious software that encrypts a victim's files, locking them out of their system.
until they pay a ransom to the attacker. Ransomware is often delivered through malicious email
attachments or compromised websites. This type of attack can have devastating consequences for
both individuals and organizations.
Case Study:
Incident: In 2024, a large healthcare organization in Gujarat became the target of a ransomware
attack. The organization’s IT systems were compromised when an employee inadvertently
opened a malicious email attachment, which installed the ransomware on the network.
‘The malware encrypted sensitive patient data and medical records, making it impossible for the
hospital staff to access critical information needed for patient care. The attackers demanded a
ransom of 10 Bitcoin (approximately INR 3 crore at the time) to provide the decryption key.
The hospital faced significant operational disruption. It was unable to schedule surgeries, manage
emergency cases, or retrieve patient history. After two weeks of negotiations, the hospital
decided to pay the ransom to regain access to their data, but the damage had already been done.
Outcome:
Operational Disruption: The hospital experienced a massive disruption in its services, which
led to delays in patient care.
Reputational Damage: The trust in the hospital's ability to secure sensitive health data was
severely damaged.
Financial Losses: The ransom payment of INR 3 crore and additional recovery costs placed a
significant financial burden on the hospital.Impact:
Financial Loss: Beyond the ransom, the organization incurred additional expenses for recovery
and future security enhancements.
Patient Care: Delayed access to critical patient data endangered the lives of some patients who
could not receive timely treatment.
Loss of Trust: Public confidence in the institution’s cybersecurity practices and its ability 10
safeguard private information was significantly eroded.
Prevention Measures:
Regular Backups: Ensuring that all critical data is backed up and securely stored offline reduces
the risk of data loss during ransomware attacks.
Employee Training: Employees must be educated to recognize phishing emails and other
vectors through which ransomware can be deployed.
Multi-layered Security: Deploying robust anti-malware software, firewalls, and intrusion
detection systems can help prevent ransomware from infiltrating the network.
3. Online Child Exploitation and Abuse Attacks
In 2023, a resident of Gujarat reported a lottery scam where the victim was contacted via an
email claiming they had won INR 25 lakh in an international lottery, which was supposedly held
by a well-known international company. The email contained official-looking logos, headers,
and a prize notification that appeared legitimate.
The email requested the victim to provide their personal information, including bank details, to
the prize." It also included a link to a website that mimicked the official company’s
website. The victim was asked to pay a processing fee of INR. 10,000 to claim the prize.
The victim, believing the offer to be legitimate, transferred the requested fee. Shortly after, the
victim was contacted again, demanding an additional fee to release the prize funds. At this point,
the victim grew suspicious and sought help from local authorities.
Outcome:
Upon investigation, the Gujarat Cyber Crime Cell confirmed that the prize and the lottery were
entirely fraudulent. The email was a phishing attempt, and the website was designed to collect
sensitive information, such as credit card numbers and personal banking details, The scammers
used this data for unauthorized financial transactions. The bank details the victim provided were
also used to withdraw money, which led to a financial loss,Law enforcement traced the IP address to a foreign location, and efforts were made to coordinate
with international cybercrime units. Unfortunately, as is common in such scams, the fraudsters
were untraceable due to the use of VPNs and anonymous payment systems like cryptocurrency.
Impact:
Financial Loss: The victim lost INR 10,000, which was transferred as part of the fake
processing fee.
Emotional Distress: The victim experienced emotional stress, feeling embarrassed and violated,
having believed in the legitimacy of the scam.
Data Compromise: The scammers obtained sensitive personal information, which could
potentially be misused for identity theft or further fraud attempts.
Prevention Measures:
1. Verify Legitimate Sources:
+ Always double-check the legitimacy of any prize claims through official channels.
+ If the lottery or prize is from an international organization, confirm through their official
website or contact the company directly
2. Do Not Pay Upfront Fees:
+ Genuine lotteries do not require winners to pay fees or taxes before receiving their prize.
If you're asked to pay upfront, it’s a scam.
3. Use Strong Security Practices:
‘+ Enable two-factor authentication (2FA) on your accounts and regularly update
passwords
+ Keep your devices secure with updated anti-virus and anti-malware software.
Educate Yourself and Others:
+ Stay informed about common
prevent them from falling
cams and share this knowledge with friends and family to
‘im to similar frauds.
Common Characteristics of Lottery/Prize Fraud:
Unsolicited Communication: Victims often receive unsolicited emails, phone calls, or messages
claiming that they have won a prize or lottery.
Request for Payment: Fraudsters typically ask for processing fees, taxes, or other costs upfront,
which is a significant red flag.
Urgency and Pressure: Scammers frequently create a sense of urgency, telling the victim that
they must act quickly to claim the prize.
Suspicious Websites: Scammers often direct victims to fraudulent websites that appear official
but are designed to steal personal information or money.