Menu Top



Cyber Banking Fraud



Meaning and Types of Cyber Banking Fraud


Cyber banking fraud refers to unlawful activities conducted over digital platforms to fraudulently gain access to banking information or steal money from bank accounts using deceptive techniques or technological tools.

These frauds typically exploit the vulnerabilities of internet banking, mobile banking, ATMs, and other digital financial services.


Phishing

Phishing is a fraudulent attempt to acquire sensitive data like login credentials, OTPs, or credit card information by impersonating a trustworthy entity via email.

Example: A fake email claiming to be from the Reserve Bank of India asking the user to verify their account details by clicking a link that leads to a fake website.


Vishing

Vishing (Voice Phishing) uses phone calls to deceive users into revealing confidential information. Fraudsters pretend to be from a bank, RBI, or a mobile operator.

They usually claim suspicious activity on the user’s account and ask for OTPs or PINs under false pretences.


Smishing

Smishing (SMS Phishing) involves sending fraudulent SMS messages that trick users into clicking on malicious links or disclosing personal information.

Example: “Your SBI account is blocked. Click here to reactivate: www.fake-link.in”


Online banking credential theft

This involves stealing login credentials such as usernames and passwords for internet banking platforms using keyloggers, malware, or through social engineering techniques.

Attackers use this data to illegally access and siphon off money from the victim’s account.


SIM Swapping

SIM swapping is when a fraudster gets a duplicate SIM card issued for your phone number, thereby gaining access to OTPs sent via SMS for banking transactions.

By taking control of your mobile number, they bypass two-factor authentication and execute unauthorized transactions.



Relevant Laws


IT Act, 2000 (Sections 66, 66C, 66D)


Indian Penal Code, 1860 (Sections related to cheating, fraud, forgery)


Prevention of Money Laundering Act, 2002

This act can be invoked when cyber banking fraud is part of a larger money laundering scheme. The act empowers agencies to attach, confiscate, and recover property derived from illegal banking fraud.

Such frauds are classified as scheduled offences when connected to predicate offences under the IPC or IT Act.



Money Laundering and Other Financial Cybercrimes



Money Laundering using Digital Platforms


Prevention of Money Laundering Act, 2002

Money laundering refers to the process of concealing the origins of illegally obtained money, typically by passing it through a complex sequence of banking transfers or commercial transactions.

In the digital era, digital platforms like online wallets, cryptocurrency exchanges, shell websites, and e-commerce portals are often misused to disguise illicit money. These methods allow rapid transfers with minimal traceability.

The Prevention of Money Laundering Act, 2002 (PMLA) is the key legislation in India that combats such financial crimes. Its objectives include:

Key Sections:

Digital Significance: Now includes cryptocurrencies, online shell companies, and cross-border e-wallets as sources and mediums for laundering illicit gains.



Online Trading Fraud


Online trading fraud involves deception related to financial instruments like stocks, forex, cryptocurrencies, or commodities, offered via fake or unregulated trading platforms.

Modus Operandi:

Common in India through unregistered forex platforms and illegal crypto exchanges. These activities also violate SEBI regulations and the Foreign Exchange Management Act (FEMA).

Legal Remedies: Sections 66C, 66D of IT Act, IPC 420 (cheating), and PMLA provisions (if money laundering involved).



Investment Scams


Investment scams trick people into investing money in fake schemes, often with the promise of high returns, using digital advertisements, social media platforms, or phishing emails.

Types of Online Investment Scams:

Case Example: Fraudulent app-based investment schemes that collect crores from small investors across India, then vanish without trace.

Applicable Laws:



Cyber Extortion


Cyber extortion involves the use of online threats to extract money or data from victims. It often includes ransomware attacks, email threats, and DDoS (Distributed Denial of Service) threats.

Common methods:

Applicable Indian Laws:

International Issue: Extortion via dark web and crypto payments are harder to trace, requiring international cyber law cooperation and CERT-In intervention.