Chapter 02· 10 min read
Cyber Crime Categories
Reading as a guest
Sign up free to save your progress, highlight passages, and pick up where you left off.
You'll lose your reading position and notes if you leave without an account.
Cybercrime is not one thing — it is a family of offences that share a digital element. Understanding the categories helps the examiner know what evidence to look for and which laws apply in India.
2.1What Makes a Crime "Cyber"
Not every crime involving a computer is the same kind of offence. Criminologists and courts use a three-way classification based on the computer's role:
- Computer as target — the computer or network is what the criminal is attacking. Examples: hacking into a server, website defacement, deploying ransomware to encrypt a victim's files.
- Computer as tool — the criminal uses a computer to commit a traditional offence more efficiently. Examples: online fraud, phishing, cyberstalking, child exploitation material.
- Computer as incidental — a standard crime is committed, but the criminal's computer happens to hold evidence. Examples: a drug dealer's WhatsApp messages, a murder suspect's search history.
This distinction matters because the investigation strategy changes. When the computer is the target, the network logs and server are the primary evidence sources. When it is a tool, the examiner looks for communications, transaction records, and account activity.
Cybercrimes also divide into two broad harm categories:
- Crimes against persons — harassment, identity theft, stalking, defamation, non-consensual image sharing
- Crimes against property or systems — hacking, data theft, malware deployment, intellectual property theft
Indian legal framework. The primary statute is the Information Technology Act 2000 (amended significantly in 2008, often called IT Act 2000/2008). It creates specific offences and penalties for computer-related conduct. The Indian Penal Code (IPC) sections for fraud (§420), forgery (§463/465), and defamation (§499/500) continue to apply alongside the IT Act, because many cybercrimes are simultaneously traditional criminal offences committed through a digital medium.
IT Act 2000 (amended 2008)
India's primary legislation governing cybercrimes and electronic commerce. It defines offences ranging from hacking (§66) to identity theft (§66C), prescribes penalties, grants investigative powers (§69), and gives legal recognition to electronic records and digital signatures.
2.2Financial Cybercrime
Financial cybercrime is the most common category by reported volume in India. The motive is always money; the methods exploit human trust, weak authentication, and vulnerable systems.
Phishing is the act of sending a fraudulent message — usually an email — that mimics a trusted entity (a bank, courier company, government agency) to trick the recipient into revealing credentials or installing malware. The attacker registers a look-alike domain (e.g. sbi-login.in instead of sbi.co.in), builds a near-identical fake website, and sends mass emails with a link to it.
Forensic evidence in a phishing case: email header analysis (Received-from chain, SPF/DKIM/DMARC failures, spoofed From address), IP address of the sending mail server, domain registration records (WHOIS), SSL certificate issuance date, server access logs showing victims who clicked.
Vishing (voice phishing) and smishing (SMS phishing) are variants where the attacker contacts victims by phone call or text message, often impersonating bank fraud departments.
Banking fraud — SIM swap. An attacker bribes or social-engineers a telecom employee to port the victim's mobile number to a new SIM card the attacker holds. Once the attacker controls the phone number, they intercept OTPs (One-Time Passwords) and drain the victim's bank account. Evidence: telecom subscriber records, SIM swap timestamps, IMEI records before and after swap, bank transaction logs.
Credit card skimming. A physical overlay device is placed over an ATM card slot to read the card's magnetic stripe data; a hidden camera records the PIN. Evidence: ATM forensics including card-skimmer device, camera footage, transaction logs, and card data recovered from the skimmer's memory.
Investment / Ponzi fraud via social media. Fraudulent schemes promoted through WhatsApp groups, Telegram channels, or Instagram DMs promising unrealistic returns. Evidence: chat exports, device extraction, payment gateway records.
2.3Social Media Crimes
Social media platforms are both the scene of the crime and the primary evidence source. Most offences leave a digital trail across platform server logs, device extractions, and network captures.
Cyberbullying is the repeated use of digital communication to harass, humiliate, or threaten a person. It commonly occurs on Instagram, Twitter/X, WhatsApp, and gaming platforms. Evidence: screenshots with visible timestamps and usernames, IP address logs from the platform, device extraction showing sent messages, witness statements corroborating the timeline.
Online grooming describes the process by which a predator builds an emotional relationship with a minor online to gain their trust and eventually exploit them sexually. Platforms commonly exploited: Instagram DMs, WhatsApp, Snapchat, online gaming voice chats. Evidence: chat logs preserved from device extraction or platform legal request, call detail records, device IMEI, IP address mapping to the suspect.
Defamation — publishing false statements of fact that damage a person's reputation — is a criminal offence in India (IPC §499/500). Online defamation includes fake reviews, false social media posts, and morphed photographs. Evidence: URL of the offending post, cached copy (Wayback Machine or manual archiving), IP address obtained from the platform via legal process, server logs.
Account hacking and impersonation. An attacker gains unauthorised access to a victim's social media account (via credential stuffing, phishing, or SIM swap) and then uses it to post harmful content or defraud the victim's contacts. Evidence: login IP logs from the platform, device fingerprint mismatch, 2FA bypass records, timestamps of account activity anomalies.
Fake news and deepfakes. Morphed images and AI-generated video (deepfake) depicting a person in a false or compromising situation. Evidence: EXIF metadata embedded in the original image file (camera model, GPS coordinates, timestamp), provenance trail comparing the morphed image with the original source, digital watermark analysis, AI detection tools.
EXIF Metadata
Exchangeable Image File Format metadata — a block of structured data embedded inside image files (JPEG, TIFF) by the camera or phone that took the photo. EXIF can contain GPS coordinates, device make and model, timestamp, exposure settings, and editing software used. It is a primary forensic artefact for geolocating a suspect or proving an image was manipulated.
2.4Network-based Crimes
Network-based crimes attack or exploit the infrastructure that connects computers. The examiner's evidence comes from traffic captures, firewall logs, and server records rather than from the victim's endpoint alone.
Packet sniffing / eavesdropping. An attacker who is on the same physical or logical network segment as the victim can capture all traffic passing through that segment using tools like Wireshark or tcpdump. On a switched network, the attacker must first use ARP poisoning (sending fake ARP replies that redirect traffic through the attacker's machine) to position themselves as a man-in-the-middle. If traffic is unencrypted (plain HTTP, FTP, Telnet), credentials and data are fully readable. Evidence: PCAP (packet capture) files, ARP table logs on the switch, network interface logs showing promiscuous mode.
IP spoofing. An attacker forges the source IP address in outgoing packets to impersonate another host, bypass IP-based access controls, or hide their identity. Spoofed packets cannot receive legitimate replies (TCP three-way handshake cannot complete), so IP spoofing is mainly used in DoS attacks and to plant false attribution evidence. Evidence: TTL values (a spoofed packet often has a different TTL than a genuine packet from the claimed source), router NetFlow data, asymmetric routing patterns.
Denial of Service (DoS) / Distributed DoS (DDoS). A DoS attack floods a server or network link with traffic until it becomes unavailable to legitimate users. In a DDoS, the flood comes from many sources simultaneously — typically a botnet of thousands of compromised machines controlled by the attacker. Evidence: firewall logs showing traffic volume spike, NetFlow records identifying source IP ranges, ISP upstream traffic analysis, botnet C2 (command-and-control) server identification.
Web jacking. An attacker takes over a website by hijacking its domain registration (social engineering the registrar or exploiting weak registrar authentication) or compromising the hosting provider credentials. The legitimate site is replaced with the attacker's content, or DNS records are changed to redirect visitors. Evidence: DNS record change history (registrar logs), WHOIS historical data, web server access and error logs, SSL certificate replacement timestamp.
2.5Indian Legal Framework
India has a layered legal framework for cybercrime. Understanding which section applies to which offence is essential for admissibility and for framing charges correctly.
IT Act 2000 / Amendment 2008 — key sections:
| IT Act Section | Offence | Maximum Punishment |
|---|---|---|
| §43 | Damage, disruption, or unauthorised access to a computer | Civil penalty — compensation up to ₹1 crore |
| §65 | Tampering with computer source code | 3 years imprisonment or ₹2 lakh fine or both |
| §66 | Computer-related offences — hacking (dishonest access, damage, data alteration) | 3 years or ₹5 lakh or both |
| §66B | Receiving stolen computer resources | 3 years or ₹1 lakh or both |
| §66C | Identity theft (fraudulent use of password/digital signature) | 3 years or ₹1 lakh or both |
| §66D | Cheating by personation using computer resource | 3 years or ₹1 lakh or both |
| §66E | Violation of privacy (capturing/publishing private images) | 3 years or ₹2 lakh or both |
| §67 | Publishing obscene material in electronic form | 5 years (first conviction) or ₹10 lakh |
| §69 | Power to intercept, monitor, or decrypt information (government) | Non-compliance: 7 years |
| §72 | Breach of confidentiality and privacy by officials | 2 years or ₹1 lakh or both |
IPC sections that continue to apply alongside the IT Act:
- §420 — Cheating (online fraud, fake e-commerce)
- §463/465 — Forgery (fake digital documents, forged e-mails)
- §499/500 — Defamation (fake posts, morphed images)
- §354D — Stalking including cyberstalking
Evidence law — Bharatiya Sakshya Adhiniyam (BSA) 2023. The BSA replaced the Indian Evidence Act 1872. Section 63 BSA governs the admissibility of electronic records. It requires that a person who was responsible for managing the computer that produced the record must provide a certificate stating: (a) the computer was used in the ordinary course of activity, (b) information was regularly supplied to it, (c) it was operating properly, and (d) the record was produced in the ordinary course of activity. Without this certificate, an electronic record is not admissible. (Section 63 BSA replaces the older §65B Indian Evidence Act, though the certificate requirement remains essentially the same.)
CERT-In (Indian Computer Emergency Response Team). Under MeitY (Ministry of Electronics and Information Technology), CERT-In is India's national nodal agency for cybersecurity incident response. A 2022 directive requires all organisations — including service providers, data centres, and government bodies — to report cybersecurity incidents to CERT-In within 6 hours of detection or being made aware of them. This includes breaches, ransomware, data theft, unauthorised access, and social media account hacks affecting critical systems.
§66C IT Act — Identity Theft
Fraudulently or dishonestly using the electronic signature, password, or any other unique identification feature of any other person. Punishable with up to 3 years' imprisonment and a fine of up to ₹1 lakh. Commonly charged in SIM swap cases where the attacker uses the victim's banking credentials.
Section 63 BSA 2023 — Electronic Records Certificate
For an electronic record (email, CCTV footage, server log, phone extraction) to be admissible as evidence in an Indian court, a certificate must be provided by a responsible official of the organisation that produced the record. The certificate must confirm the computer's regular use, proper operation, and that the record is an authentic output. Without it, the evidence is inadmissible regardless of forensic quality.
2.1 Computer roles — Target (hacking the computer itself) · Tool (using computer to commit fraud/stalking) · Incidental (computer holds evidence of a non-cyber crime).
2.1 IT Act + IPC together — IT Act 2000/2008 for cyber offences; IPC §420/463/499 still apply for fraud, forgery, defamation.
2.2 Phishing evidence — email headers (Received chain, SPF/DKIM/DMARC fail), sending IP, WHOIS domain records, server access logs.
2.2 SIM swap — attacker ports victim's number → intercepts OTP → drains bank account; evidence: telecom SIM swap records + IMEI before/after.
2.2 Skimming — ATM overlay reads magnetic stripe; camera captures PIN; evidence on the skimmer device itself.
2.3 EXIF metadata — GPS, device, timestamp embedded in image file; proves location and time; reveals editing software used.
2.4 Packet sniffing — Wireshark/tcpdump on same LAN + ARP poisoning; evidence = PCAP files + ARP table logs.
2.4 DDoS evidence — firewall volume logs + NetFlow + botnet C2 identification.
2.5 IT Act §66 = hacking · §66C = identity theft · §66D = personation · §67 = obscene material · §69 = government interception power.
2.5 BSA §63 certificate — mandatory for electronic records to be admissible; responsible official must sign; replaces §65B Indian Evidence Act.
2.5 CERT-In — report incidents within 6 hours of detection (2022 directive).
Don't lose your place
Save this chapter and the rest of Cyber & Digital Forensics.
A free ForensicSpot account remembers which chapters you've read, lets you highlight passages, take notes and resume from any device.