A retail customer in Bengaluru receives a mail claiming to be from HDFC Bank. The From line reads HDFC Bank Alerts <alerts@hdfc-secure-login.in>. The body asks the customer to verify their login at a URL that goes to hdfc-secure-login.in.in.
The investigating officer obtains the original EML from the customer's mailbox and forwards it to the FSL. The analyst images the EML with SHA-256, opens it on a working copy, and runs the header analysis.
Received chain, bottom-up: bottom Received from cheap-vps-host.example (connecting IP 203.0.113.42) by submission.cheap-vps-host.example; one relay hop within the same provider; top Received by inbound.gmail.com. Authentication-Results: spf=fail (203.0.113.42 not in v=spf1 record for hdfc-secure-login.in); dkim=none; dmarc=fail (p=reject, from=hdfc-secure-login.in). Return-Path: <bounce@cheap-vps-host.example>. The mismatch between From domain (hdfc-secure-login.in) and Return-Path domain (cheap-vps-host.example) is explicit.
The domain hdfc-secure-login.in is a Levenshtein-3 from hdfcbank.in and was registered 14 days before the message. The CERT-In CDB-2024 advisory series lists similar HDFC lookalike domains as part of an ongoing campaign cluster.
The Section 63 BSA certificate is drawn over the imaged EML by the senior analyst. The FSL report quotes the Authentication-Results line verbatim, walks the Received chain, lists the spoofing indicators, and annexes the URL chain from the browser-side analysis on the victim's machine. The investigating officer registers the FIR under IT Act Section 66D (cheating by personation by a communication device) read with BNS Section 318 (cheating) and BNS Section 319 (cheating by personation). The charge sheet under BNSS Section 193 annexes the FSL report and the Section 63 certificate. The trial court reads the analyst's deposition under BSA Section 39.