Akhil Bhartiya Cyber Suraksha Sangathan (Regd.)
Regd. with Registrar of Society of NCT Delhi-Regd. No-287
Cyber Criminals se Suraksha, Digital India ki Raksha
अखिल भारतीय साइबर सुरक्षा संगठन (पंजी)
भारत की पहली साइबर क्राइम इन्वेस्टीगेशन एन जी ओ
ऑनलाइन रहें सतर्क, साइबर अपराध से रहें सुरक्षित
www.abcss.org Email: info@abcss.org
AMIT MALHOTRA
(Cyber Crime Investigation Specialist)
Founder Akhil Bhartiya Cyber Suraksha Sangathan
18 yrs experience in crime prevention, detection and investigation. Certified Ethical Hacker from Ec-Council. Certified Cyber Crime Investigator from Asian School of Cyber Laws. Presently working in the area of cyber crime investigation.
⚠️ How Phishing Attacks Are Carried Out
- Sending fake bank / government emails with urgent account warning links
- Creating pixel-perfect clone websites of SBI, HDFC, IRCTC, Aadhaar, Income Tax
- Sending SMS with short malicious links disguised as TRAI, EPFO, RBI alerts
- Calling victims posing as bank, KYC officer, RBI or telecom official (Vishing)
- Sending WhatsApp messages with "free recharge", "prize" or "job offer" links
- Spear phishing — personalised emails using victim's name, employer and role
- Clone phishing — resending a legitimate email with the link replaced by a malicious one
- Search engine phishing — paying to rank fake bank/government websites at the top of Google
✅ How to Protect Yourself from Phishing
- Never click links in emails or SMS — always type URLs directly in the browser
- Check the full URL carefully before entering any login credentials or card details
- Verify the sender's complete email address — not just the display name
- No bank, RBI or government department ever asks for OTP, PIN or password
- Enable spam filters and phishing protection in your email client
- Use a password manager — it will refuse to autofill on fake websites
- Enable 2-factor authentication on all accounts as a second line of defence
- When in doubt, call the organisation directly on their official helpline to verify
Email Phishing — Bulk Deceptive Email Attack
The most common form of phishing. Fraudsters send mass emails impersonating banks (SBI, HDFC, ICICI), e-commerce platforms (Amazon, Flipkart), government departments (Income Tax, EPFO, Aadhaar) or courier services — warning of "account suspension," "KYC expiry," "undelivered parcel" or "refund pending." The email contains a link to a cloned website where the victim enters credentials, which are instantly captured. Millions of such emails are sent daily using automated tools — even a 0.1% click rate yields thousands of victims.
Spear Phishing — Targeted Personalised Attack
Unlike mass email phishing, spear phishing targets specific individuals using personal information gathered from social media, LinkedIn, data breaches and company websites. The attacker knows the victim's name, designation, employer, colleagues' names and recent activities — crafting a highly believable email that appears to come from a known person such as the CEO, HR department or a trusted vendor. Used against corporate executives, government officials, defence personnel and high-net-worth individuals. The personalisation makes it extremely difficult to identify as fraud.
Smishing — SMS Phishing Attack
Phishing conducted via SMS text messages. Victims receive messages that appear to come from TRAI, RBI, EPFO, their bank, IRCTC or telecom operators — warning that their SIM card will be deactivated, KYC is pending, a parcel is held at customs or a refund is ready. The message includes a short URL (often using bit.ly or similar shorteners to hide the destination) that leads to a fake credential-harvesting website. Smishing is extremely effective because SMS messages feel more urgent and personal than emails.
Vishing — Voice Call Phishing Attack
Phishing conducted over telephone calls. Fraudsters call victims posing as bank customer care executives, RBI officials, TRAI representatives, Income Tax officers or courier companies — using spoofed caller IDs that show official numbers. They create urgency ("your account will be blocked in 2 hours") and extract sensitive information — account numbers, card details, OTPs and net banking credentials — through scripted conversations designed to seem completely legitimate. Vishing is highly effective against senior citizens and people with limited digital literacy.
Clone Phishing — Duplicate Email Attack
Attackers obtain a copy of a legitimate email previously sent by a bank, e-commerce platform or government service — and create an almost identical duplicate with the real links replaced by malicious ones. The fake email appears to come from the same sender address (spoofed) and references a real previous transaction, delivery or communication. Because it closely mirrors genuine communication the victim has already received, it is extraordinarily difficult to detect as fraud without examining every link carefully.
Whaling — CEO / Executive Targeted Phishing
A highly specialised form of spear phishing targeting senior executives — CEOs, CFOs, Directors and government officials — whose credentials provide access to the most sensitive data and largest financial authorisation limits. Whaling emails often impersonate legal notices, regulatory filings, board communications or critical business correspondence. A successful whaling attack can give criminals access to corporate banking systems, confidential contracts, employee data and strategic business plans — losses in single incidents regularly exceed ₹1 crore.
Pharming — DNS-Based Phishing Without Any Click
A sophisticated attack where criminals compromise the DNS (Domain Name System) settings on the victim's router or internet provider — redirecting legitimate website URLs to fake servers without any link-clicking required. The victim types the correct URL of their bank in the browser, but is silently redirected to an identical-looking fake page. Because the address bar shows the correct URL, there is no visible warning. Pharming attacks require no user action beyond simply opening a browser and navigating to a website they use every day.
Search Engine Phishing — Fake Websites on Google
Fraudsters pay for Google Ads or use SEO techniques to rank fake websites at the top of search results for queries like "SBI net banking login," "HDFC customer care number," "IRCTC login" or "Aadhaar update portal." Victims who click the top search result — believing it to be official — land on convincing fake websites that steal their credentials. This type of phishing specifically exploits users' trust in Google's ranking and their habit of clicking the first result without verifying the URL.
WhatsApp / Social Media Phishing
Fraudulent messages spread via WhatsApp, Instagram DMs, Facebook posts and Telegram — offering free recharges, job opportunities, government subsidies, prize money or investment returns. Links lead to fake data-collection pages or malware download sites. WhatsApp phishing is particularly dangerous because messages appear to come from trusted contacts whose phones have already been compromised — making victims far more likely to click than they would for an unknown email. These chains spread exponentially across contact lists.
Government / EPFO / Aadhaar / Income Tax Phishing
Phishing attacks impersonating Indian government services — Aadhaar UIDAI, EPFO, Income Tax Department, DigiLocker, TRAI, e-Shram, PM Kisan, Ayushman Bharat and passport services. Fake portals harvest Aadhaar numbers, PAN numbers, date of birth and bank details under the guise of "KYC update," "subsidy claim," "refund processing" or "account linking." Stolen government identity data is then used for financial fraud, SIM swap fraud and further identity theft across multiple platforms simultaneously.
The Spear Phishing Attack is the most dangerous and sophisticated phishing method — it cannot be defeated by simply "being careful" because it is meticulously researched and personally targeted. Unlike mass phishing, the attacker knows exactly who you are. Here is exactly how a spear phishing attack is planned and executed against a corporate target:
Step 1 — Reconnaissance & Intelligence Gathering
Attacker studies the target's LinkedIn profile, company website, social media, news articles and data breach databases — learning their name, designation, email format, colleagues' names, recent projects, vendors they work with and travel history. This research takes days or weeks.
Step 2 — Crafting the Believable Lure
Using gathered intelligence, attacker crafts a highly personalised email: "Hi [Name], as discussed in Tuesday's call with [colleague's name], please review the updated vendor invoice for [actual project name] and approve payment to [new account]." Every detail matches the victim's real context.
Step 3 — Email Sent with Spoofed Address
Email arrives from what appears to be the CEO's, vendor's or colleague's address — possibly a spoofed domain like "company-india.com" instead of "company.com." The email may contain a malicious attachment (PDF, Word doc with macro) or a link to a fake login portal — both designed to steal credentials or install malware.
Step 4 — Credentials Stolen / Payment Diverted
Victim clicks the link or attachment — believing it is completely legitimate. Credentials are harvested, malware is installed or a fraudulent payment is authorised. By the time the real colleague or vendor is contacted to verify, the money is already transferred and the attacker has disappeared.
Email or SMS Link Does Not Match the Official Website Domain
The most reliable indicator of phishing is a mismatched URL. "sbi-netbanking-update.com," "hdfc-kyc-portal.in," "incometax-refund2024.net" — none of these are real. SBI's official domain is sbi.co.in, HDFC is hdfcbank.com, Income Tax is incometax.gov.in. Any variation, addition or misspelling in the domain name means the website is fake — regardless of how authentic the page looks inside.
Sender Email Uses Free Domain — Gmail, Yahoo, Outlook — Not Official Domain
Emails from "sbibank.alert@gmail.com," "rbi.official@yahoo.com" or "irctc.support@outlook.com" are definitively fraudulent. The Reserve Bank of India, State Bank of India, IRCTC and every legitimate financial institution use their own registered domains — never free public email services. A Gmail or Yahoo sender claiming to be a bank or government department is 100% phishing without exception.
Message Creates Extreme Urgency — "Act Now or Account Blocked"
Urgency is the central mechanism of phishing. By creating a tight deadline — "blocked in 2 hours," "expires today," "last warning before legal action" — attackers force victims to act quickly without verifying. Legitimate banks and government departments send multiple formal notices over days or weeks before taking any action. Any message threatening immediate consequences via a link is a phishing attack, not a genuine notice.
WhatsApp Forward Offering Government Scheme / Free Benefit with Link
Messages forwarded on WhatsApp claiming "PM Modi announces free ₹5,000 for all citizens," "Free gas cylinder scheme — apply here," "TRAI giving free recharge to all users" — with a link to "register" or "claim" — are invariably phishing attacks. The Indian government announces all schemes through official channels, Gazette notifications and the Press Information Bureau — never through WhatsApp forwarded messages with registration links.
Email Asks You to "Confirm" Personal Details — Account Number, Aadhaar, Card Number
Banks and government institutions never send emails asking you to "confirm" or "re-enter" your account number, Aadhaar number, PAN, debit card number or CVV. They already have this information. Any request to "verify your details by entering them again" is a data-harvesting phishing page — the institution has no system that requires customers to re-confirm data they already hold.
Website Looks Identical to Official Site but URL Is Different
Phishing sites invest significant effort in replicating the exact visual appearance of legitimate banking and government websites — same logo, same colours, same layout, same disclaimer text. The only giveaway is the URL. This is why checking the URL — the full domain, not just the page content — is absolutely non-negotiable before entering any credentials. A perfect-looking website means nothing if the domain is wrong.
Caller Knows Your Personal Details — Name, Account Number, Last Transaction
Fraudsters use data purchased from breaches or dark web to open conversations with specific personal details — creating immediate trust. "We have a record of your account 12XXXX67 at our Lajpat Nagar branch" sounds legitimate. This is deliberate. Knowing your details does not make a caller genuine — it means your data was leaked. Never share OTP or passwords regardless of how much detail the caller already knows.
Email / SMS Comes Immediately After a Real Transaction or Inquiry
A sophisticated phishing technique times the fake message to coincide with a real event — you receive a genuine bank transaction alert, and within minutes a phishing SMS arrives saying "suspicious activity detected on your recent transaction — verify here." The coincidence creates overwhelming believability. This timing is not coincidence — real-time data feeds and transaction monitoring tools allow fraudsters to trigger phishing messages immediately after genuine account activity.
🚨 If You Have Fallen Victim to a Phishing Attack
- Immediately change the password of the compromised account from a different, clean and secure device
- If banking credentials were phished — call your bank's 24×7 helpline immediately and request an account freeze and card block
- Call National Cyber Helpline 1930 immediately — especially if any money has been lost or is at risk
- Change passwords of all other accounts that use the same email ID or password — phishers test stolen credentials across all major platforms
- Enable Two-Factor Authentication on all accounts immediately — this prevents access even if the password is known
- Run a full antivirus scan if you opened any attachment or downloaded any file from a phishing link
- Check your email account's "sent" folder and forwarding rules — phishers often set up auto-forwarding to intercept future emails
- File complaint at cybercrime.gov.in — provide the phishing URL, sender email/number, screenshots of messages and any transaction IDs
- Report the phishing email/website to your email provider (Report Phishing option in Gmail/Outlook) and to CERT-In at incident@cert-in.org.in
- File FIR at nearest police station or Cyber Crime Cell — provide all evidence printouts, phishing screenshots and bank statements
Government Employee Loses ₹3.4 Lakh After Clicking "KYC Expiry" Email Link
A Delhi government employee received an official-looking email purportedly from State Bank of India — warning that her net banking KYC would expire within 24 hours and her account would be frozen. The email design was identical to genuine SBI communications — same logo, disclaimer footer and font. She clicked the "Update KYC Now" link, which led to a cloned SBI YONO portal where she entered her User ID, password and the OTP that arrived on her phone. Within 8 minutes, ₹3.4 lakh was transferred across 3 transactions. When she called SBI's real helpline, she was told SBI had sent no such email. Investigation found the phishing site was hosted in Eastern Europe and had already harvested credentials from 1,200 SBI customers across India in that month alone.
CFO Approves ₹1.8 Crore Vendor Payment After Spear Phishing Email from "CEO"
The CFO of a Mumbai-based pharmaceutical company received an email that appeared to be from the company's CEO — referring specifically to an ongoing overseas drug licensing deal the CFO knew about. The email instructed him to urgently transfer ₹1.8 crore to a new overseas vendor account "before the deal closes by end of day." The CFO processed the payment without calling the CEO — as the email mentioned the CEO was in an important meeting abroad (information the attacker had found on LinkedIn). The CEO had not sent the email. Investigation revealed the attackers had monitored the company's email system for 3 weeks before crafting the perfectly timed spear phish — and had compromised the CEO's email display name but not the actual account.
Retired Banker Loses ₹78,000 to Vishing Call Posing as HDFC KYC Officer
A retired banker — ironically, someone who had spent decades in the banking sector — received a call on his landline from a person with an extremely professional demeanour claiming to be from HDFC Bank's KYC compliance team. The caller correctly referenced the branch where his account was held and his approximate account number ending. He extracted the full card number, expiry date and CVV under the guise of "card renewal for upgraded security features." An OTP arrived, which the victim shared assuming it was for the card upgrade. ₹78,000 was debited in 4 international transactions within 6 minutes. The victim's banking background made him especially shocked — he later said the call was indistinguishable from a genuine bank communication.
IT Professional's Aadhaar and Bank Details Stolen via "PM Jan Dhan Bonus" WhatsApp Link
A Bengaluru IT professional received a WhatsApp message forwarded by a family member — announcing a "PM Jan Dhan Yojana anniversary bonus of ₹3,000" with a link to "claim before March 31." Despite being an IT professional, he clicked the link — as it came from a trusted family member and referenced a real government scheme. The page asked for Aadhaar number, registered mobile, bank account number and date of birth for "verification." Within 48 hours, a SIM swap was executed using his Aadhaar details, following which ₹1.12 lakh was transferred from his account using OTPs intercepted on the new SIM. The family member's phone had itself been compromised earlier — making the forward appear legitimate. The case highlighted how multi-stage attacks use phishing as an entry point for larger financial fraud.
IT Act Section 66: Dishonestly or fraudulently creating phishing websites, sending phishing emails, operating fake banking portals or deploying credential-harvesting tools — imprisonment up to 3 years or fine up to ₹5 lakh or both. The primary criminal provision for all forms of phishing involving unauthorised access to or manipulation of computer systems and networks.
IT Act Section 66C — Identity Theft: Using credentials, passwords, OTPs, Aadhaar numbers or digital identities obtained through phishing to fraudulently access accounts, initiate transactions or assume another person's digital identity — imprisonment up to 3 years and fine up to ₹1 lakh. Directly and specifically applicable to all credential-harvesting phishing attacks and their subsequent fraudulent use.
IT Act Section 66D — Cheating by Impersonation Using Computer Resources: Creating fake websites impersonating banks, government departments and legitimate companies; sending phishing emails from spoofed addresses; conducting vishing calls using VoIP impersonation — imprisonment up to 3 years and fine up to ₹1 lakh. The most precisely applicable statutory provision for the impersonation element that defines phishing as a crime.
IT Act Section 67 — Publishing Obscene / Fraudulent Electronic Material: Transmitting phishing emails and fraudulent electronic messages designed to deceive recipients — imprisonment up to 3 years and fine up to ₹5 lakh for first conviction. Applicable to the transmission and distribution element of mass phishing campaigns sent to thousands of victims simultaneously.
BNS Section 318 — Cheating: The foundational criminal provision for phishing — deceiving a person by impersonating a trusted entity to fraudulently induce them to surrender credentials, personal data or money — imprisonment up to 7 years and fine. Covers the entire spectrum of phishing from email phishing to vishing calls to WhatsApp phishing schemes.
BNS Section 319 — Cheating by Personation: Fraudulently assuming the identity of a bank, government department, RBI, TRAI or corporate entity to deceive victims into sharing sensitive information or making payments — imprisonment up to 3 years and fine. The criminal impersonation provision most directly matching the mechanism of phishing — falsely presenting oneself as a trusted entity.
BNS Section 316 — Criminal Breach of Trust: Where insiders at banks, telecom companies or government departments provide phishing gangs with real customer data (names, phone numbers, account details) used to make vishing calls or spear phishing emails more convincing — imprisonment up to 7 years and fine. Applicable in cases where the precision of targeting suggests insider data sharing.
Digital Personal Data Protection (DPDP) Act 2023: Phishing attacks that result in the collection, storage or misuse of personal data — Aadhaar numbers, PAN, banking credentials, biometrics — without the data principal's informed consent violate this Act. Data Protection Board of India can impose penalties up to ₹250 crore against entities that facilitate or fail to prevent phishing-based data breaches. Also applicable to companies whose data breaches provide phishing gangs with targeting information.
Telecom Act 2023: Vishing calls conducted using spoofed telecom numbers, fraudulent VoIP services and unregistered bulk SMS platforms violate telecommunications licensing conditions. TRAI and the Department of Telecommunications have authority to block phishing-linked numbers, shut down fraudulent calling operations and penalise telecom service providers that fail to implement anti-spoofing protections for their customers.





