📞 Helpline No: 9311159707, 7859999944

Akhil Bhartiya Cyber Suraksha Sangathan (Regd.)

Regd. with Registrar of Society of NCT Delhi-Regd. No-287

Cyber Criminals se Suraksha, Digital India ki Raksha

अखिल भारतीय साइबर सुरक्षा संगठन (पंजी)

भारत की पहली साइबर क्राइम इन्वेस्टीगेशन एन जी ओ

ऑनलाइन रहें सतर्क, साइबर अपराध से रहें सुरक्षित
www.abcss.org
Email: info@abcss.org
ETHICAL HACKING & CYBER SECURITY WORKSHOP COMING SOON................ REGISTER HERE (INDIA'S BIGGEST CYBER SECURITY WORKSHOP IN DELHI BY EXPERTS)                 🛡️ CYBER SAFETY AWARENESS DRIVE — SCHOOLS & COLLEGES — REGISTER NOW                 ⚠️ Online fraud? Call 9311159707 immediately — 24×7 Cyber Crime Helpline                🌐 www.abcss.org  |  info@abcss.org
🎓 INTERNSHIP SUMMER 2026 CYBER SECURITY & ETHICAL HACKING & MANY MORE INTERNSHIP PROGRAM  |  LIMITED SEATS  |  CERTIFICATE PROVIDED  | 
APPLY NOW →
Amit Malhotra – Cyber Crime Investigation Specialist

AMIT MALHOTRA

(Cyber Crime Investigation Specialist)

Founder Akhil Bhartiya Cyber Suraksha Sangathan

18 yrs experience in crime prevention, detection and investigation. Certified Ethical Hacker from Ec-Council. Certified Cyber Crime Investigator from Asian School of Cyber Laws. Presently working in the area of cyber crime investigation.

🔒 RANSOMWARE — OVERVIEW
Ransomware is a type of malicious software (malware) that encrypts the victim's files or locks the entire system, making data inaccessible. The attacker then demands a ransom — usually in cryptocurrency — in exchange for a decryption key. Ransomware attacks target individuals, businesses, hospitals, and government agencies. Paying the ransom does not guarantee data recovery, and the attackers may strike again. Understanding ransomware is critical for every digital user in today's connected world.

⚠️ How Ransomware Spreads

  • Malicious email attachments (phishing emails)
  • Infected software downloads from untrusted sites
  • Clicking on malicious links or pop-up ads
  • Exploiting unpatched software vulnerabilities
  • Remote Desktop Protocol (RDP) attacks
  • Infected USB drives or external storage devices
  • Drive-by downloads from compromised websites
  • Social engineering and fake tech support calls

✅ How to Protect Yourself

  • Keep operating system and software always updated
  • Install a reputed antivirus / anti-malware solution
  • Take regular backups (offline + cloud) of important data
  • Never open attachments from unknown senders
  • Avoid downloading software from unofficial sources
  • Disable unnecessary RDP and remote access services
  • Use strong passwords and enable 2-Factor Authentication
  • Train employees on phishing and cyber hygiene

🚨 If You Are a Victim of Ransomware

  • Disconnect the infected device from internet and network immediately
  • Do NOT pay the ransom — it does not guarantee data recovery
  • Call National Cyber Helpline 1930 to report the attack
  • File FIR at nearest Cyber Crime Cell or police station
  • Report online at cybercrime.gov.in
  • Preserve all ransom notes, screenshots, and system logs as evidence
  • Contact a certified cyber forensic expert for data recovery assistance
  • Check nomoreransom.org for free decryption tools
🔍 Types of Ransomware
🔐
Crypto Ransomware / Encryptors

The most common type. It encrypts all files and folders on the victim's device, making data completely inaccessible without a decryption key provided after ransom payment. Examples: WannaCry, CryptoLocker.

🖥️
Locker Ransomware

Locks the victim out of their entire device or operating system without encrypting files. The screen displays a ransom demand message and the user cannot access anything until the ransom is paid.

😱
Scareware

Fake security software or tech support pop-ups that claim the device is infected and demand payment to "fix" the problem. They may lock the screen or flood it with alerts to pressure the victim.

🕵️
Doxware / Leakware

Threatens to publicly expose or sell the victim's sensitive personal data, private photos, or confidential business information unless a ransom is paid. Particularly harmful for individuals and businesses.

⚙️
Ransomware-as-a-Service (RaaS)

Cybercriminals sell or rent ransomware tools to other attackers (affiliates) on the dark web. The developer takes a cut of each ransom payment. This model has massively increased the scale of ransomware attacks globally.

📱
Mobile Ransomware

Targets Android and iOS smartphones through malicious apps or drive-by downloads. It can lock the phone screen or encrypt stored data, demanding payment through SMS or in-app messages.

🏥
Targeted / Enterprise Ransomware

Sophisticated attacks that specifically target hospitals, banks, government bodies, and large corporations. Attackers spend weeks inside the network before deploying ransomware to maximize damage and demand higher ransoms.

⚖️ APPLICABLE LAWS
IT Act Sec 43 IT Act Sec 66 IT Act Sec 66B IT Act Sec 66C IPC 384 IPC 420 IPC 506
IT Act Section 43: Penalty for damage to computer systems — covers unauthorized access, downloading data, introducing viruses/malware, and denial of access. Liable to pay damages by way of compensation.

IT Act Section 66: Computer-related offences including hacking and causing damage to computer resources — up to 3 years imprisonment and/or fine up to ₹5 lakh.

IT Act Section 66B: Dishonestly receiving stolen computer resource or communication device — up to 3 years imprisonment and/or fine up to ₹1 lakh.

IT Act Section 66C: Identity theft using electronic signatures or passwords — up to 3 years imprisonment + ₹1 lakh fine.

IPC Section 384: Extortion — punishment of up to 3 years imprisonment, or fine, or both. Directly applicable when ransom is demanded.

IPC Section 420: Cheating and dishonestly inducing delivery of property — up to 7 years imprisonment + fine.

IPC Section 506: Criminal intimidation (threatening to cause injury, damage to property, or expose secrets) — up to 2 years imprisonment, or fine, or both.
📝 Report This Crime