Cyber Law, Cyber Security, Privacy, Data Protection Blog - FREE TO SHARE
Friday, November 29, 2019
Pen drive or memory card is a document- case law
Saturday, November 2, 2019
Balkanisation of Internet Begins with Russia enacting a Law
1st November 2019 the legal seed of Balkanisation of Internet is sowed, a controversial new law took effect in Russia: The so-called "sovereign internet" law, which mandates the creation of an independent internet for Russia, thus creating an island in the cyber space. Is it for availability of Internet during the times of cyber threats or is it for exerting sovereignty at the cost of censoring the Internet remains to be seen. . It was hardly a surprise when the Iranian government also had announced in May that it has installed a cyberdefense shield and wants to construct “halal Internet”. This germ is in the heads of France and Canada too and China has the infamous great firewall doing its fencing already.
Tuesday, October 15, 2019
Ultrasonic Fingerprint Reader has a security loophole
In theory, An ultrasonic fingerprint sensor works by bouncing a sonic pulse wave off of your fingertip to create a three-dimensional image. It's much more secure than optical in-display sensors and will work even if your fingers are greasy, dirty, or wet.
Sunday, October 13, 2019
SIM Swap Fraud Remedy via Consumer Courts
By Prashant Mali
Case No. 1 : Positive order
BSNL Bengaluru and the Union Bank of India have been ordered to pay Rs 9.6 lakh to a businessman after fraudsters siphoned off money from his bank account in what was described as a sim swap fraud. The national telecom provider was pulled up for issuing a duplicate sim to fraudsters without adhering to Know Your Customer (KYC) norms and the bank for not alerting the customer on time. Nagarathpet resident Ramesh Kumar has been using a mobile phone with a BSNL sim card for many years and had linked it to his account at Union Bank of India’s BVK Iyengar Road branch. On September 22, 2015, Kumar checked his email to find that an unknown beneficiary had been added to his online bank account. By the time he could alert bank authorities about the breach, the fraudsters managed to transfer Rs 9,62,700 from his account. The sim card on his cellphone that was supposed to receive a one-time password (OTP) mysteriously remained de-activated all the while. The 52-year-old businessman lodged a complaint with his bank branch and the cybercrime wing of Bengaluru police only to realise he had fallen prey to a sim swap fraud.
With neither the Union Bank of India nor BSNL acting towards compensating his loss for months, Kumar approached the Bangalore urban 2nd additional district consumer disputes redressal forum on May 5, 2016 to reclaim his money. The consumer forum heard the case in which BSNL and Union Bank of India blamed each other for facilitating the fraud. BSNL claimed it is only a service provider and wasn’t aware that Kumar had linked his cellphone number to his bank account, and that it was the bank’s responsibility to notify him immediately when there was a fraudulent attempt. The bank argued that a BSNL customer centre executive in KG Road was at fault for issuing a duplicate sim card to a fraudster who pretended to be Kumar, deactivated his existing sim card and obtained a replacement.
After 31 months of hearing, the court blasted BSNL and Union Bank of India for the loss their customer suffered. The judges pointed to the BSNL staffer’s carelessness in issuing a duplicate sim and deactivating Kumar’s original sim. They criticised Union Bank of India authorities for not immediately alerting the customer on the illegal addition of a beneficiary, which he came to know through an official email. In a verdict pronounced last month,
the forum ordered BSNL Bengaluru telecom district and Union Bank of India, BVK Iyengar Road branch, to jointly refund Rs 9,62,700 to Kumar with interest and an additional Rs 10,000 towards his court expenses within 45 days. What is it Fraudsters, armed with confidential bank details of customers, deactivate sim cards linked to bank accounts by impersonating the victims and submitting fake documents with cellphone service providers and obtaining duplicate sims. The original sims on the victims’ phones get deactivated in the process. The active duplicate sims with the fraudsters receive OTPs and other bank communications, enabling illegal online transfers of large sums of money, while the victims remain clueless.
Prashant Mali
Lawyer, Bombay High Court
+919821763157 | cyberlawconsulting@gmail.com
Friday, October 4, 2019
SIM Swap Fraud Solution which India should Adapt By Prashant Mali
By Prashant Mali
Extra Links
1. SIM SWAP FRAUD explained in HINDI Language on ABP News, Youtube Video
2. SIM SWAP Fraud Explained in MARATHI Language on ABP Majha News, Youtube Video
3. How to Protect yourself from SIM Swap Fraud Express Computer News
Prashant Mali
Cyber Lawyer, Bombay High Court
Author, Speaker & Thought Leader.
+919821763157 | cyberlawconsulting@gmail.com
Tuesday, September 24, 2019
Hackers are targeting ATMs in India with new malware that steal data
Allegedly State sponsored Hackers from North Korean government have developed a new strain of malware that has been used to record and steal data from cards inserted into ATM machines in India.
Further analysis of the malware by the Moscow-based cybersecurity firm found the samples to be part of a bigger remote access trojan (RAT) called DTrack.
Calling it a spy tool to attack financial institutions and research centers in India, the experts said the malware strains shared “similarities with the DarkSeoul campaign, dating back to 2013 and attributed to the Lazarus group.”
The DTrack RAT was detected as recently as this month, the researchers noted.
Collecting key logs and browser histories
The threat actors behind DTrack obfuscated their malicious code in an innocuous executable file that was protected behind encryption barriers in a dropper used to install the malware.
Aside from disguising itself as a harmless process, the malware can perform a number of operations such as:
- .Keylogging
- .Retrieving browser history
- .Gathering host IP addresses, information about available networks and active connections
- .Listing all running processes
- .Listing all files on all available disk volumes
The collected data was then archived as a password-protected file that’s either saved to the disk or sent to a command-and-control server.
Classifying ATMDTrack as a subset of the DTrack family, the researchers said the developers behind the two malware strains are the “same group of people.”
Given the sophistication of the modus operandi, it’s recommended that target organizations beef up their network and password policies and monitor network traffic for any suspicious behaviour.
The kaspersky report also says the vast amount of DTrack samples that they found shows that the Lazarus group is one of the most active APT groups in terms of malware development, And they see that this group uses similar tools to perform both financially-motivated and pure espionage attacks.
I feel Banks need to go extra mile for searching and weeding out this malware from the ATM’s . ATM have come out as the last mile vulnerability in Indian banking industry due to usage of vulnerable OS and lack of physical security.
Monday, September 23, 2019
Right to Internet is a fundamental right in India
Internet Access is a fundamental Right held by
Kerala High Court.
i.e. that the right to have access to the #Internet is part of the right to education as well as the right to privacy under Article 21 of the Indian Constitution .The verdict came on a petition filed by a Kozhikode college student challenging her expulsion for not adhering to restrictions on the use of mobile phone
Justice P.V. Asha made the observation while ordering the Principal of Sree Narayanaguru College, Kozhikode, to re-admit a student who had been expelled from the college hostel for using her mobile phone beyond the restricted hours.
The court observed, “When the Human Rights Council of the United Nations has found that the right of access to Internet is a fundamental freedom and a tool to ensure right to education, a rule or instruction which impairs the said right of the students cannot be permitted to stand in the eye of law.”The verdict came on a petition filed by Faheema Shirin, a third-semester B.A. English student of the college at Chelanur, challenging her expulsion for not adhering to restrictions on the use of mobile phone. As per the rules of the girls’ hostel, inmates were restrained from using mobile phones from 6 p.m. to 10 p.m. every day. She, along with a few other inmates, had protested against the restriction, as it was hampering their learning process.
The Judge observed that the action of the college authorities infringed the fundamental freedom as well as privacy and would adversely affect the future and career of students who want to acquire knowledge and compete with their peers, such
restriction could not be permitted to be enforced.
The court while citing the observations of the SupremeCourt in the S.Rengarajan and others v. P. Jagjivan Ram (1989) case said t “ the fundamental freedom under Article 19(1)(a) can be reasonably restricted only for the purposes mentioned in Article 19(2) and the restriction must be justified on the anvil of necessity and not the quicksand of convenience or expediency.”
The court added that the hostel authorities were expected to enforce only those rules and regulations for enforcing discipline. Enforcement of discipline shall not be by blocking the ways and means of the students to acquire knowledge
The court further said that college authorities as well as parents should be conscious of the fact that the students in a college hostel are adults capable of taking decisions as to how and when they have to study.
FIR : All you want to know about in a criminal case
FIR - What is? The first information report is a report giving information of the commission of a cognizable crime, which may be made by t...
-
The Telecommunications Act of 2023 has strengthened the dispute resolution framework by introducing an online grievance redressal system. T...
-
Types of Cyber Attacks There are several effective methods for disrupting computer systems. We are talking of a method known as cyber ...
-
Police Closure Reports after investigation in cyber crime cases : 1. Art 21 of the Constitution guarantees fundamental right to life and per...