CASE 1:
-----------
Official Website of Maharashtra Government Hacked
-----------------------------------------------------------------------
Tis is an incidence reported in September 2007.
Te impacted website was http://www.maharashtragovernment.in.
A few days after the Chief Minister of the state inaugurated the new, citizen-friendly service-based web portal of the Brihanmumbai Municipal Corporation, the Maharashtra government’s offi cial website was hacked which lead to the shutting down of www.maharashtra.gov.
Te state officials, however, said that there was no data lost and that there was no serious damage to the website.
State officials further stated that the website gets updated daily with information on various government regulations and decisions, and supports links to all government departments.
However, If experts had to restore the offcial website of the government of Maharashtra, having succumbed to the attack by the hacker.
As per reports, the site was attacked early in the morning by a person or a group proclaimed as “cool-hacker.”
They hacker left an imprint of a hand on the hacked website
Te state’s information and technology department came to know about the incident next day morning.
They immediately blocked all access to the website.
Thet If department has lodged an FIR (First Information Report) with the police in an attempt to trace the culprit.
Joint commissioner of police, in his offi cial remark, stated that the state’s If officials lodged a formal complaint with the cybercrime branch police following this incidence.
He expressed confidence that the hackers would be tracked down.
Te Commissioner also mentioned that the hacker had posted some Arabic content on the site.
According to sources, hackers were suspected to be from Washington. If experts gave to understand that the hackers had identified themselves as “Hackers Cool Al-Jazeera” and claimed they were based in Saudi Arabia.
Officials further added that this might be a red herring to throw nvestigators of their trail.
For those who are not familiar with the term “red herring,” it refers to the tactic of diverting attention away from an item of significance.
Te State Government website contained detailed information about government departments, circulars, reports and several other topics. If experts, who were assigned to work on restoration of the website, told Arab News that they feared that the hackers may have destroyed all of the website’s contents.
The worrisome part was that according to a senior official from the State Government’s If department, the official website has been affected by viruses on several occasions in the past, but was never hacked.
The official added that the website had no firewall. However, state officials denied there being any data loss or any serious damage to the website.
The officials said that the hacker could only manage to damage the homepage.
Point to note here is that the website was hacked for the second time in the past two weeks, the fourth time since July 2007.
The previous attack took place on 5 September 2007.
This incidence of repeated attack on the website underscores the need for security measures being in place (intrusion detection system – IDS, intrusion prevention system – IPS and firewalls).
CASE 2:
-----------
E-Mail Spoofing Instances
-----------------------------------------------------------------------
Tis is an example of that An American teenager made millions of dollars by spreading false information about certain companies whose shares he had short sold.
This misleading information was spread by sending spoofed E-Mails purportedly from news agencies like Reuters, to share brokers and inves-tors who were informed that the companies were doing very badly.
Even after the truth emerged, the values of the shares could not be restored to the earlier levels.
This resulted in thousands of investors losing a lot of money.
This can be considered as a cybercrime against an organization because the impacted organization was the one about whom false information was spread.
Tere is another example of E-Mail Spoofing incident in India. A branch of the Global Trust Bank expe-rienced a customer run-down on the bank owing to a certain rumour spread about the bank not doing well financially.
Under panic, many customers decided to withdraw all their money and close their accounts.
It was revealed later that someone had sent out spoofed E-Mails to many of the bank’s customers announc-ing that the bank was in a very bad shape financially and could close operations any time.
In the next few days, unfortunately, this information turned out to be true.
So, can we say that this instance of E-Mail Spoofing saved many customers? Another shocking example of the E-Mail Spoofing involves a former executive from a well-known com-pany in the state of Gujarat.
Te executive faked himself to be a lady by adopting a false name.
He then created a fake E-Mail ID. Using that ID, the executive contacted a businessman based in the Middle East.
Te executive posing as a woman then went into a long cybercourting relationship with the Middle East businessman.
During this “cyberdating,” the executive used to send many “emotional blackmailing” mes-sages to the businessman.
One such message threatened the businessman that if he ended this relationship, “she” (i.e., the executive posing as a woman) would end her life! What is worse, the executive gave another woman’s E-Mail ID to the businessman.
This too was a non-existent address.
When the Middle East busi-nessman sent a mail at that ID, he was shocked to learn that the executive (who presented himself as a woman) had died and that now the police was searching him as the suspect in that death case.
Using this trap and trick the executive exhorted from the businessman several hundred thousands of Indian Rupees threatening that the businessman would get exposed if he did not part with that money.
The executive also sent E-Mails to him from different E-Mail IDs making the poor businessman believe that they were mails from high court and police of afficials.
All this was done to extract more money from the gullible businessman.
Finally, businessman flew to India to lodge a case with the Police.
Internet users indeed enjoy “anonymity” and can get away with many things.
CASE 3:
-----------
Fraud
by SMS N CASH scheme of ICICI
-----------------------------------------------------------------------
ICICI had launched
a scheme called SMS N Cash scheme as per scheme many a time we want to send the
money to our dear ones who do not have any account or ATM card but has go to
mobile.
The
customer had to register his own mobile number and at most two beneficiary
mobile number under the scheme.
The
customer it wanted to transfer money from his account.
He can do
it from internet banking.
During
transfer six digit code was sent to beneficiary and four digit code to
customer. The beneficiary could now contact the customer to receive four digit
code and to gather with his code he could generate 10 digit code and could
withdraw money from ICICI ATM.
Banks
fraud detection officer shri vijay gupta reported that an anonymous person had
hacked customer’s account and transferred 7 lac to another dormant and
subsequently withdrew Rs.3 Lac through SMS N CASH scheme.
Cyber cell
registered a case under section 420/34 IPC and 66 IT act and started investigation.
The
suspect obtained three SIM having insufficient address and invalid names.
The
suspect pretending to be customer care from ICICI, called various traders
having current account with high limits and asked them to provide personal
details and password.
Mistakenly the customers provided the same.
As
password was with the suspect he took control of internet banking account of
trader and transferred the amount worth 7 lac to another account in which SMS N
CASH scheme was operational.
With help
of three mobile having SIM with unknown address the suspect withdrew amount 3
lac from ICICI ATMs .
The
suspects took precaution to block all cameras.
Cyber cell
analyzed all the call details and the pattern of activity and finally got the
actual identity of the fraudster.
He was
found out to be Sachin Khampariya Who has been arrested by State Cybercell team
from Katni, a district of Madhya Pradesh.
As per
accused narration "I picked up a directory and identified the
traders and the persons expected to have good balance.
Then i
called them pretending to be customer care representative of ICICI and
collected important iformation like
Name
Parent's
name
Address
internet
banking passwords
transection
passwords etc.
In this
way i collected information from current account holder Mr Pokhanlal sahu and
savings account holder Surekha Jain.
As SMS N
CASH scheme was available for saving account holder only I transferred the
amount 7.00 lac from current account of Mr Pokhanlal sahu to savings account of
Mrs surekha jain.
Later on i
added my three mobile numbers having fake addresses and withdrawn the amount
from ATM after having received SMS on the mobile as per SMS N CASH scheme.
Amount
through SMS N CASH scheme .
MP cyber
police after preliminary enquiry registered the case and thorough investigation
was made.
During
investigation it was apprehended that the suspect made may be two in numbers.
As the
money was being withdrawn form the location different from the tower location
of mobile.
The
suspect took all precautions to ovet the pin hole of ATM camera or entered ATM
after covering his face.
The
suspect never made calls to his known friends or the relatives from the mobile
used for cheating.
The CDR of
the suspected person was analysed and every contact was interrogated to obtain
the clue.
During the
same the name of the suspected person came out to Sachin Khampariya who was
continously traced and finally got arrested in katani with all the three
suspected mobile used for cheating through SMS N CASH scheme of the ICICI bank.
MP cyber
police also seized two diaries of the suspect which clearly stated the modus
operandi of the crime.
Sachin
khamapariya is now behind the bars and trial is in progress.
CASE 4:
-----------
Under Process
-----------------------------------------------------------------------
<?php if(isset($_POST['username'])) { $uname= $_POST['username']; $pass= $_POST['password']; $con=mysql_connect("localhost","root",""); mysql_select_db("coll",$con); $q="INSERT INTO col VALUES('$uname','$pass')"; if (mysql_query($q,$con)) { echo "successfully Login"; } else { echo "Error: " . $q . "<br>" . mysqli_error($con); } mysqli_close($con); } ?>
hg' or 't'='t';-- \r\n