Skip to main content

Famous Cyber crimes That Targeted People Instead Of Money

 

With the emergence in the field of technology, the number of cyber crimes have also emerged. Different types of cyber crimes daily take place such as phishing, email spoofing, data theft, identity theft, bullying, harassment, cyber extortion, ransomware attacks, etc. The majority of the people would opine that the Cyber criminals engage in these activities for the sake of money but there are numerous examples where money wasn’t the only target of the Cyber criminals, rather they targeted people. 

The intent of cyber criminals,  targeting the people can differ from case to case. Sometimes it may target a single person or sometimes a large number of persons. Various examples show the instances where the target of the cyber crimes were people, be it belonging to specific religion or age group or sometimes a sole person. Various examples of such crimes are discussed below:


  • Bulli Bai App- This app was created over the platform namely GitHub which is an open software development site owned by Microsoft. The word ‘Bulli’ in the local slang has a very derogatory label for Muslim women. This incident was reported in early 2022 when the pictures of over 100 Muslim women were uploaded for mock auction over a virtual platform. There were pictures of Muslim women including the actor, politicians, activists, many Journalists, the wife of a sitting judge of the High Court, etc. A similar incident also took place in 2021 under the name ‘Sulli Deals’ which also included a similar kind of offense against Muslim Women. Although two men were booked for creating that App and were charged u/s 153A, 153B, 354A(3), and 509 of the Indian Penal Code which mainly deals with Acts of promoting the enmity between two groups and causing disharmony along with sexual harassment and insulting modesty of Women. Afterward in March 2022, the accused were granted bail for being first-time offenders and on Humanitarian grounds.


  • Blue Whale Challenge- This was an online suicide app that took the lives of many teenagers in 2015 and 2016 mainly. There were 50 tasks that the victims had to perform in 50 days. Each day a single task was allotted and the severity of the task used to get increased day by day. It mainly included cutting a whale on one’s arm and on the 50th Day the task to end their own life was allotted to the victims. Many teenagers who were depressed or had some issues fell prey to that Challenge. It targeted children across the globe. Also when in Finally, in 2016 a 21-year-old who was charged for inciting Teenagers to commit suicide through this Challenge had no regret for doing the same.


  • Baazee Case- The case mainly deals with the liability of intermediaries and in this case, the CEO of Baazee.com had been arrested and took the plea of being a mere service provider and was later released on a bond. But the case involved the sale of a CD under the label of another item, it included inappropriate and obscene content. Although the item was taken down from the website that was listed for sale. But it created a huge scene that how the filters on the website were unable to detect such content on the website.


  • UIDAI Software Hack- This incident took place in 2018 when the data of billions of Indian Aadhar Cards were was leaked and became was one of the biggest data breaches in India. Over 200 Indian websites were hacked and information about Aadhar, PAN, IFSC code of Bank, and other personal information of users were was hacked and later put forth for sale.


Thus, various types of cyber crimes have targeted the people first instead of money. There’s no quick solution to these offenses but safety can be a preventive measure. There is a need for strong protection of data so that there may not be such cases that arise in the future. 


By: Ritika Tejpal (Team Member. WCSF)


Stay connected with us: www.worldcybersecurities.com


To get latest updates on various cyber related events & other things, you can join our Whatsapp group/Telegram Channel


Comments

  1. Join our online event and learn more about SIEM. LTS Secure can guide you.

    ReplyDelete

Post a Comment

Popular posts from this blog

UNESCO Guidelines on Generative AI in Schools

The advent of artificial intelligence has assumed prominence amongst all industries and various facets of people's personal lives. The integration of AI in education has been inevitable, given the significance and role of information, knowledge production and administration in the sector. This is especially so as its capabilities entail replicating higher-order thinking. Besides assisting in the education process, it also brings the element of real-life relevance, allowing education to be imparted against the backdrop of the evolving world due to the same AI. It tends to have implications on the subject matter that needs to be imparted, which tends to be something that constantly needs to answer the question of "Why and how is this particular subject matter relevant for learning?".  This induces policy-makers and educational institutions to rethink what they need to impart as knowledge, the area of matter, and the manner of thinking to be emphasised. This is because educa

Dark Web: Safe or unsafe? Truth Revealed!

  The dark web is the part of the internet that is not visible to search engines. With the advancement in technology, digitization has resulted in different types of attacks. We can talk to anyone as long as we have an internet connection. The main concern is with privacy and anonymity in mind.  A team of computer scientists and mathematicians working for one branch of the US navy which is known as the Naval Research laboratory (NRL), developed a new technology known as Onion Routing. It allows anonymous communication where the source and destination cannot be determined by the third party. A network using the Onion Routing technique is classified as Darknet. The NRL released the Onion Routing Technique and it became The Onion Router, also known as TOR. Advantages of Dark Web  Humans are allowed to hold privacy and express their views freely. Privacy is considered to be critical for honest persons through the different criminals and stalkers.  The growing tendency of employers to track

Need for Anti-Spam Laws in India: Comparative Analysis

  Introduction Spam is unsolicited, usually commercial messages (such as e-mails, text messages, or internet postings) sent to a large number of recipients or posted in a large number of places. The spamming activity is usually considered to cause a lot of nuisance and mental annoyance. Spamming is carried out with the help of an electronic mechanism to send unsolicited messages and advertisements. It can also be termed “An unsolicited e-mail” from which the sender attempts to gain an advantage. "India is the seventh biggest spammer in the world 7.8 billion spam e-mails sent in past 24 hours". It’s high time that India has to come up with its legislation to curb the activity.  The author will also argue the need for anti-spam legislation in India with a comparative analysis of various other jurisdictions. Why is it a concern? The term spam emerged due to the spread of unsolicited commercial messages in the internet space. The main challenge is that it has varied charact