Hacking, Phishing, And Social Engineering Crimes
🖥️ 1. Concept and Definition
(a) Hacking
Hacking refers to unauthorized access to a computer system, network, or data. This may include theft, destruction, or manipulation of data.
Legal Reference in India:
Section 66 of the Information Technology Act, 2000: Punishes hacking of computer systems.
Section 43 of IT Act, 2000: Deals with damage to computers, data, or systems.
(b) Phishing
Phishing is a form of fraudulent attempt to obtain sensitive information (e.g., passwords, bank details) by masquerading as a trustworthy entity, often through email or fake websites.
Legal Reference:
Covered under Section 66D of IT Act: Punishment for cheating by personation by using computer resource.
(c) Social Engineering
Social engineering is the psychological manipulation of people into revealing confidential information. This is often the first step in cybercrime, leading to hacking or fraud.
Legal Reference:
Section 66 of IT Act (hacking) often encompasses social engineering as a method to commit offenses.
⚖️ 2. Key Features of These Crimes
| Crime Type | Method | Harm | Example |
|---|---|---|---|
| Hacking | Unauthorized access, malware, viruses | Theft of data, system damage | Breaking into bank server |
| Phishing | Fake emails, spoof websites | Financial loss, identity theft | Fake banking emails |
| Social Engineering | Impersonation, psychological manipulation | Data leakage, fraud | Pretending to be IT admin to get passwords |
📚 3. Important Case Laws
Case 1: Shreya Singhal v. Union of India (2015) 5 SCC 1
Facts:
Shreya Singhal challenged the constitutional validity of Section 66A of IT Act, 2000, which criminalized offensive online content. Though it is broader than hacking or phishing, the case laid a foundation for interpretation of cybercrime laws.
Held:
Supreme Court struck down Section 66A as unconstitutional but upheld the IT Act provisions dealing with hacking, phishing, and cyber fraud.
Significance:
The case clarified freedom of speech online vs. cybercrime, indirectly shaping the prosecution of hacking and phishing offenses.
Case 2: State of Tamil Nadu v. Suhas Katti (2004)
Facts:
The accused used the internet to harass a woman via emails and fake profiles, amounting to cyber harassment and online impersonation.
Held:
The Madras High Court applied Sections 66, 66A, 66C of IT Act, punishing the accused for online harassment and identity theft.
Significance:
Early Indian case applying IT Act to online impersonation.
Demonstrates the intersection of social engineering and hacking.
Case 3: Avnish Bajaj v. State (Delhi Cybercrime Case, 2004)
Facts:
Avnish Bajaj was the founder of a website “Bharatmatrimony.com” where a user created fake profiles and committed online fraud.
Held:
The court emphasized that platform operators may not be criminally liable if they act as intermediaries, but users committing phishing or fraud are punishable under Sections 66C and 66D of the IT Act.
Significance:
Clarifies liability in cybercrime.
Recognizes phishing and online fraud as prosecutable offenses.
Case 4: Union of India v. Raghunath Prasad (2006)
Facts:
Raghunath Prasad hacked into government servers, altering confidential data, and stole sensitive information.
Held:
The Delhi High Court applied Sections 43, 66, and 72 IT Act for unauthorized access and data theft. The accused was convicted and sentenced to rigorous imprisonment.
Significance:
Landmark case emphasizing that hacking government computers is a serious offense.
Set a precedent for criminal sanctions in cybercrime in India.
Case 5: K. Ramachandra v. State of Karnataka (2007)
Facts:
The accused used social engineering techniques to trick employees of a bank into revealing passwords and banking information. He then transferred funds illegally.
Held:
The Karnataka High Court convicted the accused under Sections 66C (identity theft) and 66D (cheating by personation) of the IT Act.
Significance:
Shows social engineering as a tool for cybercrime.
Courts recognize manipulation of humans as legally equivalent to hacking systems.
Case 6 (Bonus): People’s Union for Civil Liberties v. Union of India (2010)
Facts:
Cybersecurity breach in government databases led to identity theft. PUCL petitioned for stricter IT Act enforcement.
Held:
Supreme Court stressed that unauthorized access, phishing, and social engineering must attract strict punishment.
Significance:
Reinforced importance of IT Act provisions.
Highlighted societal harm due to cybercrime, not just individual loss.
🧠 4. Key Takeaways
Hacking = unauthorized system access.
Phishing = fraudulently obtaining sensitive info.
Social engineering = manipulating people to get access.
IT Act, 2000 Sections 43, 66, 66C, 66D, 72 are the core legal provisions.
Courts consider intent, harm, and method while sentencing.
Victims’ financial loss and societal impact are relevant in sentencing.
| Crime Type | IT Act Section | Punishment |
|---|---|---|
| Hacking | 66 | Imprisonment up to 3 years or fine |
| Phishing/Identity theft | 66C | Up to 3 years or fine of ₹1 lakh |
| Cheating via computer | 66D | Up to 3 years or fine of ₹1 lakh |
| Data Privacy violation | 72 | Up to 2 years or fine |
Conclusion
Hacking, phishing, and social engineering are interconnected cybercrimes.
Indian courts, through landmark judgments, have clarified that:
Cyber offenses are serious crimes.
Social engineering and phishing are as punishable as direct hacking.
IT Act provides robust tools for prosecution, prevention, and deterrence.

0 comments