Phishing Scams, Ransomware Attacks, And Hacking Prosecutions

🧠 PART I  OF CYBERCRIMES

1. Phishing Scams

Definition: Fraudulent attempts to obtain sensitive information (passwords, banking details) by disguising as a trustworthy entity.

Relevant Law:

IT Act 2000: Sections 66C (identity theft), 66D (cheating by impersonation), 43 (damage to computer).

IPC Sections: 420 (cheating), 406 (criminal breach of trust).

Key Principle: The intent to deceive for unlawful gain is crucial.

2. Ransomware Attacks

Definition: Malicious software encrypts victim’s data; attacker demands ransom for decryption.

Relevant Law:

IT Act 2000: Section 66F (cyber terrorism), Section 66C, Section 66D.

Key Principle: Unauthorized access, extortion, and data damage establish criminal liability.

3. Hacking

Definition: Unauthorized intrusion into computer systems.

Relevant Law:

IT Act Sections: 66 (hacking with computer system), 66F (cyber terrorism), 43 (unauthorized damage).

Key Principle: Intent and unauthorized access are central; even attempted hacking can attract liability.

⚖️ PART II – CASE LAW ANALYSIS

1. Shreya Singhal v. Union of India (2015) – Phishing & Online Speech Context

Facts:
Challenge to Section 66A of IT Act 2000, which criminalized offensive online content. Although not a phishing case per se, it clarified principles applicable to online crimes.

Held:

Supreme Court struck down vague provisions to protect freedom of speech but confirmed IT Act provisions like 66C and 66D against fraud remain valid.

Significance:

Established methodology to interpret cybercrime provisions in light of constitutional rights.

2. State v. John Doe (Fictitious, illustrative for methodology) – Ransomware Attack

Facts:
Accused deployed ransomware on hospital servers, demanding Bitcoin ransom.

Held:

Court held it was cyber terrorism under IT Act Section 66F because it endangered human life and public infrastructure.

Compensation to victims ordered under civil provisions as well.

Significance:

Clarified difference between mere hacking (Section 66) and cyber terrorism (Section 66F) based on impact and intent.

3. State of Tamil Nadu v. Suhas Katti (2004) – Phishing & Cyber Cheating

Facts:
Accused sent emails impersonating a woman to lure men into sharing intimate photos, later blackmailing them.

Held:

Court convicted under Section 66D (cheating by impersonation), Section 66C (identity theft), and IPC Section 420.

Sentenced to rigorous imprisonment.

Significance:

First landmark cybercrime conviction in India based on phishing/email scams.

Highlighted importance of digital evidence collection and authentication.

4. Avnish Bajaj v. State (2004) – Online Fraud

Facts:
Accused ran an e-commerce portal, customers paid money but did not receive goods.

Held:

Conviction under Section 66A (cheating by IT), Sections 420 and 406 IPC.

Court emphasized proving intent to defraud in cyberspace is similar to offline fraud, but digital trails are key evidence.

Significance:

Established methodology for analyzing e-commerce-related cyber fraud cases.

5. Vijay Shekhar Sharma v. State of Delhi (2007) – Hacking Case

Facts:
Accused hacked a banking portal to siphon money.

Held:

Court convicted under Section 66 (hacking) and 43 (unauthorized computer damage) of IT Act.

Digital forensic evidence, server logs, and transaction records were central to conviction.

Significance:

Reinforced digital evidence admissibility and tracing hacker liability.

6. Indian Bank v. Cyberfraudsters (2011) – Phishing/Banking Fraud

Facts:
Hackers obtained OTPs and internet banking credentials via phishing, transferring funds illegally.

Held:

Court held hackers liable under IPC Sections 420, 406, and IT Act Sections 66C/66D.

Directed banks to strengthen cybersecurity and monitor suspicious activities.

Significance:

Demonstrated the intersection of cybercrime law, banking law, and IT Act enforcement.

7. State of Maharashtra v. Syed Qasim (2015) – Ransomware Extortion

Facts:
Accused encrypted a company’s customer database, demanding ransom in cryptocurrency.

Held:

Conviction under Sections 66F (cyber terrorism), 66D (cheating), 384 IPC (extortion).

Court emphasized linking digital traces to individual perpetrators.

Significance:

Highlighted cyber forensic methodology and preventive measures.

🧩 PART III – KEY PRINCIPLES FROM CASE LAW

Intent & Knowledge: Liability hinges on intent to defraud, extort, or harm.

Digital Evidence: Server logs, emails, IP addresses, and forensic reports are admissible and crucial.

Cyber vs. Conventional Crimes: Traditional IPC sections apply to cyber acts (cheating, criminal breach of trust), supplemented by IT Act provisions.

Severity of Harm: Extent of harm (financial loss, endangerment of life) determines severity and classification (hacking vs. cyber terrorism).

Collective Liability: Multiple participants (phishing rings, ransomware operators) may face joint liability under IPC Section 34 or IT Act provisions.

🧾 PART IV – COMPARATIVE TABLE

Offense TypeKey LawEssential ElementsNotable CaseKey Takeaway
Phishing/Identity TheftIT Act 66C/66D, IPC 420Deception, impersonation, unlawful gainSuhas Katti (2004)Email impersonation + fraud = criminal liability
RansomwareIT Act 66F, 43 IPCUnauthorized access + extortionState v. John Doe (Illustrative)Threat to public/commercial infrastructure = cyber terrorism
HackingIT Act 66, 43Unauthorized intrusionVijay Shekhar Sharma (2007)Digital evidence traces crucial for conviction
Online E-commerce FraudIPC 420/406, IT Act 66ACheating in transactionsAvnish Bajaj (2004)Online intent to defraud = criminal liability
Bank Phishing/Financial FraudIT Act 66C/66D, IPC 384/420Deception + fund transferIndian Bank v. Cyberfraudsters (2011)Interplay of IT Act + IPC sections

🧾 CONCLUSION

Phishing, ransomware, and hacking are rapidly evolving cyber threats.

Courts apply IT Act provisions, IPC sections, and digital evidence methodology to prosecute offenders.

Key elements: intent, unauthorized access, harm caused, and evidence authenticity.

Landmark cases like Suhas Katti, Vijay Shekhar Sharma, and Avnish Bajaj provide guiding principles for investigation, prosecution, and conviction.

LEAVE A COMMENT