Home > Topics > Cyber Security Laws > Classification of Cyber Crimes – Financial, Privacy, Hacking & Others

Classification of Cyber Crimes – Financial, Privacy, Hacking & Others

Not all cyber crimes are the same! Understanding classification helps in prevention, prosecution, and punishment.


Classification Frameworks

Cyber crimes can be classified in multiple ways:

Loading diagram…


Classification 1: By Target

A. Crimes Against Individuals

Examples:

  • Cyber stalking: Harassing specific person
  • Identity theft: Stealing Aadhaar, PAN
  • Cyber bullying: Online harassment (esp. children)
  • Sextortion: Blackmail using intimate content
  • Email spoofing: Pretending to be someone else

Punishment: Section 66C (identity theft) - 3 years

B. Crimes Against Property

Examples:

  • Hacking bank accounts: Stealing money
  • Ransomware: Encrypting files for ransom
  • IPR theft: Pirating software, movies
  • Domain hijacking: Stealing website domains
  • Cryptocurrency theft: Hacking crypto wallets

Punishment: Section 66 (hacking) - 3 years + ₹5 lakh

C. Crimes Against Organizations

Examples:

  • Corporate espionage: Stealing trade secrets
  • Data breaches: Leaking customer databases
  • DDoS attacks: Bringing down company websites
  • Insider threats: Employee stealing data

Recent: Domino's (18 cr orders), Air India (4.5M passengers)

D. Crimes Against Society

Examples:

  • Fake news: Spreading misinformation
  • Hate speech: Inciting violence online
  • Child pornography: Most heinous (Section 67B - 5-7 years)
  • Online radicalization: Terrorist recruitment

E. Crimes Against Government

Examples:

  • Cyber terrorism (Section 66F): Life imprisonment
  • Hacking government websites: Defence, PMO
  • Data theft from govt databases
  • Election manipulation: Fake social media campaigns

Classification 2: By Nature of Crime

Loading comparison…

A. Financial Cyber Crimes

Loading stats…

Sub-types:

  1. Banking Fraud: Fake UPI requests, OTP theft
  2. Investment Scams: Crypto frauds, MLM schemes
  3. Auction Frauds: Fake products on OLX
  4. Insurance Frauds: Fake claims submitted online

B. Privacy-Related Crimes

Examples:

  • Voyeurism (Section 354C IPC): Secretly filming - 3-7 years
  • Data breach (Section 43A): Company negligence
  • Unauthorized surveillance: Pegasus spyware
  • Doxing: Publishing private info publicly

C. Content-Related Crimes

Categories:

  • Obscene/Pornographic (Section 67): 3-5 years
  • Defamatory: False statements damaging reputation
  • Hate speech: Inciting violence against groups
  • Fake news: Misinformation (no specific law yet)

D. Infrastructure Attacks

Targeting:

  • Power grids: 2020 Mumbai blackout (Chinese hackers suspected)
  • Banking systems: SWIFT network hacks
  • Telecommunications: Disrupting mobile networks
  • Transportation: Railway signaling systems

Most dangerous - can cause physical harm!


Classification 3: By Method/Technique

A. Hacking-Based

Techniques:

  • Brute force: Trying millions of passwords
  • SQL injection: Attacking database through website
  • Zero-day exploits: Using unknown vulnerabilities
  • Man-in-the-middle: Intercepting communications

B. Social Engineering

Techniques:

  • Phishing: Fake emails/websites
  • Vishing: Voice calls (fake bank manager)
  • Smishing: SMS scams
  • Pretexting: Creating false scenario to extract info

Success: 30% of phishing emails are opened!

C. Malware-Based

Types:

  • Virus: Self-replicating malicious code
  • Worms: Auto-spreading (WannaCry)
  • Trojans: Disguised as legitimate software
  • Ransomware: Encrypt files, demand payment
  • Spyware: Secretly monitor activity (Pegasus)

Classification 4: By Motivation

A. Financial Gain (Most Common - 86%)

  • Goal: Steal money, sell stolen data
  • Actors: Organized crime groups, individual scammers
  • Example: Jamtara phishing gangs

B. Revenge/Personal Grudge

  • Goal: Harm specific person/organization
  • Actors: Ex-employees, ex-partners
  • Example: Disgruntled employee leaking company data

C. Cyber Espionage

  • Goal: Steal secrets for competitive/strategic advantage
  • Actors: Nation-states, rival companies
  • Example: Chinese APT groups targeting Indian power sector

D. Hacktivism

  • Goal: Political/social activism through hacking
  • Actors: Anonymous, hacktivist groups
  • Example: Defacing government websites to protest

E. Cyber Terrorism

  • Goal: Create fear, disrupt critical infrastructure
  • Actors: Terrorist organizations
  • Example: ISIS online recruitment

F. Thrill/Challenge (Script Kiddies)

  • Goal: Prove skills, gain notoriety
  • Actors: Teenagers, amateur hackers
  • Example: Ankit Fadia hacking Pentagon at age 15

Hybrid Crimes

Many cyber crimes don't fit one category!

Example: Ransomware Attack

  • By Target: Against organization
  • By Nature: Financial (demands ransom)
  • By Method: Malware-based
  • By Motivation: Financial gain

Severity Classification

Minor Cyber Crimes

  • Spam emails
  • Minor copyright infringement
  • One-time harassment message
  • Punishment: Fines, warnings

Moderate Cyber Crimes

  • Phishing scams
  • Hacking personal accounts
  • Revenge porn
  • Punishment: 1-3 years

Serious Cyber Crimes

  • Hacking corporate databases
  • Ransomware attacks
  • Large-scale financial fraud
  • Punishment: 3-7 years

Heinous Cyber Crimes

  • Cyber terrorism (Section 66F): Life imprisonment
  • Child pornography (Section 67B): 5-7 years
  • Infrastructure attacks: Up to 10 years

Jurisdiction Issues

Problem: Cyber crime crosses borders!

Example:

  • Scammer in Nigeria
  • Victim in India
  • Server in USA
  • Money transferred through Singapore

Which country prosecutes? 🤔

Solutions:

  • Budapest Convention on Cybercrime (international treaty)
  • Mutual Legal Assistance Treaties (MLATs)
  • Interpol coordination

Summary

  • By Target: Individual (stalking), Property (hacking), Society (fake news), Government (terrorism)
  • By Nature: Financial (₹1,750cr/year), Privacy (voyeurism), Content (obscenity), Infrastructure (power grid)
  • By Method: Hacking (SQL injection), Social Engineering (phishing - 30% success), Malware (ransomware)
  • By Motivation: Financial (86%), Revenge, Espionage, Hacktivism, Terrorism, Thrill
  • Severity: Minor (spam) to Heinous (terrorism - life imprisonment)
  • Many crimes are hybrid - fit multiple categories

Quiz Time! 🎯

Loading quiz…


Next Chapter: Legal Perspective on Cyber Crime! ⚖️