Achive.php cyber crime news Archives - Page 8 of 12 - The Cyber Shark

Uttarakhand Police Bust International Cybercrime Gang, Arrest Two

Uttarakhand Police

Uttarakhand Police arrested two cyber criminals involved in international fraud using fake business accounts and cryptocurrency transactions. The accused operated via Telegram, earning commissions by converting illicit funds into Indian currency. Dehradun: The Uttarakhand Police claimed to have busted a gang of international cybercriminals by arresting two of its members, including a trainer, who is a tenth pass out, officials said. The Special Task Force (STF) also found huge funds in the shape of cryptocurrency in the mobile phones of the accused. The accused Harjinder Singh and Sandeep Singh would provide fake business accounts to other cybercriminals to transact money and exchange funds with international gangs in cryptocurrencies. This comes weeks after the central government brought 540 Indians back from Myanmar, who were trafficked by a Chinese network of cyber criminals on the pretext of jobs in Thailand. At least 22 of the victims were from Uttarakhand Police, which prompted the state government police to form an STF under the supervision of Senior Superintendent of Police (SSP) Navneet Bhullar. Uttarakhand Police Following the joint probe with CBI and the Indian Cyber ​​Crime Coordination Centre (I4C), two persons, Harjinder Singh and Sandeep Singh, were arrested near Zila Panchayat Chungi on Thanon Road ahead of Maharana Pratap Chowk under the Raipur Police Station area. The STF team recovered one laptop, seven mobile handsets, one passport, two chequebooks, three debit cards, two PAN cards, one passbook, one stamp seal and four SBI bank forms stamped in the name of some firm from the possession of the accused. According to officials, Sandeep and Harjinder, both friends, would use Telegram to connect with criminals and open fake bank accounts under various firm names for cybercriminals to use for illegal transactions globally. Later, they would receive payments in cryptocurrency (USDT), take a 1% fee per transaction and convert it into Indian currency. “Over the past year, the accused made about Rs 1.2 crore in profit, including Rs 25 lakh in March alone,” officials added.

Government Implements Stricter Rules to Curb Child Sexual Abuse and Cybercrime Online

child sexual abuse

The Indian government is enhancing regulations to curb online child sexual abuse and cybercrime, with stricter rules for digital platforms. Measures include content removal, grievance redressal, and international collaboration. The Indian government is working harder to control internet content and stop the spreading of sexually graphic materials, especially when it comes to child sex abuse. Ashwini Vaishnaw, the Union Minister for Railways, Information & telecast, and Electronics & IT, told the Lok Sabha that some steps are being taken to guarantee a secure online environment under the Information Technology Act of 2000 and the IT Rules of 2021. The publication or transmission of pornographic material is already illegal under the Information Technology Act of 2000, with more severe penalties for content involving minors. Digital platforms, including social media intermediaries, must adhere to due diligence under the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021. They are no longer legally shielded from accountability for content hosted by third parties on their platforms if they don’t comply. Notably, major social media platforms that offer messaging services are now required to make it possible to identify the original creator of communications about offences like child sexual abuse , rape, or sexually explicit content. Intermediaries are also required to take down any content that shows someone having sex, exposing their private parts, or depicting nudity within 24 hours. The government has also established Grievance Appellate Committees to improve user grievance redressal, enabling users to challenge decisions made by social media companies on the removal the content of child sexual abuse. Controlling pornographic material on OTT platforms and in movies The Central Board of Film Certification (CBFC) still oversees public film screenings in the entertainment industry, making sure that adult material is categorized correctly following the Cinematograph Act of 1952 and its certification guidelines. The IT Rules, 2021, require OTT platforms to follow a code of ethics that includes limiting access to youngsters, classifying content according to age appropriateness, and implementing age verification for adult-rated content. The government’s multifaceted strategy to combat cybercrime The Indian government has taken several steps to fight cybercrime in addition to regulating content of child sexual abuse. National Cyber Crime Reporting Portal: The Ministry of Home Affairs has a website called www.cybercrime.gov.in where anyone can report any kind of cybercrime, with a concentration on crimes against minors. Indian Cyber Crime Coordination Centre (I4C): a specialized organization that plans actions to combat online crimes, such as child exploitation of child sexual abuse. Financial aid for cybercrime prevention: Under the Cyber Crime Prevention against Women and Children (CCPWC) program, the government has provided funding to states and Union Territories so they can set up cyber forensic labs and provide law enforcement training. Blocking CSAM websites: The Central Bureau of Investigation (CBI) and Interpol provide information that is used to periodically block websites that include child sexual abuse material (CSAM). ISPs are also required to dynamically block certain websites using lists provided by Project Arachnid (Canada) and the Internet Watch Foundation (UK). Parental control and awareness initiatives: Internet service providers have been asked to advertise parental control filters, and the government is running awareness campaigns on cybercrime through educational handbooks, radio broadcasts, and the @CyberDost Twitter handle. International collaboration: The National Center for Missing and Exploited Children (NCMEC), USA, has teamed with India’s National Crime Records Bureau (NCRB) to gather information on online child exploitation. These reports are subsequently forwarded to states and Union Territories for additional action.

Businessman from Hyderabad loses Rs 1.22 crores to online scammers.

businessman

Hyderabad businessman was scammed of Rs 1.22 crores through a fake online trading scheme. Police arrested Ankit Arora, while the main accused, Deepak Kumar, remains at large. Hyderabad: After being tricked into investing in an internet trading company that promised enormous earnings, a Hyderabad businessman lost Rs 1.22 crores to cyber criminals. The victim, a resident of Secunderabad, received a message on Telegram ID Doll6726@Navyaand from a stranger who lured him to invest in online trading over time. He assured me that the profits would be huge and asked him to download an application on his mobile phone. Initially, the person invested some amount for investment and in return received some profits on the investment. After businessman being mesmerized by the profits, the man sent Rs 1, 22, 87,120 to the account that the stranger, who claimed to be Deepak Kumar, had provided. After a few weeks, Deepak failed to withdraw the winnings from the victim’s wallet and asked him to transfer more money. He became suspicious and filed a report with the police. Based on the evidence they gathered, police were able to hold on to Ankit Arora, a 38-year-old native of Uttar Pradesh who had provided Deepak Kumar with his bank account credentials. Under the guise of internet trading, Deepak was able to defraud a Hyderabad man out of Rs 1, 22, 87,120 using the bank account details. Ankit Arora’s bank account received the money from the victim, and Deepak subsequently moved it to other accounts. Cybercrime police officials claimed that Deepak had given Ankit a commission. After learning that Deepak operates out of Thailand, the police will issue a Look Out Circular (LoC) for him.

Chennai Batman loses Rs 2 crore in email spoofing scam ; here’s how police recovered the entire amount from fraudsters

email

Chennai cybercrime police recovered Rs 2 crore lost to email spoofing scam by swiftly coordinating with global banks. Authorities advise caution with suspicious emails to prevent similar scams. The scammers who defrauded a businessman of Rs 2 crore by sending a counterfeit email to their company’s bank account to pay for their trading have been found by cybercrime police. Cybercriminals trick victims into making unauthorized payments by intercepting or mimicking official company communications. The entire amount was returned to the complainant’s bank account by the state cybercrime wing team as a result of the cybercrime officers’ prompt action. What exactly happened? According to the police, a bogus email from kunal1113@gmail.com was sent to the private company Agrigo Trading Private Limited in Chennai. Since the email was a part of a chain, the general manager of the company replied. The proforma invoice and banking information for the payment of US dollars 238,500 (Rs 2, 00,10,150) to be deposited at Regions Bank, USA, were included in the letter. On September 26, the manager made the NEFT payment via State Bank of India, Leather International Branch, Chennai, believing it to be authentic because it was connected to an earlier email exchange with the original supplier asking for a proforma invoice for payment of the amount for a business deal. It was found that the email was false and that the complainant had been defrauded when they followed up with the provider on September 27. Following Cr.No. 57/2024, u/s 318(4) of BNS 2023 & 66, 66C, 66D of IT Act 2000, the victim submitted a report through the National Cyber Crime Reporting Portal, and a case was opened at the State Cyber Crime Investigation Center. The State Bank of India, Chennai’s Leather International Branch, received requests to track down the misplaced sum. The money had been credited to Regions Bank’s account in the United States, according to confirmation from the State Bank of India. It was verified that the full amount was returned and credited to the complainant’s account as a result of the team’s sincere efforts to coordinate with the I4C, the Ministry of Home Affairs, and Regions Bank, USA. This instance emphasizes how crucial it is to confirm the legitimacy of emails, particularly when significant financial transactions are at stake. This kind of fraud takes advantage of people’s confidence and can cost companies a lot of money. You must respond right away if you believe you have been the victim of similar fraudulent activities or if you have discovered any questionable activity. Call the Cyber Crime Toll-free Helpline at “1930” to report the occurrence, or file a complaint online at “www.cybercrime.gov.in.” Advisory to citizens for cyber safety: Pay close attention to the sender’s address: Phishers frequently produce phoney email addresses that resemble real ones almost exactly, with a few minor variations. Check for unusual language: An email may be fake if it has strange wording, poor grammar, or spelling errors. Look out for demands that seem suspicious or urgent: If the email requests that you do something right away, such as transferring money, changing your password, or verifying your account, proceed with caution. Examine links before clicking: To view the URL, move your mouse pointer over any links in the email without clicking. Do not click if anything appears suspicious. Notify the impersonated organization: Report the scam to the security staff of the firm or entity that the fake email purports to originate from. Get rid of the email: Once the suspicious mail has been reported, remove it from both your inbox and trash folder.

14 years after rejecting it, Karnataka intends to implement sex education programs.

Karnataka schools to introduce sex education for grades 8-12, focusing on reproductive health, cyber safety and moral values. The initiative marks a shift from previous opposition to such programs. In Karnataka’s schools, sex education has long been a controversial subject. Despite suggestions from Unicef and child rights organisations, the state government flatly rejected a plan to implement it as part of an anti-AIDS initiative in 2011. Officials at the time contended that students would not benefit from such instruction. Now, following years of discussion, Karnataka is adopting a new strategy. Along with moral instruction for younger kids, the government has announced intentions to provide sex education for grades 8 through 12. SEX EDUCATION, COUNSELLING, AND CYBER SAFETY The new proposal calls for local doctors to lead sex education seminars twice a week for students. Teens will learn about reproductive health, cleanliness, and making responsible decisions, as well as how their bodies, emotions, and hormones are changing. Additionally, twice a year, kids in Classes 1 through 10 will get health examinations. Primary Health Centre physicians and nurses will offer advice on disease prevention, proper cleanliness, and the dangers of substance addiction. To guarantee that kids, particularly those who are dealing with behavioural challenges, receive the appropriate help, schools will also set up counselling programs. By offering cyber hygiene courses, the government is also addressing online safety and digital addiction. Although there is no set schedule for implementation, these courses will instruct students on how to use the internet securely, stay safe from online threats, and develop good screen habits. In addition to digital safety and health, the project raises knowledge of the law. In order to ensure that kids are aware of their rights and are able to recognize dangerous circumstances, police officers will visit schools to teach them about the Protection of Children from Sexual Offences (POCSO) Act. MORAL EDUCATION TO SHAPE VALUES Up until Class 10, moral education will be required for younger pupils. These twice-weekly lectures, which will focus on characteristics like probity, patience, and respect, will emphasize the idea that character development is just as vital as academics. INDOA’S CONTENTIOUS HISTORY OF SEX EDUCATION In India, sex education has long been a contentious issue, and important attempts to implement it have been thwarted. To educate pupils about puberty, sexual health, HIV/AIDS prevention, and related subjects, the National Council of Educational Research and Teaching (NCERT) launched the Adolescence Education Programme (AEP) in 2007. However, parents, conservative organizations, and politicians strongly opposed the initiative. Many states, including Gujarat, Maharashtra, Madhya Pradesh, Karnataka, Rajasthan, Chhattisgarh, and Goa, outlawed sex education in schools as a result of the outcry. NCERT was forced to remove its sex education module from schools as a result of this opposition. The resistance was based on worries that the material was against cultural norms and unsuitable for school-age youngsters. Regarding the implementation of sex education, this dispute demonstrated the conflict between contemporary educational goals and conventional societal norms. Jharkhand launched ‘Udaan’ in 2009, a school-based program for adolescents in Classes 6–11 that emphasizes health education and life skills. Over a million children were impacted by this program in 2019, and it is still going strong today. Despite issues, initiatives to advance comprehensive sex education are still underway in several places, acknowledging its significance for the health and well-being of adolescents. Karnataka’s decision to implement sex education classes is a change from its previous position, although it is unclear if opposition would resurface. UNICEF blasted the government in 2011 for avoiding talking about adolescent health, claiming that keeping information secret endangered children. Although the new program is more in line with international best practices, its effectiveness will rely on how well it is executed and whether or not previous discussions come up again.

Has the open-source AI from DeepSeek turned into a tool for online fraudsters?

DeepSeek

Researchers found that DeepSeek’s open-source AI model can be exploited to create malware with minimal tweaks. Experts warn of potential misuse despite basic safeguards. According to a recent study, malicious actors may utilize DeepSeek’s open-source, free AI models to create harmful malware while displaying shoddy security measures. Since the public was made aware of the current scope of generative AI, governments and regulators have been alerting people to the potential for LLMs like ChatGPT and Gemini to be used to write harmful code. A few LLMs have already been created expressly for illegal purposes, but although these models usually demand money to access and the major LLM providers have safeguards in place, scammers have an advantage with DeepSeek’s open-source, publicly available architecture. Research by Nick Miles of Tenable Research revealed that the DeepSeek R1 model, a reasoning large language model (LLM) created by the Chinese company, could produce the “basic structure for malware,” providing barriers that are “easy to work around” and “vulnerable to a variety of jailbreaking techniques.” Miles tried to use DeepSeek to develop a key logger for the test that could secretly record keystrokes from users of a device while evading the operating system’s defences. Telling the LLM that the exercise was for “educational purposes only” was enough to persuade it to continue after its initial refusal. After following DeepSeek’s directions, a functional key logger was eventually produced, even though the model’s code needed to be manually rewritten in a few places. Miles also tried to create a sample of simple ransomware, which is a kind of software that prevents users from accessing their files that are susceptible to ransomware. Miles was able to create a few functional ransomware samples after some back and forth, but they also needed human editing to work. Once more, the system’s restrictions cautioned against the practice. The researcher concluded that malicious actors may get over DeepSeek’s safeguards against malware production with a little tweaking. The results do not portend a total catastrophe because the model’s outputs depend on a significant amount of prior coding information. “However, DeepSeek offers a helpful collection of methods and search terms that can enable someone who has never written malicious code before to become quickly acquainted with the pertinent ideas,” Miles said. According to my investigation, I think DeepSeek will soon encourage thieves to create more dangerous AI-generated programs.

Organ Trafficking Scam: Pune Doctor Falls Victim to Rs 70 Lakh Cyber Scam

Organ Trafficking Scam

Pune Doctor Loses Rs 70 Lakh in Organ Trafficking Scam by Cybercriminals Impersonating Law Enforcement A doctor from Pune fell victim to a cybercrime involving an organ trafficking scam, losing Rs 70 lakh to fraudsters who posed as law enforcement officers. The cybercriminals accused her of participating in an international organ trafficking scam, using fake video calls and threats of arrest to manipulate her into transferring her savings. The anesthesiologist, currently employed at a city hospital and in her late fifties, filed a formal complaint (FIR) at a cybercrime police station after realizing she had been duped. The scam began in the final week of February, when she received a call from a man claiming to be a bank official. He told her a card registered in her name had been misused and advised her to contact the “Delhi CID” to address potential illegal activity. On a video call, a scammer dressed as a police officer, in a setup resembling a police station, claimed she was under investigation for her involvement in a major organ trafficking scam linked to child trafficking. The cybercriminals alleged her bank accounts were tied to transactions worth Rs 3 crore and threatened her with arrest if she did not cooperate. She was coerced into disclosing details of her assets, including investments and savings, under the pretext of an official inquiry. Later, a scammer posing as a prosecutor convinced her to transfer her wealth to a so-called “official” mule account, promising she would get her money back soon. The scammers later demanded more money and even persuaded her to mortgage her house. When she contacted a family member for help, she realized she was a victim of a sophisticated organ trafficking scam and promptly filed a report with cybercrime police. Investigations have revealed that such frauds are orchestrated by multi-layered, geographically dispersed syndicates that launder money through Bitcoin, moving funds from victims to mule accounts and eventually to international cybercriminal networks. In May last year, the Ministry of Home Affairs stated that the National Cyber Crime Reporting Portal (NCRP) was receiving numerous complaints of blackmail, extortion, and “digital arrests” by cybercriminals posing as law enforcement officers and agencies, including the CBI and RBI. Prime Minister Narendra Modi also highlighted the dangers of such scams, including the organ trafficking scam, during his “Mann Ki Baat” address.

Hindustan Aeronautics Limited Kanpur Loses ₹55 Lakh in Cyber Fraud Due to Misspelled Email Address

Hindustan Aeronautics Limited

Hindustan Aeronautics Limited Kanpur lost ₹55 lakh in a cyber fraud after scammers used a fake email address with a missing letter to alter bank details and divert funds. The incident is under police investigation. The most recent victim of cyber fraud was Hindustan Aeronautics Limited (HAL), Kanpur, which lost Rs 55 lakh to cyber criminals after failing to recognize the missing letter “e” in one of the email addresses. The scammers altered bank account information and redirected the payment to their account while using an email address that was almost the same as that of an authentic American supplier. Vulnerabilities in high-stakes international transactions have been revealed by cyber fraud, which is currently being investigated by police. What happened? The public-sector aerospace and defence firm Hindustan Aeronautics Limited regularly purchases fighter aircraft parts from international vendors. The company was negotiating aircraft parts with PS Engineering Inc., a US-based corporation, in 2024. Hindustan Aeronautics Limited asked for a quote for three particular parts on May 3. The officialemail ID, gledbetter@ps-engineering.com. was used for all correspondence. However, unidentified cybercriminals who had probably been keeping an eye on the email exchange made the false email address jlane@ps-enginering.com, which just has the letter “e” missing from engineering. By using fake bank account information, the scammers pretended to be the vendor and persuaded Hindustan Aeronautics Limited to send the money. Before anyone realized what was going on, $63,405 (around Rs 55 lakh) was transferred into the incorrect account. When PS Engineering Inc. notified Hindustan Aeronautics Limited that they had not been paid, the fraud was discovered. When concerned HAL officials looked over their transaction history, they found the phoney email address. An official investigation was initiated after Ashok Kumar Singh, Additional General Manager of Hindustan Aeronautics Limited Kanpur, filed a First Information Report (FIR) at the Cyber Police Station in response to the disclosure. In order to carry out the scam, investigating police believe the cybercriminals may have compromised the email systems of Hindustan Aeronautics Limited or intercepted communications. To determine the source of the phoney account and find the culprits, the police have enlisted the help of cybersecurity specialists from IIT Kanpur.

Digital arrest scam, a woman from Mumbai lost Rs 20 crore to scammers

Digital arrest scam

Digital arrest scam : Two men posing as police officers duped an 86-year-old Mumbai woman of Rs 20.25 crore in a money laundering scam. The accused, who is part of an international fraud network, has been arrested. The 86-year-old woman in South Mumbai was virtually accosted by two men in December 2024 who pretended to be police officers. To resolve the matter, they forced her to transfer funds to several bank accounts and threatened her, saying that her Aadhar card had been used fraudulently in a money laundering case. Between December 26, 2024, and March 3, 2025, the suspected Rs 20.25 crore scam took place, according to the police. digital arrest scam the callers said that an Indian bank had opened an account in her name using her Aadhar card and other personal data. They informed her that this account had been used in a massive money laundering scheme and that police action was on the horizon.  The accused intimidated her by threatening to report her and her family, including her daughter, to the police. They tricked her into sending money to their accounts by feigning a “digital arrest scam.” Shayan Jamil Sheikh (20) and Rajik Azam Butt, who reside in Malad (West) and Mira Road (East), respectively, have been identified as the accused. Both of the accused have been arrested by the police. A larger conspiracy The report stated that Butt is suspected of being involved in a larger international scheme, citing police sources. On the Telegram messaging service, he formed a group with thirteen foreigners, according to the police. He allegedly exchanged Indian bank account details with this group to assist in committing fraud. The authorities found Butt’s affiliation with a worldwide fraud network after searching Shayan and Rajik’s cell phones after they were arrested. He set up the Telegram channel, investigators discovered, to provide scammers in other nations with information about Indian bank accounts. Both accused, according to officials for digital arrest scam , were personally involved in the planning and execution of the crime and were members of a global fraud gang. Now, they’re looking into how many more bank accounts have been provided to the foreign masterminds.

Online Sextortion: What You Need to Know and How to Protect Yourself

Online Sextortion

Online sextortion is a cybercrime where scammers blackmail victims using private or intimate content. It is punishable under IPC and IT Act provisions. Online sextortion happens when a scammer threatens to post your private and sensitive information online if you don’t provide them with money, sexually suggestive photographs, or sexual favours. In addition, if you don’t agree with their demands, the criminal may use information they have stolen from technological devices to threaten to damage your friends or family. Online Sextortion is a form of online abuse where a  Online sextortion for cybercriminal uses social media, online dating apps, instant messaging apps, SMS, and porn websites, among other platforms, to trick users into participating in private audio or video conversations and coerce them into providing revealing images or posing nude. The con artists then utilize these resources to threaten, embarrass, harass, blackmail, and exploit the victims. Dangers Abuse and Exploitation Harassment Blackmail Threats of public humiliation Mental distress Modus Operandi The scammers utilize a variety of tactics to try to trick people into disclosing private information. posting messages for video/audio chat using fake accounts/profiles creating pages/ad campaigns The users get victimized when they pay for such services and pose nude or in a compromising position in video calls accepts or sends friend requests to the fake account/profile and is involved in intimate interaction posing nude in video chats, sending revealing pictures, etc., The scammer films video snaps screenshots, takes images, uses exposing images, or alters the given photos. The victim is blackmailed by the scammer, which leads to online sextortion. The users of porn sites may also fall prey to online sextortion when their chats/video calls on porn sites are used for blackmail by fraudsters. Channels used for trapping the victims into online sextortion The scammers use the above-mentioned method of operation to resort to online sextortion through a variety of avenues, such as Messaging apps Dating apps Social media platforms Porn sites etc., Warning signs indicate attempts of online sextortion by cybercriminals Repeated untoward messages/video calls from unknown number/s Repeated friend requests from an unknown person Repeated requests for private intimate pictures, video chats, photos Manipulating or redirecting the conversation toward intimate topics Rush through the things and try to develop intimacy Warning signs that may indicate victimization Signs of fear, nervousness, anxiety, depression Isolating self and being very reactive & emotional Feeling desperate and frustrated Having suicidal thoughts and self-harming behaviour. Safety tips to protect yourself against online sextortion Never share any compromising images, posts, or videos of yourself with anyone, no matter who they are Remember that the internet never forgets or forgives. Whatever you share once will always be there on the Internet in one form or another. Never accept or request friendship from unknown people on social media platforms. Turn on security and privacy options for your instant messaging apps and social media accounts. Use the “Report User” option on social media platforms to report any such Do not share your personal/private pictures publicly. When not in use, turn off your webcams and electrical devices. Use two-factor authentication with strong passwords and different passwords for different social media accounts. During an online interaction or chat, if the person on the other side is trying to rush through things and develop intimacy, then it is cause for alarm. Never let anyone use a device to record any intimate behaviour or private portion, no matter how close they are. Such data can be misused at a later stage. Never open attachments or answer video calls from strangers. Save the evidence and the screenshots for referring to the incident later. You are not alone, so don’t suffer in silence. Instead, ask for support from dependable friends and family. File a complaint against sextortion online or at your nearest cybercrime cell. Remember that you can also anonymously file an online complaint against such an offence on the national cybercrime reporting portal cybercrime.gov.in. Avoid taking private, nude, or semi-nude pictures or films using your phone as they could embarrass you if they are leaked. Several rouge mobile apps could access your gallery/storage and can be used to blackmail you. Don’t hesitate to file a complaint or contact the police due to shame, embarrassment, and self-blame. Know what the Law Says about this offence? It is a punishable offence by law and attracts sections 354 (D), 506 / 507, 509 IPC, and 384 IPC, and Sec.67 of the IT Act is also applicable. Criminals who commit such crimes typically profit from the victim’s silence and the ambiguity of the law. Everyone must therefore be aware of the portions and codes that will be useful to them in these situations. Criminal Procedure Code Section 108(1)(i)(a) enables the victim to contact the local magistrate and report the individual she feels may be spreading any pornographic material. The magistrate can arrest such a person or people and require them to sign a bond to prevent them from sharing the content. This might deter the accused. This is a quick remedial section because the victim can complain to the magistrate without any direct evidence against the accused. The Indian Penal Code’s (IPC) Section 292 incriminates anyone who uses apps or other social media to disseminate or threaten to distribute any compromising or intimate photos of another person. If a picture of the woman is clicked obscenely without her knowledge and is distributed, a voyeurism case under Section 354C of the IPC can also be filed along with the assistance of other pertinent Information Technology Act parts.