Chapter 3 Β· AICITSS Cyber Security

Modus Operandi in Cyber Crimes

An interactive guide to how cybercriminals plan and execute attacks β€” the methods, patterns, case studies, and how to protect yourself. Based on real global data from 895 cyber incidents.

🎯 15 Attack Types
πŸ“Š Real Global Data
πŸ” Dani Data Case Study
πŸ›‘ Protection Tips
πŸŽ“ AICITSS Curriculum
πŸ”

What is Modus Operandi?

The characteristic methods that cybercriminals use to execute attacks

Modus Operandi (Latin: “mode of operation”) refers to the typical and characteristic methods that cybercriminals or threat actors employ to execute their attacks and achieve malicious objectives. It is a learned behavior β€” shaped by experience, education, and maturity β€” just like any other skill.


Understanding the modus operandi of cybercriminals helps law enforcement, investigators, and organizations anticipate, detect, and prevent cyberattacks before they cause damage.

βš™οΈ

3 Core Elements of Every Modus Operandi

At a minimum, every criminal method contains these three elements

01
Ensure Success
Plan and execute the crime in a way that maximizes the chance of achieving the criminal objective without failure.
02
Protect Identity
Conceal who the criminal is β€” using fake IDs, VPNs, shell companies, stolen mobile numbers, and proxy networks.
03
Effect Escape
Plan an exit strategy β€” moving funds quickly through crypto, layered accounts, or foreign transfers to avoid detection.
πŸ“Š

Global Cyberattack Frequency (2020–2021)

Data from 895 global incidents β€” showing which attack types were most common

895
Total Attacks Analyzed (2020–2021)
37%
Hacking β€” Most Frequent Attack
155.8M
People Affected by Breaches in 2020
1,291
Data Breaches (Sep 2020–Sep 2021)
1,872
Data Breaches in 2020 (COVID peak)
8%
Rise in Breaches vs 2019

πŸ“Š Attack Type Frequency β€” 895 Global Incidents

πŸ–₯ Hacking37%
πŸ“§ Spam Emails13%
βœ‰οΈ Malicious Emails13%
🌐 Malicious Domains9%
πŸ“± Mobile Apps8%
🎣 Phishing7%
🦠 Malware7%
🌍 Browsing / Website Apps6%
πŸ’₯ DDoS6%
πŸ“¨ BEC (Business Email Compromise)4%
πŸ”’ Ransomware2%
πŸ€– Botnet2%
πŸ•΅οΈ APT1%

Source: Global survey β€” March 2020 to December 2021 Β· n=895 cyberattack incidents

βš”οΈ

Methods Used for Commission of Crimes

Click each attack type to learn how it works

πŸ”“
A β€” Privacy Infringement
Mishandling private data like passwords or social security numbers. Data can enter a program directly from users, from databases, or from third-party partners β€” then gets exposed externally.
Privacy Violation
πŸ•΅οΈ
B β€” Industrial Espionage
Theft of trade secrets through removal, copying, or recording of confidential corporate information for use by a competitor. Involves bribery, blackmail, and technological surveillance.
Corporate Crime
πŸ’£
C β€” Computer Sabotage & Extortion
Deliberate damage to systems β€” infecting websites with malware or taking down power grids. Cyber extortion pairs an attack with a ransom demand for stopping it.
Sabotage
πŸ’Έ
D β€” Electronic Money Laundering
Using electronic fund transfers to conceal and move proceeds of crime across jurisdictions at the speed of light. Cryptocurrency and informal banking systems are exploited to bypass regulations.
Financial Crime
πŸ”‘
F β€” Unauthorized Access (Hacking)
Gaining entry to a system without permission β€” typically through unpatched software vulnerabilities, weak passwords, or social engineering. The most common attack type at 37% of all incidents.
Hacking
πŸͺ™
Electronic Tax Evasion
Using digital tools to conceal legitimate income from tax authorities. Cryptocurrencies and overseas banking institutions with privacy protections are commonly exploited for this purpose.
Financial Crime
🎯

Attack Vectors in Cyber Fraud

Common methods used specifically to commit financial fraud β€” click to expand

🎣 Phishing Critical +
Cybercriminals send deceptive emails or messages impersonating legitimate entities (banks, government agencies, trusted organizations) to trick recipients into revealing sensitive information or clicking malicious links. Often uses urgency tactics to pressure victims into acting quickly without thinking.
🦠 Malware Attacks Critical +
Malicious software used to compromise systems, steal data, or gain unauthorized access. Delivered via infected email attachments, malicious websites, or compromised software downloads. Types include viruses, worms, trojans, spyware, and adware.
πŸ”’ Ransomware Critical +
Cybercriminals encrypt a victim’s data and demand a ransom payment (typically in cryptocurrency) for the decryption key. Usually delivered through phishing emails or exploiting unpatched software vulnerabilities. Hospitals, governments, and corporations are prime targets.
πŸ’₯ DDoS Attacks (Distributed Denial of Service) High +
Attackers flood a target system or network with an overwhelming volume of traffic from multiple compromised devices (a botnet), making the service unavailable to legitimate users. Often used for extortion, competitive sabotage, or as a distraction during another attack.
πŸ‘€ Identity Theft Critical +
Stealing someone’s identity using their electronic signature, password, Aadhaar, PAN, or other identifying information. Used for credit card fraud, online share trading scams, e-banking crimes, and fraudulent transactions in the victim’s name.
πŸ‘¨β€πŸ’Ό Insider Threats High +
Malicious or negligent employees within an organization who steal data, intentionally compromise systems, or inadvertently cause security incidents. Insider threats are particularly dangerous because the person already has legitimate access credentials and system knowledge.
πŸ”‘ Credential Theft High +
Stealing usernames and passwords through phishing, keyloggers, or credential stuffing attacks (trying breached password lists against other services). Once obtained, credentials enable unauthorized access to banking, email, corporate systems, and more.
πŸ•³ Zero-Day Exploits Critical +
Exploiting unpatched vulnerabilities in software or hardware that are unknown to the vendor and public. Because no patch exists yet, there is zero days of protection. These are highly valued and often used by sophisticated nation-state attackers.
🀝 Social Engineering High +
Manipulating people β€” not systems β€” into divulging confidential information or performing security-compromising actions. Tactics include pretexting (fake scenario), baiting (leaving infected USB drives), vishing (voice phishing calls), and tailgating (physical access).
πŸ”— Supply Chain Attacks Critical +
Targeting a supplier, vendor, or third-party partner to compromise the ultimate target organization. Attackers inject malware into software updates or compromise the supply chain so every customer of that software becomes infected β€” as seen in the SolarWinds attack.
🌍 APT β€” Advanced Persistent Threats Critical +
Long-term, highly sophisticated attacks often associated with nation-state actors. Attackers maintain persistence inside the target network for months or years, quietly gathering intelligence and exfiltrating data without triggering alerts. Very difficult to detect and remove.
πŸ€– IoT & Botnet Attacks Medium +
Compromising Internet of Things devices (smart cameras, routers, appliances) to build botnets β€” armies of infected devices controlled remotely. Used to launch massive DDoS attacks, send spam, or distribute malware. Weak IoT security is the primary enabler.
πŸ’° Crypto Jacking Medium +
Secretly using a victim’s computing resources to mine cryptocurrency without their knowledge or consent. This slows down the victim’s device, increases electricity costs, and can cause hardware damage β€” while the attacker profits from the mined coins.
πŸ“‹

Attack Type Quick Reference

Summary of key attack vectors and their primary targets

Attack TypePrimary MethodMain TargetSeverity
HackingExploiting vulnerabilitiesSystems, NetworksCritical
PhishingDeceptive emails/messagesIndividuals, EmployeesCritical
RansomwareEncrypt data + demand ransomOrganizations, HospitalsCritical
DDoSTraffic flood via botnetWebsites, ServersHigh
Identity TheftSteal PAN, Aadhaar, passwordsIndividualsCritical
APTLong-term stealth intrusionGovernments, EnterprisesCritical
Social EngineeringHuman manipulationEmployees, IndividualsHigh
Supply ChainCompromised software updatesEnterprises via vendorsCritical
Crypto JackingHidden mining scriptsAny device/userMedium
🎣

Phishing Types & Online Fraud Methods

Select a phishing type below to learn how it works

πŸ“§ Deceptive Phishing β€” Most Common Type

Fraudsters pose as a real, trusted company (bank, government, Amazon, etc.) to obtain personal information or login passwords. These emails use urgency, fear, or authority to terrify recipients into acting immediately β€” “Your account will be suspended in 24 hours!”


Red Flags: Urgency language Β· Generic greeting (“Dear Customer”) Β· Suspicious sender email Β· Hover over links before clicking Β· Grammar errors

🦠 Malware-Based Phishing

The attacker attaches a malicious file or link to an email or website that looks useful β€” a PDF invoice, a Word document, or a “software update.” When opened, it installs malware silently on the victim’s device, giving the attacker remote access or stealing credentials in the background.


Common delivery formats: PDF, .docx, .exe, .zip, .xlsm files Β· Fake browser extensions Β· Malicious macro-enabled Office documents

πŸ“ž Voice Phishing (Vishing)

Making false phone calls posing as a trustworthy institution β€” bank security team, TRAI, CBI, IT Department, or a prize notification center. Criminals use caller ID spoofing to display official-looking numbers. Victims are pressured to share OTPs, card numbers, or transfer money immediately.


Example script: “This is State Bank of India fraud department. Your account has been compromised. Please provide your OTP to freeze it immediately.”

🌐 Pharming Attack

A cyberattack where users are automatically redirected to a fraudulent website even when they type the correct URL. Attackers corrupt DNS servers or modify the hosts file on the victim’s device so that legitimate URLs point to fake servers. The fake site looks identical to the real one.


Difference from phishing: Phishing requires the victim to click a link. Pharming happens automatically β€” even typing the correct URL leads to the fake site.

πŸ–₯ Fake / Phishing Websites

Domains designed to look identical to official websites β€” same logo, layout, and color scheme. Users unknowingly enter their credentials, which are captured by the attacker. How to spot them:


βœ… Visit the website directly (type URL manually, don’t click links)
βœ… Check the exact URL spelling carefully
βœ… Avoid pop-ups and insecure (non-HTTPS) sites
βœ… Try entering a fictitious password β€” real sites reject it, fake sites accept anything
βœ… Check the website’s design quality and available payment options

πŸ’Ό Business Email Compromise (BEC)

Defined by the FBI as a “sophisticated scam targeting firms that engage with international suppliers and/or make frequent wire transfer payments.” Attackers use computer intrusion or social engineering to compromise legitimate company email accounts and instruct employees to make large fraudulent wire transfers β€” appearing to come from the CEO or CFO.


Why it’s devastating: The email looks completely genuine β€” it comes from the real executive’s compromised account. Billions of dollars are lost annually to BEC globally.

πŸ’³

How Online Financial Fraud Operates β€” Step by Step

The complete modus operandi of investment/part-time job frauds in India

Advertisement Bait
“Earn Online”, “Part Time Job”, “Work From Home” ads displayed 10am–7pm (peak internet usage). Domains use ‘xyz’ or ‘Wix’ sites that redirect to a messaging platform for private chat.
Lure Phase
Communication via Hijacked Numbers
Multiple Indian mobile numbers used β€” the actual number holder is unaware their number is being used. Some knowingly share OTPs in exchange for money (money mules).
Identity Concealment
Investment Link Sent
Fraudster sends an investment link over chat with a personal referral code. Communication is in English; Google Translate used for regional victims. Each victim gets a unique account.
Hook Phase
Account Activation + First Task
Victim sends a screenshot to activate account. A small task is assigned to build confidence. Mandatory: load money via unauthorized Payment Gateways. All payments via UPI.
Trust Building
First Payout β€” The Hook
Victim is allowed to withdraw a small amount to build confidence. This first successful withdrawal is the trap β€” it makes victims believe the system is genuine and invest more.
Confidence Gained
Escalating Investments
Victim is lured to do more tasks requiring larger deposits. UPI details change daily. Domain changes but source code remains same. Once a large amount is deposited, fraudster goes silent.
Escalation
Money Mule Accounts
Stolen funds flow through bank accounts opened by money mules using real/fake IDs. Account owners receive fixed rent or commission for lending accounts. Account-to-account layering used.
Laundering Layer 1
Shell Companies & Payment Aggregators
Shell companies with dummy directors, fintech companies, and SMS aggregators are used. Aggregator-on-aggregator model conceals identities. Fraudsters operate from outside India.
Laundering Layer 2
Final Termination Points
Money diverted to: cryptocurrency Β· gold / bullion Β· foreign wire transfers Β· person-to-person transfers. These are the final exit points identified by Law Enforcement Agencies (LEAs).
Exit Phase
πŸ“°

Case Study: The Dani Data App Scam

A real Ponzi scheme that defrauded β‚Ή1,400 crore from 1,200+ investors across India

⚠️ Educational Purpose: This case study is presented to help students recognize and avoid similar fraud patterns. All details are from public domain information as referenced in the AICITSS curriculum.
β‚Ή1,400Cr
Total Amount Defrauded (~US$180 Million)
1,200+
Investors Victimized Across India
Dec 2021
App Launched by Woo Uyanbe
Jun 2022
Scam Collapsed β€” Operators Disappeared

πŸ“Œ What Was the Scam?

The Dani Data app promised users high returns on football betting investments, claiming to use Artificial Intelligence to predict match outcomes. Users were invited to invest money and “earn” profits. In reality, it was a classic Ponzi scheme β€” new investor money was used to pay existing investors, creating an illusion of profitability.

Ponzi Scheme AI as Bait Football Betting Chinese Operator UPI Payments

βš™οΈ How the Ponzi Mechanism Worked

Step 1: New investors deposit money into the app.
Step 2: Operators use new money to pay “profits” to earlier investors β€” building trust.
Step 3: Satisfied early investors refer friends and family β€” the scheme grows.
Step 4: When new investor inflow slows, the scheme cannot sustain payouts.
Step 5: Operators disappear with all remaining funds, leaving all investors with nothing.

πŸ‘₯ Who Were the Victims?

Victims came from all walks of life β€” young professionals, retirees, homemakers, and small business owners. Many had invested their entire life savings for retirement. The promise of AI-powered guaranteed returns with no visible risk was designed to appeal to people unfamiliar with financial markets.

πŸ“š

Key Lessons from the Dani Data Scam

Warning signs every investor must recognize

🚩 Red Flag #1 β€” Guaranteed High Returns

No legitimate investment guarantees high returns with little or no risk. If it sounds too good to be true β€” it is. AI cannot predict football match outcomes with certainty.

🚩 Red Flag #2 β€” Unregulated App / Platform

The app was not registered with SEBI, RBI, or any financial regulator. Always verify if an investment platform is licensed before committing any money.

🚩 Red Flag #3 β€” Referral-Based Growth

Ponzi schemes rely on referrals to grow. Being asked to bring in friends and family in exchange for bonuses is a classic warning sign of a pyramid/Ponzi structure.

🚩 Red Flag #4 β€” Large Upfront Payment Required

Requiring large deposits to “unlock” higher profit tiers is a classic Ponzi trap. Legitimate investments never demand large upfront commitments with guaranteed returns.

βœ… Protection β€” Do Your Research

Always research any investment platform before putting money in. Check SEBI registration, look for independent reviews, and consult a certified financial advisor.

βœ… Protection β€” Diversify & Consult Experts

Never invest money you cannot afford to lose. Diversify investments across regulated instruments. Seek professional financial advice before any significant investment decision.

πŸ›‘

How to Protect Yourself from Cyber Crimes

Practical steps for individuals and organizations

πŸ‘€ For Individuals

πŸ”
Use Strong, Unique Passwords
Use a different strong password for every account. Enable two-factor authentication (2FA) wherever available.
πŸ”—
Verify Before You Click
Hover over links before clicking. Check sender email addresses carefully. When in doubt β€” go directly to the official website by typing the URL.
πŸ“±
Guard Your OTP
Never share OTPs with anyone β€” including people claiming to be from your bank, TRAI, or any government agency. No legitimate authority ever asks for your OTP.
πŸ”„
Keep Software Updated
Install security patches promptly. Most attacks exploit known vulnerabilities in outdated software. Enable automatic updates for OS and all applications.
πŸ’Ύ
Regular Data Backups
Back up important data regularly using the 3-2-1 rule: 3 copies, 2 different media types, 1 offsite. This neutralizes ransomware attacks.
πŸŽ“
Cyber Awareness Education
Stay informed about new scam tactics. Follow CERT-In, RBI, and government cybersecurity advisories. Share knowledge with family members who may be vulnerable.
🏦
Monitor Financial Accounts
Review bank statements and credit card transactions regularly. Set up SMS/email alerts for every transaction. Report unauthorized transactions immediately.
πŸ“‹
Invest Only in Regulated Platforms
Verify SEBI / RBI registration before investing. Avoid apps promising guaranteed high returns. Consult a SEBI-registered financial advisor before investing significant money.

🏒 For Organizations & Businesses

🎯
Employee Cybersecurity Training
Regular phishing simulation drills and cybersecurity awareness programs. Employees are the most common entry point β€” human error causes 85% of breaches.
πŸ”’
Zero Trust Architecture
Never trust, always verify β€” even internal traffic. Every access request must be authenticated. Limit user privileges to only what is needed for their role.
πŸ›‘
Vulnerability Scanning
Regular penetration testing and vulnerability assessments. Patch management program to ensure no known vulnerabilities remain unpatched in the production environment.
πŸ“Š
Incident Response Plan
Have a documented, tested incident response plan. Define who to contact, what to do, and how to communicate during a cyber incident to minimize damage and recovery time.
πŸ“§
Email Authentication (SPF, DKIM, DMARC)
Implement email security protocols to prevent domain spoofing. This significantly reduces the risk of BEC attacks by ensuring attackers cannot send emails from your domain.
πŸ”
Supply Chain Risk Assessment
Assess and monitor the cybersecurity posture of all third-party vendors and suppliers. Require vendors to meet security standards. A compromised vendor means a compromised organization.
🧠

Quick Quiz β€” Test Your Knowledge

Click an option to check if you are correct

1. What does “Modus Operandi” mean in the context of cybercrime?
A
The tools used by cybercriminals
B
The typical methods cybercriminals use to execute attacks
C
The motive behind a cybercrime
D
The legal punishment for cybercrime
2. According to the global survey (2020–2021), which cyberattack type was the most frequent?
A
Phishing (7%)
B
Malware (7%)
C
Hacking (37%)
D
Ransomware (2%)
3. The Dani Data app scam was primarily what type of fraud?
A
Ransomware Attack
B
Ponzi Scheme
C
DDoS Attack
D
Phishing
4. What is “Pharming” in the context of cyber fraud?
A
Sending fake emails to steal passwords
B
Installing malware via email attachments
C
Redirecting users to a fake website even when they type the correct URL
D
Making fake phone calls to get personal information
5. What does BEC stand for, and who does it typically target?
A
Binary Encryption Code β€” targets individuals
B
Business Email Compromise β€” targets firms making wire transfers
C
Botnet Execution Command β€” targets servers
D
Browser Exploit Code β€” targets websites
6. Which of the following is a key characteristic of Advanced Persistent Threats (APTs)?
A
They are quick, noisy, and easily detected
B
They target only individual users, not organizations
C
Long-term stealth attacks often associated with nation-state actors
D
They require physical access to the target’s systems
7. In the online fraud scenario, what is the main purpose of using Shell Companies?
A
To provide legitimate business services
B
To employ money mules openly
C
To create bank accounts for accepting or paying out fraud proceeds
D
To develop legitimate payment gateways
8. Crypto Jacking primarily causes harm by:
A
Encrypting the victim’s files for ransom
B
Stealing the victim’s cryptocurrency wallet
C
Using victim’s computing power to mine crypto without consent
D
Sending fake cryptocurrency transaction alerts