Modus Operandi in Cyber Crimes
An interactive guide to how cybercriminals plan and execute attacks β the methods, patterns, case studies, and how to protect yourself. Based on real global data from 895 cyber incidents.
What is Modus Operandi?
The characteristic methods that cybercriminals use to execute attacks
Modus Operandi (Latin: “mode of operation”) refers to the typical and characteristic methods that cybercriminals or threat actors employ to execute their attacks and achieve malicious objectives. It is a learned behavior β shaped by experience, education, and maturity β just like any other skill.
Understanding the modus operandi of cybercriminals helps law enforcement, investigators, and organizations anticipate, detect, and prevent cyberattacks before they cause damage.
3 Core Elements of Every Modus Operandi
At a minimum, every criminal method contains these three elements
Global Cyberattack Frequency (2020β2021)
Data from 895 global incidents β showing which attack types were most common
π Attack Type Frequency β 895 Global Incidents
Source: Global survey β March 2020 to December 2021 Β· n=895 cyberattack incidents
Methods Used for Commission of Crimes
Click each attack type to learn how it works
Attack Vectors in Cyber Fraud
Common methods used specifically to commit financial fraud β click to expand
Attack Type Quick Reference
Summary of key attack vectors and their primary targets
Phishing Types & Online Fraud Methods
Select a phishing type below to learn how it works
π§ Deceptive Phishing β Most Common Type
Fraudsters pose as a real, trusted company (bank, government, Amazon, etc.) to obtain personal information or login passwords. These emails use urgency, fear, or authority to terrify recipients into acting immediately β “Your account will be suspended in 24 hours!”
Red Flags: Urgency language Β· Generic greeting (“Dear Customer”) Β· Suspicious sender email Β· Hover over links before clicking Β· Grammar errors
π¦ Malware-Based Phishing
The attacker attaches a malicious file or link to an email or website that looks useful β a PDF invoice, a Word document, or a “software update.” When opened, it installs malware silently on the victim’s device, giving the attacker remote access or stealing credentials in the background.
Common delivery formats: PDF, .docx, .exe, .zip, .xlsm files Β· Fake browser extensions Β· Malicious macro-enabled Office documents
π Voice Phishing (Vishing)
Making false phone calls posing as a trustworthy institution β bank security team, TRAI, CBI, IT Department, or a prize notification center. Criminals use caller ID spoofing to display official-looking numbers. Victims are pressured to share OTPs, card numbers, or transfer money immediately.
Example script: “This is State Bank of India fraud department. Your account has been compromised. Please provide your OTP to freeze it immediately.”
π Pharming Attack
A cyberattack where users are automatically redirected to a fraudulent website even when they type the correct URL. Attackers corrupt DNS servers or modify the hosts file on the victim’s device so that legitimate URLs point to fake servers. The fake site looks identical to the real one.
Difference from phishing: Phishing requires the victim to click a link. Pharming happens automatically β even typing the correct URL leads to the fake site.
π₯ Fake / Phishing Websites
Domains designed to look identical to official websites β same logo, layout, and color scheme. Users unknowingly enter their credentials, which are captured by the attacker. How to spot them:
β
Visit the website directly (type URL manually, don’t click links)
β
Check the exact URL spelling carefully
β
Avoid pop-ups and insecure (non-HTTPS) sites
β
Try entering a fictitious password β real sites reject it, fake sites accept anything
β
Check the website’s design quality and available payment options
πΌ Business Email Compromise (BEC)
Defined by the FBI as a “sophisticated scam targeting firms that engage with international suppliers and/or make frequent wire transfer payments.” Attackers use computer intrusion or social engineering to compromise legitimate company email accounts and instruct employees to make large fraudulent wire transfers β appearing to come from the CEO or CFO.
Why it’s devastating: The email looks completely genuine β it comes from the real executive’s compromised account. Billions of dollars are lost annually to BEC globally.
How Online Financial Fraud Operates β Step by Step
The complete modus operandi of investment/part-time job frauds in India
Case Study: The Dani Data App Scam
A real Ponzi scheme that defrauded βΉ1,400 crore from 1,200+ investors across India
π What Was the Scam?
The Dani Data app promised users high returns on football betting investments, claiming to use Artificial Intelligence to predict match outcomes. Users were invited to invest money and “earn” profits. In reality, it was a classic Ponzi scheme β new investor money was used to pay existing investors, creating an illusion of profitability.
βοΈ How the Ponzi Mechanism Worked
Step 1: New investors deposit money into the app.
Step 2: Operators use new money to pay “profits” to earlier investors β building trust.
Step 3: Satisfied early investors refer friends and family β the scheme grows.
Step 4: When new investor inflow slows, the scheme cannot sustain payouts.
Step 5: Operators disappear with all remaining funds, leaving all investors with nothing.
π₯ Who Were the Victims?
Victims came from all walks of life β young professionals, retirees, homemakers, and small business owners. Many had invested their entire life savings for retirement. The promise of AI-powered guaranteed returns with no visible risk was designed to appeal to people unfamiliar with financial markets.
Key Lessons from the Dani Data Scam
Warning signs every investor must recognize
π© Red Flag #1 β Guaranteed High Returns
No legitimate investment guarantees high returns with little or no risk. If it sounds too good to be true β it is. AI cannot predict football match outcomes with certainty.
π© Red Flag #2 β Unregulated App / Platform
The app was not registered with SEBI, RBI, or any financial regulator. Always verify if an investment platform is licensed before committing any money.
π© Red Flag #3 β Referral-Based Growth
Ponzi schemes rely on referrals to grow. Being asked to bring in friends and family in exchange for bonuses is a classic warning sign of a pyramid/Ponzi structure.
π© Red Flag #4 β Large Upfront Payment Required
Requiring large deposits to “unlock” higher profit tiers is a classic Ponzi trap. Legitimate investments never demand large upfront commitments with guaranteed returns.
β Protection β Do Your Research
Always research any investment platform before putting money in. Check SEBI registration, look for independent reviews, and consult a certified financial advisor.
β Protection β Diversify & Consult Experts
Never invest money you cannot afford to lose. Diversify investments across regulated instruments. Seek professional financial advice before any significant investment decision.
How to Protect Yourself from Cyber Crimes
Practical steps for individuals and organizations
π€ For Individuals
π’ For Organizations & Businesses
Quick Quiz β Test Your Knowledge
Click an option to check if you are correct