Eradicating Cybercrime

Empowering Resilience

Cyber Relief is a project by Little Ridge in New Delhi, India. It helps people, groups, and governments fight cybercrimes by giving them the right technology and legal help.

Eradicating Cybercrime

Empowering Resilience

Cyber Relief is a project by Little Ridge in New Delhi, India. It helps people, groups, and governments fight cybercrimes by giving them the right technology and legal help.

About Us

India is currently at the cusp of a digital revolution with the introduction of multiple digital public goods including Unified Payment Interface, E-Aadhar, Open Network for Digital Commerce, and E-KYC by the Government of India. Multinational companies are also playing a crucial role in ensuring digital connectivity through mobile and internet applications like WhatsApp, Skype, PhonePe, Netbanking applications like HDFC Mobile Banking. This has led to a significant increase in the number of internet users across India. The proliferation of Internet services across India has created a user base of 759 million Indian citizens actively using the Internet. This number is estimated to increase to 900 million active internet users in India by 2025 as per the Internet and Mobile Association of India (IAMAI). However, this growing user base faces a significant challenge in using the internet safely as cybercrimes are increasing rapidly in India.
Cyber Relief is a project launched by Little Ridge, New Delhi, India to help individuals, organisations and governments effectively combat cybercrimes by assisting them with the necessary technology and legal solutions.

The Cyber Relief team seeks to assist with cybercrimes related to:

Individuals

These cybercrimes are targeted at blackmailing individuals with or without a personal motive. Cybercrimes against individuals can be motivated by a need for revenge, to cause annoyance or to defame individuals. Such crimes may or may not involve a financial element.

Organisations

Cybercrimes against organisations can be motivated to access confidential documents for leverage or manipulation. Large-scale cybercrimes against organisations can also affect individuals if their personal information is compromised as a result of the cybercrimes

Society

Cybercrimes against society are targeted at critical information infrastructures essential for the functioning of the country.

Types of Cybercrimes

Baiting

Baiting refers to an attractive incentive like a lottery amount being used to attract the victim to download malware.

Credit & Debit Fraud

Credit or debit card frauds involve criminals making unauthorised purchases on the cards without the consent of the card holder as they have access to the personal information of the card holder.

Employment Scams

Employment scams refer to deceptive practices aimed at collecting money and personal information from the victims in the guise recruitment services for employment.

Fake Loan Apps

Fake loan apps may provide easy loans for large sums of money in the pretence of 0% interest. These apps can also be aimed at phishing for personal information. Fake loan apps are not compliant with RBI norms.

Fake Tech Support

Tech support fraud refers to attackers posing as tech support for various cyber products including antivirus products. The attacks may direct individuals to click on links to download malware on computers or to share personal information.

Hacking

Hacking refers to the gaining unauthorized access to computer systems, networks etc. for manipulation and exploitation.

Investment Scams

Investment scams are fraudulent or deceptive schemes designed to deceive victims into making investments in projects that do not exist or through misrepresentation.

KYC Frauds

KYC is an identity verification process which may be asked while joining new businesses or for authentication purposes. Cyber-criminals may pose as authenticating agencies to gain financial information.

Lottery Frauds

Lottery frauds are aimed at collecting personal financial information from individuals by indicating that they have won a significant amount of money in a lottery.

Matrimonial Scams

Online matrimonial fraud involves exploiting individuals financially in the guise of a potential marriage.

Vishing

Voice phishing is based on voice and telephone technologies to trick victims into revealing sensitive data to unauthorized entities. Tech support frauds are a form of vishing.

SIM Cloning

Sim cloning allows attackers to monitor, control or track the mobile phones of victims.

Online Doxing

Online Doxxing refers to the publication of personal information like phone numbers, email, social media accounts etc. on public platforms which presents an opportunity for harassment by the larger public.

Phishing

Phishing is a cybercrime where victims are tricked into downloaded malware or viruses or directed to illegal websites to increase traffic for ad revenue.

QR Scams

QR code scams can include attackers directing the victims to make payments to different QR codes which do not belong the vendor from whom victims have transacted with.

Smishing

Smishing refers to sending text messages in the guise of reputed companies to entice the victims to reveal personal information, such as passwords or credit card numbers.

Cybercrimes against individuals

Cyber Bullying

Cyber-bullying is intimidating online behaviour including the use of online platforms to threaten, embarrass, harass or scare the victim. It can be carried out through cell phones, computers, and tablets and communication apps including social media sites, e-mail, chat rooms, discussion groups and websites on the internet.

Cyber Stalking

A cyber-stalker may use the internet or other electronic means to monitor your online activities and track your whereabouts to harass, intimidate, embarrass, accuse, threaten, commit identity theft or malware attack. There is a threat of intrusion of privacy which can be used to cause physical location.

Computer Viruses

A computer virus is a malicious computer program which can replicate or attach itself to programs which can infect computer systems when downloaded or forwarded. Computer viruses can be used in spamming, phishing and spying attacks among others.

Cyber Defamation

Cyber-defamation refers to defamation in the cyber-space or damaging the reputation of an individual in a cyber-space. The effects of cyber-defamation are dire as it has the potential to reach a large target audience in a short span of time which may be irreversible.

Spamming

Spamming is the use of messaging systems to send multiple unsolicited messages to large numbers of recipients. These messages may contain computer viruses, adware, malware etc.

Email Spoofing

Email spoofing is a technique used in spam and phishing attacks to trick users into believing that a specific message came from a person or entity they know. These emails are often used to demand money.

Deepfakes

Deepfakes refer to doctored images, videos or content using artificial intelligence. Deepfake content is aimed at altering the original perception of people to financial or other benefits.

Fake Profiles

Fake social media profiles are created to impersonate individuals. These accounts can be used to defame individuals by engaging in illegal activities.

Identity Theft

Identity theft refers to fraudulent gain of a person’s identity without consent which can be used for illegal purposes or financial gain.

Social Engineering

Social engineering refers to the psychological manipulation of individuals to divulge personal information which can be used for a wide array of cybercrimes.

Spamming

Spamming is the use of messaging systems to send multiple unsolicited messages to large numbers of recipients. These messages may contain computer viruses, adware, malware etc.

Spying

Cyber-spying refers to monitoring the activities of individuals to gather information without their consent. This information may or may not be used to engage in cybercrimes.

Ransomware

Ransomware are malicious software which deny access to the captured content unless a ransom amount is paid.

Social Engineering

Social engineering refers to the psychological manipulation of individuals to divulge personal information which can be used for a wide array of cybercrimes.

Cybercrimes against Property & finances

Baiting

Baiting refers to an attractive incentive like a lottery amount being used to attract the victim to download malware.

Credit & Debit Fraud

Credit or debit card frauds involve criminals making unauthorised purchases on the cards without the consent of the card holder as they have access to the personal information of the card holder.

Employment Scams

Employment scams refer to deceptive practices aimed at collecting money and personal information from the victims in the guise recruitment services for employment.

Fake Loan Apps

Fake loan apps may provide easy loans for large sums of money in the pretence of 0% interest. These apps can also be aimed at phishing for personal information. Fake loan apps are not compliant with RBI norms.

Fake Tech Support

Tech support fraud refers to attackers posing as tech support for various cyber products including antivirus products. The attacks may direct individuals to click on links to download malware on computers or to share personal information.

Hacking

Hacking refers to the gaining unauthorized access to computer systems, networks etc. for manipulation and exploitation.

Investment Scams

Investment scams are fraudulent or deceptive schemes designed to deceive victims into making investments in projects that do not exist or through misrepresentation.

KYC Frauds

KYC is an identity verification process which may be asked while joining new businesses or for authentication purposes. Cyber-criminals may pose as authenticating agencies to gain financial information.

Lottery Frauds

Lottery frauds are aimed at collecting personal financial information from individuals by indicating that they have won a significant amount of money in a lottery.

Matrimonial Scams

Online matrimonial fraud involves exploiting individuals financially in the guise of a potential marriage.

Vishing

Voice phishing is based on voice and telephone technologies to trick victims into revealing sensitive data to unauthorized entities. Tech support frauds are a form of vishing.

SIM Cloning

Sim cloning allows attackers to monitor, control or track the mobile phones of victims.

Online Doxing

Online Doxxing refers to the publication of personal information like phone numbers, email, social media accounts etc. on public platforms which presents an opportunity for harassment by the larger public.

Phishing

Phishing is a cybercrime where victims are tricked into downloaded malware or viruses or directed to illegal websites to increase traffic for ad revenue.

QR Scams

QR code scams can include attackers directing the victims to make payments to different QR codes which do not belong the vendor from whom victims have transacted with.

Spying

Cyber-spying refers to monitoring the activities of individuals to gather information without their consent. This information may or may not be used to engage in cybercrimes.

Ransomware

Ransomware are malicious software which deny access to the captured content unless a ransom amount is paid.

Matrimonial Scams

Online matrimonial fraud involves exploiting individuals financially in the guise of a potential marriage.

Spying

Cyber-spying refers to monitoring the activities of individuals to gather information without their consent. This information may or may not be used to engage in cybercrimes.

Ransomware

Ransomware are malicious software which deny access to the captured content unless a ransom amount is paid.

QR Scams

QR code scams can include attackers directing the victims to make payments to different QR codes which do not belong the vendor from whom victims have transacted with.

Fake Tech Support

Tech support fraud refers to attackers posing as tech support for various cyber products including antivirus products. The attacks may direct individuals to click on links to download malware on computers or to share personal information.

Cybercrimes against organisations

Data security breach

Data security breach refers to the leak of personal or financial data as a result of DDoS or dumpster diving attacks

DDoS

Distributed Denial of Service (DDoS) is a type of cyber-attack that aims to make a website, online service, or network inaccessible to its intended users. 

Tailgating

Tailgating is an unauthorized person gaining access into an organisation to cause a data breach and steal confidential information.

Whaling

Whaling attack refers to phishing activities targeted at high profile executives, commonly called whales to steal sensitive information from a company. The goal is to manipulate the victim into authorizing high-value transfers to the attacker.

Data Security Breach

Data security breach refers to the leak of personal or financial data as a result of DDoS or dumpster diving attacks

DDoS

Distributed Denial of Service (DDoS) is a type of cyber-attack that aims to make a website, online service, or network inaccessible to its intended users.

Tailgating

Tailgating is an unauthorized person gaining access into an organisation to cause a data breach and steal confidential information.

Whaling

Whaling attack refers to phishing activities targeted at high profile executives, commonly called whales to steal sensitive information from a company. The goal is to manipulate the victim into authorizing high-value transfers to the attacker.

Cybercrimes against society

Cyber Terrorism

Cyber-terrorism is a politically motivated, premediated attack aimed at different sections of the society to disrupt its normal functioning. Attacks against critical information infrastructure can be considered as cyber-terrorism

Web Jacking

Web Jacking is when attackers create a fake website to harm the user’s system. It is done to steal the sensitive data of the victim and use it.

Forgery

Digital forgery can include creating fake e-currencies and cryptocurrencies which can have an adverse impact on a nation’s economy.
arafed-man-hoodie-typing-computer-keyboard-generative-ai_900321-39274
Cyber-Terrorism
Cyber-Terrorism
Cyber-terrorism is a politically motivated, premediated attack aimed at different sections of the society to disrupt its normal functioning. Attacks against critical information infrastructure can be considered as cyber-terrorism
south-african-motor-vehicle-car-licence-document_181624-13958
Forgery
Forgery
Digital forgery can include creating fake e-currencies and cryptocurrencies which can have an adverse impact on a nation’s economy.
cyber-security-with-computer-hacker_25030-17365
Web Jacking
Web Jacking
Web Jacking is when attackers create a fake website to harm the user’s system. It is done to steal the sensitive data of the victim and use it. 

Blogs

What happening with cybercrimes against society ?

To be safe in the digital age, it is important to be aware of the…

Reports on Cybercrimes against Individuals

To be safe in the digital age, it is important to be aware of the…

Top Tips on How to be safe in Digtial Age ?

To be safe in the digital age, it is important to be aware of the…