Search This Blog
PEACE is a site that provides the common man legal knowledge about various legal scenarios, in India. The information has been simplified for the common man to understand.
Notary Services process provided by PEACE
How to Report Hacking, Malware, and Ransomware Attacks in India
Do you know How to Report Hacking, Malware, and Ransomware Attacks in India?
In today's digital age, hacking and malware attacks can target anyone — individuals, small businesses, or large corporations. If your device is compromised, sensitive data stolen, or you're locked out of systems by ransomware, Indian cyber laws provide a legal remedy. This post guides you through identifying such attacks, understanding applicable laws, and taking fast legal action under Indian cybercrime procedures.
Jump to:
- Types of Cyberattacks: Hacking, Malware, Ransomware
- Warning Signs You’ve Been Attacked
- Indian Laws Against Cyberattacks
- Steps to Take Immediately After an Attack
- How to File a Complaint in India
- Filing an FIR with the Police
- How to Protect Yourself in the Future
- Related Posts
Types of Cyberattacks You Might Face
Here's how different cyberattacks typically work:
- Hacking: Unauthorized access to your device, email, bank, or social media accounts
- Malware: Malicious software installed without your knowledge (viruses, spyware, keyloggers)
- Ransomware: A type of malware that locks or encrypts your files, demanding payment for access
- Phishing: Emails or SMSes tricking you into clicking fake links or entering credentials
- Trojan Horse: Malware disguised as legitimate software to take control of your system
These attacks can result in data loss, financial fraud, identity theft, or even business shutdowns.
Signs That You've Been Hacked or Infected
Look out for these symptoms:
- Unusual login attempts or unauthorized access alerts
- Sluggish device performance or strange behavior
- Popup ads or programs installed without your knowledge
- Files encrypted or renamed unexpectedly
- Ransom notes or messages demanding money in cryptocurrency
Cyber Laws in India Covering These Offences
If you are a victim of hacking, malware, or ransomware, the following legal provisions can protect you:
- Section 43 of IT Act: Unauthorized access, downloading, or copying of data
- Section 66 IT Act: Hacking and illegal access with malicious intent
- Section 66C: Identity theft (e.g., impersonation using your credentials)
- Section 66D: Cheating by impersonation using digital means
- Section 379 IPC: Theft of personal digital property or data
- Section 385 IPC: Extortion if ransomware is used to demand payment
Both the IT Act and IPC can apply together based on the nature and seriousness of the cyberattack.
What to Do Immediately After a Cyberattack
If your system has been compromised, take the following steps without delay:
- Disconnect from the Internet: Prevent further remote access or data theft
- Do not pay any ransom: There is no guarantee that your data will be returned
- Take screenshots: Capture all messages, ransom demands, or warning signs
- Preserve evidence: Keep logs, timestamps, suspicious files, or emails
- Run antivirus/malware scans: If safe, use trusted software to identify the malware
How to File a Cybercrime Complaint in India
You can report the attack through the official portal:
- Visit www.cybercrime.gov.in
- Select “Report Other Cyber Crime” category
- Fill in your complaint with:
- Device and system details
- Screenshots or files of the attack/ransom note
- Any suspicious email ID or link received
- Attach logs, screenshots, and written complaint
Make sure to follow up with the acknowledgment number provided.
Filing an FIR With the Police
If the damage is severe, you can go to your local police station or cybercrime cell:
- File a First Information Report (FIR) under the IT Act + IPC sections listed above
- Provide complete documentation of the incident
- Request digital forensic support if needed
Under Indian law, you can file a cybercrime FIR in any jurisdiction, not just where the crime occurred.
How to Protect Yourself from Future Attacks
- Install a reliable antivirus and update it regularly
- Use firewalls and enable OS-level security settings
- Never open email attachments from unknown sources
- Back up important data offline or on secure cloud services
- Enable two-factor authentication (2FA) for all important accounts