Cyber attacks - vishing and phishing

Defending against Vishing and Phishing cyber-attacks

Recently, the Reserve Bank of India (RBI) advised people to remain cautious when using digital banking systems as cyber attacks aka cybercrime is on the rise. The Reserve Bank warns the public to beware of fraudulent text messages, fake calls, anonymous calls, false advertisements, and unauthorized QR codes.

Criminals can rob people at the will of their money, which is extremely difficult. As people were pushed up platforms to run their financial markets, cyberspace offered greener pastures for cybercriminals during the ongoing epidemic. There are thus financial instruments emerging on the scene to cover the losses experienced by all in the event of a cyberattack in a dangerous environment.

Coronavirus outbreaks have caused major social, economic, political, and technological changes. These changes continue unabated as Omicron’s driving difference is the third consequence of the epidemic. Financial products have been improved as a result of these viral changes for the benefit of consumers, homeowners, and businesses.

In addition to banks, we find a lot of innovations and customizations occurring in insurance products in response to the current epidemic.

Insurance companies have restructured their existing products and launched (and continue to launch) several new products to cover the impact of Covid-19 following the guidelines of India’s Insurance Regulatory and Development Authority (IRDAI).

In the post-epidemic world, insurance companies have tremendous opportunities. Risk awareness has reached new heights among individuals, corporations, and governments. Likewise, insurers must close many security loopholes exposed by the virus by speeding up their processes.

During the epidemic, health insurance was without a doubt the most popular insurance product, but demand for other policies and coverage has also increased. A customized insurance scheme is urgently required to protect people from the damage caused by cyber-attacks as a result of the epidemic.

An era of cybersecurity insurance policies has begun that protect from other cyber risks, such as cyberbullying identity theft, and extortion. Cyber insurance is in its infancy now, but the growing number of cyber-attacks in the post-epidemic era necessitates a policy soon. Most insurance companies will offer this product and it will be a hot commodity.

What describes the operation of fraudsters according to the RBI?

According to the Apex Bank, Vishing, Phishing, and Remote Access are all methods that cybercriminals use to steal money from people. In the context of fraud, it refers to the act of attempting to access confidential information in the form of

  • KYC updates,
  • account deactivation / SIM cards, and
  • credit debt amounts

– by pretending to come from a bank, e-wallet provider, or telecommunications service provider.


As part of a phishing attack, voicemails and phone calls are used. If you receive a recorded call that says you must dial a number on the keypad, it can easily be a dangerous attack. Vishing has become more common because criminals have become more sophisticated.

Phishing is the practice of sending spoofed emails and SMS messages to deceive customers. Consumers into thinking that the communication is coming from their bank/e-wallet provider. And that links will retrieve their personal information.

There are many instances where search engines and web pages display false bank/e-wallet numbers.

How does the Indian show of internet security work?

We must first understand that the wonders of the Internet contribute to people’s happiness no matter where they are. However, they are also exposed to the unspeakable danger of becoming victims of social engineering. Social engineering involves online scammers tricking victims into revealing sensitive information, such as passwords and credit card numbers.

Therefore, we are all at risk in the Internet world, and we are all at risk from others as well. It has become the norm to use these types of models to keep everyone from dying from online fraud. Fraudsters use identity theft to commit everything from financial fraud to identity theft.

It has now become a crisis, which has increased the risk of online attacks and left people stranded. There have been numerous reports of high data rates. Because the epidemic has forced individuals, businesses, government agencies, and other organizations to invest in online services.

The danger inherent in these activities all over the network has escalated to critical levels. Even as hackers must conduct their day-to-day activities despite Internet access. As an example, how customers use online services, such as

  • storing credit card information on retailers’ websites,
  • sharing sensitive personal information over unsecured communications, or
  • using unmarked websites,

exposes them to significant risks.

The goal of network security is to protect the network against threats, including unauthorized access, viruses, malware, denial of service attacks, spam, and phishing.

Cyberattacks on websites since covid-19 infestation in the country have required professionals to work from home.

Due to the increased reliance on technology and working from the lab, viruses have increased the threat to cybersecurity. Cyber attacks are meant for individuals as well as businesses. Cybercrime is on the rise, increasing the likelihood of cyberattacks.

Is there a cyber protection policy guideline from IRDAI against cyber attacks?

A document published by India’s Insurance Regulatory and Development Authority (IRDAI) describes the structure of cyber insurance products. The insurance regulator has advised that companies offering products primarily targeted commercial businesses. The products that offer cybersecurity products with exclusive coverage for individuals to protect themselves from cyber threats. Reconsider their product structure based on the policy advocates in the document.

A cyber insurance policy will normally cover four categories of losses and expenses, based on the director’s advice.

  • There are first-party losses: In the form of direct financial losses, data losses, business disruption losses, and loss losses incurred by third parties.
  • There are three types of administrative costs: administrative and research costs, community penalties, and security costs.
  • Management costs: Expert forensic costs, including security consultation, reputation damages, legal costs for notification, communications with service providers, and policy, credit card fraud and information, cyberextortion/ransomware coverage, 24/7 phone operation, counseling, erasing information, and pursuing action.
  • Liabilities and damages:  incurred as a result of confidentiality or data breach/protection, mitigation, infringement of intellectual property rights (IPRs), and security costs.

Leave a Reply