Syed Mohd Irfan
Asked April 27, 2017

Fake call on phone cheated

  • 3 Answers

Yesterday on my mobile some fake call (18742996121) came to me & said your home shop 18 prize is ready please deposit 4,000 to 5,000. I agreed with her & asked me my ATM card details. Then after my 2,000 rupees debited from my atm card. This is cyber fraud please help.

Answers 3

block your ATM card via phone banking or visit by bank.

file a FIR on that case to your nearest police station.

Agree Comment 0 Agrees over 3 years ago

You can file a complaint under Sections 66C, 66D of the IT Act, 2000 and Section 420 of the Indian Penal Code.


Research by - Saumya

Agree Comment 0 Agrees over 3 years ago

Your first legal recourse should be to file a complaint at the appropriate consumer forum (where the cause of action as arisen or where you reside) and complain about the company. You can file a criminal complaint under Sections 406, 419 & 420 of Indian penal code along with 43, 65, 66, 66A, C and D of the Information Technology Act, 2000. As I can see on the Internet, the site has yet not been taken down, so it will be easier for the officers of the court to track the people behind the scam and held them guilty.

You can go in for consumer court complaint too but that would be more of a trouble than gain. Depending on the relief claimed, a consumer complaint in your case will be filed in District Forum: When relief claimed is less that Rs. 20, 00, 000/-;

Below mentioned are the steps you can take to file a cyber crime complaint.  Step 1: Keep in mind that you will have to provide name, mailing address & telephone number along with an application letter, addressing the head of a cyber crime investigation cell when you go to file a complaint.         Step 2: As with almost all police cases, the complainant will have to provide the following papers and documents at the time of filing the complaint. The valid documents are, namely:           1) Server Logs            2) A copy of the defaced web page in soft copy as well as hard copy format. If any data is compromised on  the victim’s server or computer or any other network equipment, soft copy of original data and soft copy of compromised data.    3) Access control mechanism details i.e. - who had access to the computer or email of the victim? 4) List of suspects i.e. if the victim is having any suspicion on anyone. 5) All relevant information leading to the answers to following questions, namely:

  • What is compromised?
  • Who might have compromised the system?
  • When was the system compromised?
  • Why was the system compromised?
  • Where is the impact of the attack-identifying the target system from the network?
  • How many systems have been compromised by the attack?
Agree Comment 0 Agrees over 3 years ago

Please Login or Register to Submit Answer

Directory ads
Need to talk to a lawyer?

Book a phone consultation with a top-rated lawyer on Lawfarm.