cyberpeace logo white

CyberPeace Foundation is an organization working to create and uphold cyber peace and harmony throughout the globe. It continuously strives towards spreading cyber hygiene and cyber ethics.

The primary initiatives undertaken by us are:
CyberPeace Corps
Cyber Bridge
Charity Bounty

It has been found that cybercrimes and threats to women online are rising by the day, so that they are the prime targets of some sensitive crimes like revenge pornography and sextortion. For more details please visit

It has been found that cybercrimes and threats to women online are rising by the day, so that they are the prime targets of some sensitive crimes like revenge pornography and sextortion. Reasons causing this are not only economical, but also social and cultural, that prevent women from using the internet and issues like trolling that pop up when one uses it too often. With the development of a more advanced and digital age , it is of paramount importance to break this gender divide and create awareness among internet users, to help curb the threats and problems associated with the internet and its usage, and also pave a path to reap the benefits of these great technological advancements.

SUPPORT US TODAY! : Fundraising for the local community causes World Help received.

We are here to help you at any time all over the world so don’t hesitate to reach us at any moment.

Get in Touch





+91 82350 58865

I-T dept, 5 Indian banks targeted in phishing scam: Report

Dec 10, 2021 | Uncategorized

Cyber criminals are trying to lure Indian users into revealing important personal information with a new report on Monday warning that suspicious messages asking users to submit an application for the disbursement of income tax refund have been doing the rounds, with a link that directs users to a webpage looking like the income tax e-filing web page.

The targeted banks in the campaign include the State Bank of India, ICICI, HDFC, Axis Bank and Punjab National Bank, revealed an investigation by New Delhi-based think tank CyberPeace Foundation along with cybersecurity services firmAutobot Infosec.

The suspicious links originate from the US and France, said the report, adding that the campaign is collecting personal as well as banking information from the user and getting into this type of trap could cause a massive financial loss for the users.

The shared link with the SMS has no domain name and is not linked with the Indian government.

All IP addresses associated with the campaign belong to some third party dedicated cloud hosting providers, said the report.

The whole campaign uses plain http protocol instead of the secure https. This means anyone on the network or internet can intercept the traffic and get the confidential information in plain text to misuse against the victim.

It asks users to download an application from a third party source instead of Google Playstore.

The application asks to provide administrator rights and unnecessary access permissions of the device.

On opening the link, users are redirected to a landing page that is mostly similar to the government income tax e-filing website.

On clicking the green ‘Proceed to the verification steps’ button, users are asked to submit personal information such as full name, PAN, Aadhar number, address, pincode, date of birth, mobile number, email address, gender, marital status and banking information like account number, IFSC code, card number, expiry date, CVV/CVC and card PIN.

Additionally, the bank name is automatically detected from the IFSC code entered in the form.

After submission of data, users are redirected to a page where they are asked to confirm the entered data.

Clicking on the green ‘confirm’ button directs users to a fake banking login page almost similar to the official one.

It asks for the username and password for online banking.

After these details are entered, for the next step, users are asked to enter a Hint question, Answer, Profile password and CIF number.

Once submitted, a mobile verification section with instructions provided to download an android application (.apk file) appears, to complete the ITR verification.

Here, users are deliberately instructed to grant all device permissions to the particular application, the investigation revealed.

The application, called Certificate.apk, starts downloading upon clicking the green ‘Download’ link.

The overall layout and functionalities of the web page used in the campaign are similar to the official e-filing site to lure laymen, said the report. IANS