Online Banking Security: Tips for Indian Bank Customers
Most online banking security advice is useless. Here's what actually happens when Indian bank customers get defrauded, what the attacks really look like, and the specific steps that would have prevented each one. Including the RBI rule that could save you lakhs if you act within 3 days.

Most online banking security advice is garbage. I don't mean it's wrong — "use a strong password" and "don't click suspicious links" are technically correct — I mean it's so obvious that it's useless to anyone who actually needs help. Nobody wakes up thinking, "Today I'll share my OTP with a stranger." People get defrauded because the attacks are clever, the timing is perfect, and the emotional manipulation is precise. Telling someone to "be careful" after they've lost two lakhs to a screen-sharing scam is like telling someone who got pickpocketed to keep an eye on their wallet.
So let me try something different. Instead of rattling off a list of dos and don'ts, let me walk you through what actually happens — real attack patterns that are hitting Indian bank customers right now, in early 2026 — and then we'll work backward to the specific defenses that matter.
Here's What Happened: The KYC Scam
A retired school teacher in Pune — let's call her Meera aunty — got an SMS in November 2025 that said: "Dear Customer, your SBI account KYC has expired. Update immediately to avoid account suspension. Click here: sbi-kyc-update.in." The URL looked plausible. The message created panic. She clicked, landed on a page that looked exactly like SBI's net banking login, entered her username, password, and when it asked for the OTP that had been sent to her phone, she entered that too.
Within four minutes, Rs 1.8 lakh had been transferred out of her savings account through three rapid NEFT transactions.
Here's what a phishing attack actually looks like from the attacker's side. They register a domain that's close to the real bank's URL — sbi-kyc-update.in instead of onlinesbi.sbi. They copy the bank's login page pixel by pixel using freely available website cloning tools. When the victim enters credentials, the fake site passes them to the real banking site in real time (this is called a relay attack or real-time phishing proxy). The OTP the victim receives is legitimate — it was triggered by the attacker logging into the real site with the stolen credentials. When the victim enters it on the fake page, the attacker captures it and completes the authentication on the real site.
The defense isn't "don't click links" — it's more specific than that. Banks never send URLs in SMS messages. SBI doesn't. HDFC doesn't. ICICI doesn't. If you get an SMS with a link claiming to be from your bank, it's fake, full stop. The actual way to update your KYC is to visit your branch or log in through the bank's official app. Bookmark your bank's URL and always type it manually or use the bookmark — never follow links from messages.
Here's What Happened: The Screen-Sharing Attack
A small business owner in Hyderabad — let's call him Ravi — got a call from someone claiming to be from HDFC Bank's credit card division. The caller knew his name, his card's last four digits (which appear on statements that many people receive by email, making them easy to phish), and even the approximate credit limit. The caller said there was "suspicious activity" on his card and offered to help him "secure" it.
The caller asked Ravi to download an app called "QuickSupport" — which is TeamViewer's remote access application, available on the Play Store. Ravi installed it and shared the 9-digit access code the caller asked for. At this point, the caller could see Ravi's screen in real time. He guided Ravi to open his HDFC Bank app, ostensibly to "verify the suspicious transaction." While Ravi was looking at his transaction history, the attacker — who could see everything Ravi saw — noted down his account details and initiated a UPI transfer from another device using the information gathered.
Total loss: Rs 87,000.
The defense: Never install remote access apps at anyone's request. No bank will ever ask you to install TeamViewer, AnyDesk, QuickSupport, or any screen-sharing tool. If someone on the phone asks you to install an app, hang up. Doesn't matter who they claim to be. Doesn't matter what they say is happening to your account. Hang up and call your bank's official number (printed on the back of your card) to verify.
Here's What Happened: The UPI Collect Scam
This one's almost elegant in its simplicity. A woman in Chennai — let's call her Deepa — listed a sofa for sale on OLX for Rs 12,000. A "buyer" contacted her on WhatsApp, agreed to the price immediately (first red flag — nobody agrees to the first price on OLX), and said he'd send the money via Google Pay. Moments later, Deepa got a notification on Google Pay: a collect request for Rs 12,000. The buyer told her, "I've sent the payment, just enter your UPI PIN to accept it."
She entered her PIN. Rs 12,000 left her account.
The core misunderstanding that this scam exploits: you never need to enter your UPI PIN to receive money. A collect request is a request to pull money from your account. Entering your PIN authorizes the debit. Receiving money via UPI requires zero action on the receiver's end — the money just shows up. This distinction isn't well explained in any UPI app's interface, which is a design failure that NPCI should've fixed years ago.
Fake Banking Apps: Quieter but Nastier
Fake banking apps are a growing problem in India and they don't get enough attention. These are APK files — Android installation packages — distributed through WhatsApp groups, Telegram channels, or sketchy websites that claim to be the "latest version" of your banking app. Some are crude copies that just steal your login credentials. Others are more sophisticated: they function as keyloggers, recording everything you type on your phone, including passwords, PINs, and OTPs.
In late 2025, CERT-In issued an advisory about a wave of fake apps mimicking SBI YONO, HDFC Mobile Banking, and Paytm. These apps requested accessibility service permissions (which gives them the ability to read everything on screen) and SMS permissions (which lets them intercept OTPs). A user who installed one of these apps and granted those permissions was giving the attacker complete control over their banking.
The defense is straightforward but requires discipline: only install banking apps from the Google Play Store or Apple App Store. Before installing, verify the developer name — SBI's YONO app is published by "State Bank of India," not "SBI Official" or "YONO Banking Team." Check the download count; the real YONO app has 100 million+ downloads. Never, under any circumstances, install an APK file that someone sent you on WhatsApp or SMS, no matter how "official" it looks.
The Actual Practical Defenses
Now that you've seen how these attacks work, here are the defenses that actually matter — not in the abstract "be careful" sense, but in the "this specific action prevents this specific attack" sense.
Turn on transaction alerts for everything. Every Indian bank — SBI, HDFC, ICICI, Axis, PNB, Kotak, all of them — offers SMS alerts for transactions. Some charge a small quarterly fee; pay it. Enable email alerts too if available. Enable push notifications on your banking app. The reason this matters isn't prevention — it's speed of detection. If someone drains your account, the difference between finding out in 5 minutes and finding out in 5 days is the difference between getting your money back and losing it permanently. Which brings us to the next point.
Set daily transaction limits as low as possible. This is the single most underused security feature in Indian banking. Every banking app lets you set maximum daily limits for UPI, NEFT, IMPS, and debit card transactions. If your normal daily spending never exceeds Rs 25,000, set your UPI limit to Rs 25,000. Set your NEFT/IMPS limit similarly. SBI's YONO app lets you do this under Service Requests > Manage Limits. HDFC's app has it under Settings > Transaction Limits. ICICI's iMobile under Manage Cards & Limits. If an attacker compromises your account, they can only steal up to your daily limit before the cap kicks in and blocks further transfers.
Use your bank's official app, not the browser. Mobile banking apps have built-in protections that a browser doesn't: certificate pinning (which prevents relay attacks), device binding (which ties the session to your specific phone), and biometric authentication. Net banking through a browser is more vulnerable to phishing, session hijacking, and keylogging. If you must use net banking, always type the URL manually — onlinesbi.sbi for SBI, netbanking.hdfcbank.com for HDFC — and check for the padlock icon. Some banks offer virtual keyboards for entering passwords, which defeat keyloggers. Use them.
Lock your SIM. Your registered mobile number is the skeleton key to your financial life because OTPs go to it. Set a SIM lock PIN (different from your phone's unlock PIN) so that if someone removes your SIM and puts it in another phone, they can't use it. On Android, go to Settings > Security > SIM card lock. If your phone supports eSIM, consider switching — an eSIM can't be physically removed and inserted into another device, which makes SIM swap attacks much harder.
SBI, HDFC, and ICICI: Bank-Specific Notes
Each major bank has some security features that are specific to their platform:
SBI: YONO's "SBI Secure OTP" app generates software-based OTPs instead of relying on SMS, which is more secure against SIM swap attacks. Enable it if you haven't. The bank also offers a "Lock/Unlock" feature for your debit card — you can disable international transactions, online transactions, or the card entirely when you're not using it, and re-enable with a tap.
HDFC: The bank's NetSafe feature generates temporary virtual card numbers for online purchases, so you never expose your real card details. It's available through net banking under the "Cards" section. HDFC also lets you set separate limits for domestic and international transactions, and you can disable international usage entirely if you don't need it.
ICICI: iMobile Pay has an "iSafe" feature that lets you lock specific banking functions (fund transfer, bill payment, card transactions) behind an additional PIN. The bank also offers instant card blocking through the app — if you suspect fraud, you can freeze your card in seconds without calling the helpline and waiting on hold.
Mobile Banking vs. Net Banking
There's a common assumption that net banking (through a browser on your computer) is "more secure" than mobile banking because computers are "more secure" than phones. In 2026, this is backwards. Mobile banking apps are, for most people, the safer option. Here's why:
Banking apps use certificate pinning, which means the app only communicates with the bank's legitimate servers. Even if an attacker sets up a perfect phishing site, the app won't connect to it. Browsers don't have this protection by default. Apps also bind to your device — if someone steals your credentials and tries to log in from a different phone, the bank knows it's a new device and requires additional verification. Browser sessions don't have this binding.
The risk profile of mobile banking is different, though. If your phone itself is compromised — through malware, a fake app, or physical theft — then everything on it is exposed. That's why keeping your phone updated, not installing random APKs, and using a strong screen lock matter more than most people think.
What to Do If You've Been Compromised
If you notice unauthorized transactions or suspect your account's been compromised, here's the exact sequence — and speed matters enormously here:
First 15 minutes: Call your bank's 24x7 helpline. SBI: 1800-11-2211. HDFC: 1800-202-6161. ICICI: 1800-200-3344. Tell them to block your account, debit cards, and UPI. If you can access your banking app, use the instant card block feature while you're on hold.
First 3 hours: File a complaint on the National Cyber Crime Reporting Portal at cybercrime.gov.in or call 1930. Get the complaint number. This creates an official record with a timestamp that matters for liability purposes.
Within 3 days: This is where the RBI rule becomes critical. Under the RBI's Circular on Customer Liability (2017), if you report an unauthorized electronic transaction within 3 working days, your maximum liability is zero — the bank must refund the full amount, provided you weren't negligent (negligence means things like sharing your OTP voluntarily or giving someone your PIN). If you report between 4 and 7 days, your liability is capped at Rs 25,000 for a savings account. Beyond 7 days, the bank decides, and they rarely decide in your favor.
File a written complaint with your bank's branch as well, not just the phone complaint. Keep copies of everything — the SMS alerts showing the fraudulent transactions, the cybercrime portal complaint number, and the written acknowledgment from the branch. Banks have 90 days to resolve the complaint, but in practice, having documentation and a police/cyber crime report speeds things up.
The Uncomfortable Question
Here's something that's been bothering me for a while, and I don't have a clean answer for it. We put the entire burden of security on the customer. The bank says "don't share your OTP." The RBI says "report within 3 days." CERT-In says "use strong passwords." And when someone gets defrauded, the first question everyone asks is: "What did you do wrong?"
But why are OTPs sent over SMS — an insecure protocol that's vulnerable to SIM swapping and interception — still the primary authentication factor for banking in India? Why does the UPI interface make it so easy to confuse a collect request (which debits you) with a payment received notification? Why are bank URLs so inconsistent that even tech-savvy users can't always tell a real domain from a fake one? Why do banking apps on Android still run on phones that haven't received a security update in two years?
The security advice in this article works. It'll protect you against the attacks that are common right now. But it's patching over design problems that the banks, the NPCI, and the RBI have the power to fix and haven't. How much longer are we going to accept "be more careful" as the solution to systemic failures in banking security design?
Written by
Vikram SinghCybersecurity Consultant
Vikram Singh is a certified ethical hacker and cybersecurity consultant who has helped secure systems for major Indian banks and government agencies. He writes about practical security measures for everyday Indian internet users.
Related Posts
Indian Banking Trojans: Protecting Your Financial Apps
Someone asked me last week: 'Can a virus actually steal money from my phone?' The short answer is yes. Banking trojans designed specifically for Indian UPI and banking apps are more common than most people realise.
KYC Data Privacy: What Banks Can and Cannot Do
You handed your Aadhaar, PAN, and address proof to a bank. Now what can they do with it? A flat-toned walkthrough of what's allowed, what's not, and the gray zones nobody clarifies.
Cryptocurrency Privacy and Tax Implications in India
India slaps a flat 30% tax on crypto gains with zero deductions, while exchanges hand over your KYC data on request. Here's a Q&A breakdown of what crypto privacy actually looks like in this country, where the tax math stands, and what you can (and can't) do about it.


