Punishment for abetment of offences - Sec.84B

Section 84B of the IT Act punishes those who assist or instigate cyber crimes with the same penalties as the primary offender. Learn about the risks of digital abetment and insider threats.

May 21, 2012

Section 84B of the Information Technology Act ensures that those who assist or instigate cyber crimes face the same legal consequences as the primary attackers. In the eyes of the law, providing the tools or the plan for a breach is as culpable as the breach itself.\n

\n\n

Defining Abetment in a Digital Context\n

\n

Abetment occurs when a person instigates a crime, enters into a conspiracy to commit one, or provides active aid to the perpetrator. In a cyber incident, this could mean sharing stolen credentials, providing custom malware, or acting as an insider to bypass physical security. Section 84B makes it clear: if the abetted act is committed, the abettor receives the same punishment provided for that offence. For businesses, this highlights the risk of \"insider threats\" where a disgruntled employee might assist an external group in targeting the firm. A professional cyber crime investigation is required to untangle these chains of help and identify every party involved.\n

\n\n

Conspiracy and Aid in Cyber Incidents\n

\n

The law does not require the abettor to be the one who clicks the final button. If you are part of the group that planned the attack or if you provided the specific aid that made the crime possible, you are an abettor. This includes the creation of botnets or the distribution of phishing kits. The 2008 amendment inserted this section to close the loophole where secondary actors escaped liability. Tracing these connections requires deep forensic analysis to link communication logs and financial trails to the act of abetment.\n

\n\n

Why Organizations Must Track Insider Activity\n

\n

Many abetment cases involve individuals with legitimate access who misuse it to help outsiders. To prevent Section 84B violations within your team, you must have strict access controls and real-time monitoring. Knowing who accessed a file and what they did with it is the only way to detect a conspiracy before it matures. If you suspect an insider is assisting an external threat, you must lock down the evidence immediately without alerting the parties involved.\n

\n\n

Expose the Full Chain of a Cyber Crime\n

\n

A cyber attack is rarely the work of a single person. If your organization has been hit, you need to identify not just the intruder, but everyone who helped them get in. Contact our forensic team to help you trace the abetment trail and bring every participant to justice under the IT Act.\n

Found this helpful?

Share this page with others