Module 5 On Cybercrime
Module 5 On Cybercrime
Types of Cybercrime
This chapter covers the discussion on different types of cybercrime. It defines the mode of
operation of cybercrimes committed.
A. Hacking
Hacking is an attempt to exploit a computer system or a private network inside a
computer. Simply put, it is the unauthorized access to or control over computer
network security systems for some illicit purpose.
Types of Hackers
1. White Hat Hackers
White-hat hackers, on the other hand, are deemed to be the good guys, working
with organizations to strengthen the security of a system. A white hat has
permission to engage the targets and to compromise them within the prescribed
rules of engagement.
Unlike black-hat hackers, ethical hackers exploit security networks and look for
backdoors when they are legally permitted to do so. White-hat hackers always
disclose every vulnerability they find in the company’s security system so that it
can be fixed before they are being exploited by malicious actors.
Some Fortune 50 companies like Facebook, Microsoft, and Google also use white-
hat hackers.
White hat professionals hack to check their own security systems to make it more
hack-proof. In most cases, they are part of the same organization.
2. Black Hat Hacker
The term “black hat” originated from Western movies, where the bad guys wore
black hats and the good guys wore white hats.
Black hat hackers hack to take control over the system for personal gains. They
can destroy, steal or even prevent authorized users from accessing the system.
They do this by finding loopholes and weaknesses in the system. Some computer
experts call them crackers instead of hackers.
3. Grey Hat Hackers
Grey hat hackers comprise curious people who have just about enough computer
language skills to enable them to hack a system to locate potential loopholes in
the network security system. Grey hats differ from black hats in the sense that
the former notify the admin of the network system about the weaknesses
discovered in the system, whereas the latter is only looking for personal gains. All
kinds of hacking are considered illegal barring the work done by white hat
hackers.
4. Red Hat Hackers (Vigilante hacker)
A red hat hacker could refer to someone who targets Linux systems. However,
red hats have been characterized as vigilantes. Like white hats, red hats seek to
disarm black hats, but the two groups' methodologies are significantly different.
Rather than hand a black hat over to the authorities, red hats will launch
aggressive attacks against them to bring them down, often destroying the black
hat's computer and resources.
5. Green Hat Hackers (Unskilled hacker)
Green hat describes hacker wannabes who, though they lack technical hacking
skills and education, are eager to learn the tricks of the trade.
6. Blue Hat Hackers (vengeful hacker)
A blue hat is defined as a hacker seeking revenge. Blue hat hackers are also
wannabe hackers like green hats, but vengeance is blue hat hackers' only
motivation -- they have no desire to hone their hacking skills.
7. Rootkits
A rootkit is a program or set of software tools that allow threat actors to gain
remote access to control a computer system that interacts or connects with the
internet. Originally, a rootkit was developed to open a backdoor in a system to fix
specific software issues. Unfortunately, this program is now used by hackers to
destabilize the control of an operating system from its legitimate operator or
user.
There are different ways to install rootkits in a victim’s system, the most famous
of them being social engineering and phishing attacks. Once rootkits are installed
in the system, it secretly allows the hacker to access and control the system,
giving them the opportunity to bring the system down or steal crucial data.
8. Keyloggers
This is a specially designed tool that logs or records every key pressed on a
system. Keyloggers record every keystroke by clinging to the API (application
programming interface) when typed through the computer keyboard. The
recorded file then gets saved, which includes data like usernames, website visit
details, screenshots, opened applications, etc.
9. Vulnerability Scanner
A vulnerability scanner classifies and detects various system weaknesses in
networks, computers, communication systems, etc. This is one of the most
common practices used by ethical hackers to find potential loopholes and fix
them on an immediate basis. On the other hand, vulnerability scanners can also
be used by black-hat hackers to check the system for potential weak spots in
order to exploit the system.
B. Cracking
Cracking is a technique used to breach computer software or an entire computer
security system, and with malicious intent. Though functionally the same as hacking,
cracking is strictly used in a criminal sense.
Cracking is when someone performs a security hack for criminal or malicious reasons,
and the person is called a “cracker.” Just like a bank robber cracks a safe by skillfully
manipulating its lock, a cracker breaks into a computer system, program, or account
with the aid of their technical wizardry.
b) Dictionary cracking: It’s similar to brute-force cracking, but rather than using
random characters, dictionary cracking limits itself to actual words.
2. Software cracking
Software cracking is when someone alters a piece of software to disable or entirely
remove one or more of its features. Copy protections in paid software are frequent
targets of software cracking, as are the pop-up purchase reminders (or “nag
screens”) you often see in free shareware.
“Cracked” software is usually refers to a paid product that’s had its copy protections
removed or defanged. Developers incorporate copy protections, such as serial
number authentication, to prevent people from copying and pirating software. Once
cracked, the software can be distributed and used for free. Most software cracking
uses at least one of the following tools or techniques:
b) Patch: Patches are small bits of code that modify existing programs.
Developers release patches for software all the time. Crackers can make them
too, and when they do, the patch’s job is to alter the way the program works
by removing the unwanted features.
A common example of a wireless LAN is the Wi-Fi system in your home. You’ve got
your router, which emits a Wi-Fi signal, and all your devices connected to it. Together,
they form a local network. Someone could theoretically stand outside your home and
attempt to crack your Wi-Fi network. If your network is password-protected, they’ll
need to use some password cracking techniques as part of their network crack.
Unsecured Wi-Fi networks are the easiest targets, because there’s nothing in the way
of the cracker. They don’t need to do any actual cracking — all they need is a sniffer,
or a way to intercept the data flowing openly across the network. Any wireless
network is potentially at risk of network cracking, so be extra-careful when using
public Wi-Fi and protect your data with a VPN.
e) Spreading malware: Once inside a system, a cracker can seed it with malware.
This can range from spyware that logs user activity, to adware that showers
users in pop-ups, to ransomware that encrypts valuable data, or even to
rootkits that keep all the other malware hidden away.
C. Phishing
Phishing is a term used to describe a harmful individual, or group of individuals, that
cheats users by sending emails or creating web pages that are intended to collect an
individual’s online bank, credit card, or other login information. The emails and web
pages look official, which is why users trust them and voluntarily part with their
personal information.
Phishers may use social engineering and other public sources of information, like
social network data, to gather background information about the victim’s personal
and work history, as well as their interests, hobbies, and activities.
Prior to the phishing attack, hackers can discover names, job titles and email
addresses of potential victims, in addition to information about their colleagues and
the names of key employees in their organizations. This information is then used to
create a realistic email.
Viruses and other malware distributed by email can wreak all kinds of havoc,
including the following:
1. the distribution and execution of ransomware attacks;
2. enlisting the victim system into a botnet;
3. crashing victim systems;
4. providing remote access to victims' devices;
5. theft of personal data or destruction of files on the victim storage media;
6. creating unwanted pop-ups; and
7. adding the victim system to a malvertisement
8. Email viruses often spread by causing the attachment or malicious message to
be sent to everyone in the victim's address book.
Email viruses can be packaged and presented in a variety of different ways. Some can
easily be spotted as malicious by virtue of subject lines that don't make sense,
suspicious sender or other header fields and body content that looks off in some
way. Other email messages containing malware can be more difficult for recipients to
identify, as they reflect considerable effort by the malicious actor to make the email
message appear to be sent from a trusted and known sender. This is particularly true
for phishing attacks carried out to further business email compromise attacks.
Email viruses are often connected with phishing attacks in which hackers send out
malicious email messages that look as if they are originated from legitimate sources,
including the victim's bank, social media, internet search sites or even friends and co-
workers. The attacker's goal, in these cases, is to trick users into revealing personal
information, such as the victim's usernames, full names and addresses, passwords,
Social Security numbers or payment card numbers.
Spam and malware-filled email messages are still considered to be one of the most
effective means of social engineering used by hackers to spread and infect users with
viruses and to attack the networks of their victims' companies.
3. Macro viruses are viruses written in a macro language used by other software
programs, especially Microsoft Excel and Microsoft Word macros. Macro
malware is transmitted through phishing email messages that contain
malicious attachments, which contain the malicious macros.
Melissa was one of the most notorious early email viruses. A fast-spreading macro
virus, Melissa was distributed as an email attachment that disabled a number of
safeguards in Word 97 or Word 2000 when it was opened by the victim. If the
Microsoft Outlook email program was installed on a targeted system, Melissa re-sent
the virus to the first 50 people in each of the victim's address books. Melissa was
released into the wild in March 1999.
The fast-spreading ILOVEYOU virus surfaced on May 4, 2000, when it shut down
email services in major enterprises, including the Ford Motor Company. The email
virus carried the "I LOVE YOU" in the subject header, and it was estimated to have
reached as many as 45 million users in one day.
The MyDoom email worm, released in January 2004, was the fastest-spreading email-
based worm ever. MyDoom hit tech companies, including Microsoft and Google, with
a distributed denial-of-service attack. Additionally, MyDoom spammed junk mail
through infected computers, with text reading, "andy; I'm just doing my job, nothing
personal, sorry." In 2004 it was estimated that 16% to 25% of all email messages had
been infected by MyDoom.
The Storm Worm Trojan horse malware began spreading in January 2007 in email
messages that exploited concern about European storms. The attackers initially
spammed out hundreds of thousands of email messages, with a subject line reading,
"230 dead as storm batters Europe." The malware infected the computers of users
who opened the malicious attachment included with the email.
Prevention
To prevent an email virus from infecting your client device or network, consider the
following steps:
Keep the mail client, web browser and operating system updated and
patched.
Use antivirus software.
Don't open potentially dangerous attachments, such as PDF files, that have
been included in email messages from unknown senders.
Scan all attachments for malware.
Don't click on links in email messages, and be careful of phishing email
messages that appear to be from legitimate sources.
Avoid opening any executable files included as email attachments. Attackers
may try to disguise these files by naming them with two extensions, such as
image.gif.exe, but .exe is the sign of an executable that will run automatically.
One of the ideal methods by which viruses spread is through emails – opening the
attachment in the email, visiting an infected website, clicking on an executable file, or
viewing an infected advertisement can cause the virus to spread to your system.
Besides that, infections also spread while connecting with already infected
removable storage devices, such as USB drives.
1. Computer Viruses
Computer viruses are a type of malware that earned their name because of how they
spread by "infecting" other files on a disk or computer. Viruses then spread to other
disk drives and machines when the infected files are received in downloads from
websites, email attachments, shared drives or when carried in files on physical media,
such as USB drives or in the early days—floppy disks.
According to the National Institute of Standards and Technology (NIST), the first
computer virus, a boot sector virus called "Brain," was developed in 1986. Tired of
customers pirating software from their shop, two brothers claim to have designed
the virus to infect the boot sector of software thieves' floppy disks. The virus spread
through infected copies of the pirated software, jumping from the infected floppy
disk to the computer hard drive when the program was booted, or loaded onto the
new machine.
2. Worms
Unlike viruses, worms don't require human help in order to infect, self-replicate or
propagate. As soon as they breach a system, they infect their entry point and spread
through the device and across any network to which the device connects. By
exploiting network vulnerabilities—such as missed operating system (OS) updates or
application patches, weak email security or poor internet safety practices—worms
can execute, self-replicate and propagate at an almost exponential rate as each new
infection repeats the process. Originally, most worms simply "ate" system resources
and reduced performance. Now, most worms contain malicious "payloads" designed
to steal or delete files upon execution.
3. Adware
One of the most common online nuisances is adware. Adware programs
automatically deliver advertisements to host computers. Familiar examples of
adware include pop-up ads on webpages and advertising messages that are part of
the interface of "free" software. While some adware is relatively harmless, other
variants use tracking tools to glean information about your location or browser
history. Most of the time, adware collects information in order to serve better
targeted ads. But sometimes Adware is used for more nefarious purposes including
redirecting search results, displaying op-ups that can’t be closed or link to malware,
disabling antivirus software or even going all the way off the rails into the territory of
spyware.
4. Spyware
Spyware does just what it says. It spies on what users are doing at their computer. It
collects data such as keystrokes, browsing habits, location data and even login
information. While adware might include "repurposing" collected data for sale in the
terms of service statement, spyware is more duplicitous. Spyware is considered
malware because users are unaware of it. The only intent of spyware is malicious.
Spyware collects and sells your data to third parties, typically cyber criminals, with no
regard for how the data will be used. Spyware may also modify specific security
settings on your computer or interfere with network connections.
5. Ransomware
Ransomware infects your computer, encrypts your PII and other sensitive data such
as personal or work documents and then demands a ransom for their release. If you
refuse to pay, the data is deleted. Some ransomware variants lock out all access to
your computer. Sometimes, they might claim to be the work of legitimate law
enforcement agencies and suggest that you've been caught doing something illegal.
6. Bots
Bots are programs designed to automatically carry out specific operations. Although
they serve many legitimate purposes, they are also a popular type of malware. Once
on a computer, bots can cause the machine to execute specific commands without
the user's approval or knowledge. Hackers may also try to infect multiple computers
with the same bot to create a "botnet"—short for robot network. These zombie
botnets give hackers the ability to remotely manage compromised computers,
enabling them to steal sensitive data, to spy on user activities, to distribute spam
automatically or to launch devastating Distributed-Denial-of-Service (DDoS) attacks
on computer networks and websites.
7. Rootkits
Rootkits allow remote access or control of a computer by a third party. These
programs are useful for IT professionals trying to troubleshoot network issues
remotely, but they can easily become nefarious. Once installed on your computer,
rootkits allow attackers to take complete control of your machine to steal data or
install additional malware. Rootkits are designed to go unnoticed and actively hide
their presence and that of other malware that they install.
8. Trojan Horses
Commonly called "Trojans," these programs hide in plain sight by masquerading as
legitimate files or software. Once downloaded and installed, Trojans make changes
to a computer and carry out malicious activities, without the knowledge or consent
of the victim.
9. Bugs
Bugs—flaws in software code—are not a type of malware, they are errors in
software code that popular vectors for attackers with malicious intent. Bugs can, on
and of themselves, have detrimental effects on your computer, such as freezing,
crashing or reducing performance. Security bugs create holes in a computer or
network’s defenses that are especially attractive to would-be attackers. While better
security control on the developer end helps reduce the number of bugs, bugs are
another reason why keeping current on software patches and system updates is
crucial.
Most websites and web applications store data in environment or configuration files, that
affects the content displayed on the website, or specifies where templates and page content is
located. Unexpected changes to these files can mean a security compromise and might signal a
defacement attack.
One of the most common fraudulent activities is e-commerce payment fraud, which
is basically any kind of illegal online transaction that is being performed by a
cybercriminal. The victim is usually an online user that gets deprived of their money,
interest, sensitive info or personal property over the internet.
E-commerce payment fraud is something that has been prevalent ever since the
launch of e-commerce platforms. Ever since businesses discovered a way that
customers could use to safely buy products from them without necessarily going to
the firm’s physical premises, hackers have tried their best to steal that information
and benefit from it.
This kind of wire transfer fraud attack against businesses and other organizations
(municipalities and schools have been hit hard by this kind of attack) has become a
significant threat to an organization’s financial well-being. Much of business today is
conducted remotely – either over the phone or (more often) through email. Without
that face-to-face verification of someone’s identity, it is possible for an attacker to
trick either party in a transaction into transferring money to their bank account
instead of the intended recipient’s, or deceiving a party into thinking that a transfer
of funds is necessary when it is not, providing fraudulent bank account information.
J. Online Auction fraud
Internet auction fraud involves schemes attributable to the misrepresentation of a
product advertised for sale through an Internet auction site or the non-delivery of
products purchased through an Internet auction site. In advance of making a
purchase on an Internet auction site, be sure to review the site's fraud prevention
tips and additional security alerts.
Cyberstalkers may use email, instant messages, phone calls, and other
communication modes to stalk you. Cyberstalking can take the form of sexual
harassment, inappropriate contact, or unwelcome attention to your life and to your
family’s activities.
Cyberstalking doesn’t have to involve direct communication, and some victims may
not even realize they are being stalked online. Perpetrators can monitor victims
through various methods and use the information gathered for crimes like identity
theft. In some cases, the line between cyberspace and real life can become blurred.
Attackers can collect your personal data, contact your friends and attempt to harass
you offline.
Catfishing
Catfishing is one method of online stalking. “Catfishers” pose as someone else, using
social media sites to create an identity. They may use fake names, photos, and
locations. They might approach the intended victim as a love interest or a mutual
friend. Catfishing may be used for financial gain, to cyberbully a victim, or to cause
reputational damage and embarrassment to a victim.
They often copy the profiles of an existing user. The goal is to provide the identity of
an actual person and to use that identity to fool the victim.
In India, viewing digital pornography is not a crime, but creating and distributing such
material is. It is legal in most other countries.
However, child pornography is illegal in all forms and has been banned universally.
Financial identity theft. This is the most common type of identity theft. Financial
identity theft seeks economic benefits by using a stolen identity.
Tax-related identity theft. In this type of exploit, the criminal files a false tax return
with the Internal Revenue Service (IRS). Done by using a stolen Social Security
number.
Medical identity theft. Where, the thief steals information like health insurance
member numbers, to receive medical services. The victim's health insurance
provider may get the fraudulent bills. This will be reflected in the victim's account
as services they received.
Criminal identity theft. In this example, a person under arrest gives stolen identity
information to the police. Criminals sometimes back this up with a containing
stolen credentials. If this type of exploit is successful, the victim is charged instead
of the thief.
Child identity theft. In this exploit, a child's Social Security number is misused to
apply for government benefits, opening bank accounts and other services.
Children's information is often sought after by criminals because the damage may
go unnoticed for a long time.
Senior identity theft. This type of exploit targets people over the age of 60.
Because senior citizens are often identified as theft targets, it is especially
important for this seniors to stay on top of the evolving methods thieves use to
steal information.
Identity cloning for concealment. In this type of exploit, a thief impersonates
someone else in order to hide from law enforcement or creditors. Because this
type isn't explicitly financially motivated, it's harder to track, and there often isn't a
paper trail for law enforcement to follow.
Synthetic identity theft. In this type of exploit, a thief partially or completely
fabricates an identity by combining different pieces of PII from different sources.
For example, the thief may combine one stolen Social Security number with an
unrelated birthdate. Usually, this type of theft is difficult to track because the
activities of the thief are recorded files that do not belong to a real person.
Identity theft techniques
1. Mail theft. This is stealing credit card bills and junk mail directly from a victim's
mailbox or from public mailboxes on the street.
2. Dumpster diving. Retrieving personal paperwork and discarded mail from
trash dumpsters is an easy way for an identity thief to get information.
Recipients of preapproved credit card applications often discard them
without shredding them first, which greatly increases the risk of credit card
theft.
3. Shoulder surfing. This happens when the thief gleans information as the
victim fills out personal information on a form, enter a passcode on a keypad
or provide a credit card number over the telephone.
4. Phishing. This involves using email to trick people into offering up their
personal information. Phishing emails may contain attachments bearing
malware designed to steal personal data or links to fraudulent websites where
people are prompted to enter their information.
O. Cyber terrorism
The term “cyber terrorism” was coined to characterize computer-based attacks
against an adversary’s assets. It takes place were cyberspace and terrorism converge
(Denning, 1999). Though these attacks occur in cyberspace, they still exhibit the four
elements common to all acts of terrorism:
(1) premeditated and not simply acts born of rage
Cyber terrorist attacks are premeditated and must be planned since they
involve the development or acquisition of software to carry out an attack.
(2) political and designed to impact political structure
Computer terrorism is an act that is intended to corrupt or completely destroy
a computer system (Galley, 1996).
Cyber terrorists are hackers with a political motivation, their attacks can
impact political structure through this corruption and destruction.
(3) targeted at civilians and civilian installations Cyber terrorist attacks often
target civilian interests. Denning (2000a) qualifies cyber terrorism as an attack
that results in violence against persons or property, or at least causes enough
harm to generate fear.
(4) conducted by ad hoc groups as opposed to national armies’ Cyber terrorism is
sometimes distinguished from cyber warfare or information warfare, which
are computer-based attacks orchestrated by agents of a nation-state.
Cyber warfare is another term that is often used to describe various aspects of
defending and attacking information and computer networks in cyberspace, as
well as denying an adversary’s ability to do the same (Hildrith, 2001). Cyber
warfare and information warfare employ information technology as an
instrument of war to attack an adversary’s critical computer systems (Hirsch,
Kett, & Trefil, 2002). Winn Schwartau (1994) has proposed three categories for
classifying information warfare: (1) Personal Information Warfare, (2) Corporate
Information Warfare, and (3) Global Information Warfare.