Unit 1 Notes
Unit 1 Notes
Cyber Crime
Cybercrime involves illegal activities carried out in cyberspace using computers, networks, or
digital devices. It includes hacking, identity theft, phishing, ransomware attacks, data
breaches, and cyber terrorism. Cybercriminals exploit vulnerabilities in systems to steal
sensitive information, disrupt operations, or commit fraud. Governments and cybersecurity
experts continuously work on improving laws, technologies, and strategies to combat cyber
threats and ensure online safety.
• Global Connectivity: Allows instant communication and data sharing across the
world.
• Digital Infrastructure: Includes data centers, servers, and networks that support
online activities.
• Virtual Existence: Users engage in digital interactions via emails, social media, e-
commerce, and cloud services.
• Security Challenges: Cyber threats, data privacy concerns, and the need for strong
cybersecurity measures.
Importance of Cyberspace:
4. Ransomware Attacks: Malicious software that locks files and demands a ransom.
7. Financial Fraud: Online banking frauds, credit card fraud, and cryptocurrency scams.
Impact of Cybercrime:
Governments and organizations globally are investing in cybersecurity research, laws, and
technologies to counter cybercrime threats effectively.
• Suggests that cybercrimes occur when a motivated offender, a suitable target, and
lack of capable guardianship (such as cybersecurity measures) converge.
• Argues that individuals learn criminal behaviours through association with others
who engage in cybercrime.
• Example: Young hackers may learn techniques from online forums or dark web
communities.
c) Strain Theory
• Suggests that cybercriminals have low self-control and seek immediate gratification
with minimal effort.
• Example: A person commits fraud via phishing emails instead of working for financial
gains.
a) Hackers
b) Cyber Terrorists
d) Insider Threats
e) Script Kiddies
• Cognitive Dissonance: Many justify their actions by believing they cause no real
harm.
• Weak Cyber Laws & Enforcement: Countries with lax cybersecurity policies become
hotspots for cybercriminal activities.
• Globalization & Digital Expansion: More digital transactions create more attack
opportunities.
• Legal Frameworks & Global Cooperation: Laws like GDPR and Interpol’s
cybercrime division help track international cybercriminals.
Jurisdiction refers to the legal authority of a government to enforce laws within a specific
territory. In cybercrime cases, jurisdictional issues arise when:
• A cybercriminal in Russia hacks a company in the U.S., but neither country has an
extradition agreement.
• Some countries treat hacking as a severe crime, while others have lax enforcement.
a) Territoriality Principle
• Countries can claim jurisdiction if the cybercrime occurs within their borders.
• Example: A U.S. company can prosecute an individual for hacking if the attack affected
servers in the U.S.
b) Effects Doctrine
• If a cybercrime harms citizens or businesses within a country, that country can assert
jurisdiction.
c) Nationality Principle
• Countries claim jurisdiction over cybercriminals who are their citizens, even if crimes
occur elsewhere.
• A country may claim jurisdiction if its citizens are victims, even if the attack occurred
elsewhere.
• Example: The U.S. prosecuting foreign hackers who steal American citizens’ financial
data.
• Some crimes, like genocide or war crimes, allow prosecution anywhere in the world.
• Over 65 countries have signed, but Russia, China, and India have not.
• Allows U.S. law enforcement to request cloud data from U.S.-based providers, even
if stored abroad.
• Conflicts with the EU’s GDPR, which restricts cross-border data access.
• Example: The 2020 operation against Emotet malware, involving law enforcement
from 8+ countries.
• Example: The U.S. charged Russian hackers for election interference, but Russia
refused to extradite them.
Tech giants like Google, Microsoft, and Facebook face legal conflicts:
• Governments demand user data for investigations (e.g., Apple vs. FBI case).
• Companies must balance privacy laws (e.g., GDPR) and law enforcement requests.
• Harmonized Cyber Laws: Countries must standardize definitions and penalties for
cybercrime.
Conclusion
• Running online scams, including tech support scams and investment frauds.
Imagine you are typing your email and password to log in to your bank account. If a
keylogger is running on your computer, it records every keystroke and sends it to the
hacker.
Example Scenario
1. Victim's Action:
makefile
CopyEdit
Email: [email protected]
Password: mysecurepassword123
2. Keylogger Records:
css
CopyEdit
mysecurepassword123
3. Hacker’s Access:
o The hacker retrieves this data and uses it to log in to the victim’s bank
account.
Prevention Tips
eCash (Electronic Cash) refers to digital currency systems designed to mimic the
security and privacy of physical cash. It ensures secure, private, and untraceable
transactions using cryptographic techniques.
• The bank creates digital tokens worth $100 and signs them with a blind
signature (a cryptographic technique that ensures the bank doesn’t see the
exact tokens Alice receives).
• Alice sends the $100 digital token to Bob, the bookstore owner.
• Bob verifies the bank’s signature on the token to ensure its authenticity.
• The bank checks that the token is valid and has not been spent before (prevents
double-spending).
✔ Blind Signatures – The bank signs digital money without knowing the exact token
details, ensuring Alice’s privacy.
o Unlike credit or debit cards, prepaid cards are often not directly tied to a user’s
identity.
o Criminals use them for illicit activities such as ransomware payments, human
trafficking, and terrorist financing.
o Prepaid cards can be loaded with cryptocurrency or cash, making them harder
to trace.
o Machine Learning & AI: AI-driven clustering and anomaly detection help
identify suspicious prepaid card transactions.
• Operation Card Shop (FBI, 2012): A crackdown on online forums selling stolen card
data, including prepaid cards.
Conclusion
Prepaid cards present significant challenges for cyber forensic investigators due to their
anonymity and ease of use in financial crimes. However, advanced forensic techniques, AI-
driven analytics, and regulatory measures help in tracking and mitigating cyber threats
associated with prepaid cards.
o Unlike traditional bank cards, SVCs often do not require identity verification.
o They can be purchased in cash and used for illicit activities without leaving a
direct banking trail.
• Global Usability:
o Forensic investigators analyze where and how an SVC has been used.
o Investigating SVC purchases on the dark web for illicit services or stolen data.
o Machine learning models identify unusual spending patterns that may indicate
fraud or money laundering.
• Clustering Analysis:
• Fraudulent Account Creation: Using SVCs to set up fake accounts for scams and
illegal marketplaces.
• Dark Web Transactions: Buying stolen credit card data, hacking tools, or illicit goods
using anonymous SVCs.
• International Collaboration:
• Liberty Reserve Case (2013): Cybercriminals laundered millions using SVCs and
digital currency.
Conclusion
Stored Value Cards present significant forensic challenges due to their anonymity and
flexibility in cybercrime. However, forensic analysts leverage transaction monitoring, link
analysis, AI-based anomaly detection, and regulatory measures to track and mitigate cyber
threats associated with SVCs.
Securing your SMB involves implementing a mix of cybersecurity best practices, policies, and
tools to protect against threats. Here's a structured approach:
• Enforce least privilege access (users only get access to what they need).
• Set up automated backups (3-2-1 backup strategy: 3 copies, 2 media types, 1 offsite).
• Maintain log management & SIEM (Security Information and Event Management).
• Ensure forensic tools are ready for investigation (e.g., Autopsy, Volatility).
• Enforce security policies, including BYOD (Bring Your Own Device) policies.
4. Conflict between national laws – One country may claim jurisdiction based on
the location of the victim, while another may claim it based on the offender’s
location.
Simple Example:
Since multiple jurisdictions are involved, legal conflicts arise over which country has
the right to prosecute, making cybercrime enforcement challenging.
A hacker defrauds victims in two different countries using phishing emails to steal
banking credentials.
• Country A has a strict cybercrime law: The hacker is charged with identity
theft, fraud, and unauthorized access to computer systems, resulting in 10 years
of imprisonment.
• Country B lacks specific cybercrime laws: The hacker is only charged with
general fraud, leading to a fine and 1-year imprisonment.
1. Fraudulent Transactions
• Fake apps: Fraudsters create malicious apps mimicking legitimate payment platforms
to steal credentials.
• Cryptocurrencies, often linked with mobile payments, are used for ransomware
payouts, drug trafficking, and illegal weapon sales.
• This enables them to bypass two-factor authentication (2FA) and gain access to bank
accounts and mobile wallets.
• Cybercriminals use stolen credentials from data breaches to hijack mobile payment
accounts.
• Phishing and Social Engineering: Attackers employ deceptive tactics to trick users
into revealing login credentials, enabling unauthorized access to payment accounts.
• Cryptocurrency Theft: Hacking groups, such as North Korea's Lazarus Group, have
stolen significant amounts of cryptocurrency, allegedly to fund illicit programs.
• Malicious Code Injection: Attackers insert malicious scripts into e-commerce websites
to capture payment information during transactions, leading to large-scale data
breaches.
• Stolen Card Data Usage: Cybercriminals use stolen credit card information to make
unauthorized purchases or sell the data on illicit markets.
Mitigation Strategies
• Use Secure Networks: Avoid conducting transactions over unsecured or public Wi-Fi.
• Implement Strong Passwords: Use unique, complex passwords for different accounts.
By staying vigilant and adopting robust security practices, users and businesses can mitigate
the risks associated with internet payment services.
1. Phishing
• Method: Attackers send fraudulent emails that appear to originate from reputable
sources, such as banks or trusted organizations.
• Example: An email claiming to be from your bank, asking you to verify your account
details by clicking on a provided link.
• Example: A caller pretending to be from the IRS, threatening legal action unless you
provide your Social Security number.
• Method: Fraudsters send deceptive text messages, often containing links or prompts
for immediate action.
• Example: A text message stating you've won a prize, urging you to click a link to claim
it.
Understanding these distinctions is crucial for recognizing and defending against such
attacks. Always verify unsolicited communications and avoid sharing personal information
without confirmation of the sender's legitimacy.
Cyber Terrorism
Cyber terrorism refers to the use of cyberattacks to cause fear, disrupt critical systems, or
harm a nation or organization for political, ideological, or religious motives.
• Once inside the system, the hackers shut down power stations in major cities.
• Hospitals, traffic signals, banks, and emergency services lose power, causing chaos.
Example:
In 2015, Russian hackers attacked Ukraine’s power grid, cutting electricity to 230,000 people
for hours.
• Hard to trace – Terrorists use VPNs, encrypted chats, and dark web tools to hide.
Cyber terrorist groups use ransomware attacks to steal money and fund their activities. They
target governments, businesses, and hospitals, demanding cryptocurrency payments in
exchange for restoring data access.
• The cyber terrorists move the Bitcoin through mixers (like Tornado Cash) to hide the
source.
• They convert the funds into cash, weapons, or further cyber-attack tools.
Phreaking
Phreaking is the act of hacking telephone networks to make free calls, manipulate phone
systems, or explore telecom infrastructure. It was popular in the 1970s-1990s before digital
phone systems improved security.
• In the past, telephone networks used in-band signaling, meaning control signals (used
by the phone company) and voice signals (used by callers) traveled on the same line.
• Specific tones (measured in Hertz) were used to route calls and unlock features.
• Hackers discovered that a 2600 Hz tone could trick the system into thinking the call
had ended, allowing them to seize control of the line.
3. The system dropped the call but left the line open.
4. The phreaker could then enter new tone commands to dial anywhere in the world—
for free!
Example: Steve Jobs & Steve Wozniak (Apple founders) built a Blue Box in the 1970s and used
it to make free long-distance calls.
Modern phone systems use out-of-band signaling (SS7), which separates voice and control
signals, making tone-based hacks ineffective.
Internet Gambling
Internet gambling (also called online gambling) is the act of betting money on games of chance
or skill using websites, apps, or digital platforms. It includes activities like online casinos,
poker, sports betting, and lotteries.
2. They create an account and deposit real money using a credit card, cryptocurrency, or
e-wallet (e.g., PayPal).
3. The Random Number Generator (RNG) determines the outcome (win or lose).
Winning Scenario:
• The player gets three "7" symbols and wins $100, which is added to their balance.
Losing Scenario:
• If the player wins money, they can withdraw funds to their bank account or crypto
wallet (after meeting the casino’s withdrawal conditions).
• Regulations – Some countries ban online gambling, while others regulate it (e.g., the
UK, Malta).
Cybercriminals exploit online casinos, poker sites, and sports betting platforms to clean dirty
money from illegal activities like fraud, drug trafficking, or ransomware payments.
• A criminal has $50,000 in illicit funds (e.g., stolen through ransomware or fraud).
• They create an account on an online gambling site and deposit the money using:
• The criminal plays low-risk bets (e.g., betting on both sides of a sports match).
Example: In 2022, Europol arrested a gang laundering $30 million through online casinos by
placing small bets and withdrawing winnings as legal income.
2. AI & Machine Learning – Detect collusion in online poker and fake betting patterns.
3. IP & Device Tracking – Identify linked accounts used for money laundering.
4. KYC/AML Regulations – Casinos must verify users and report suspicious activity.
Cyber Weapons
Cyber weapons are software or digital tools specifically designed to cause damage, disrupt,
or compromise computer systems, networks, or data. Unlike traditional weapons, cyber
weapons operate in the digital realm, targeting critical infrastructure, governments,
businesses, or individuals. These tools can be used for espionage, sabotage, disruption, or
warfare.
Stuxnet is one of the most famous cyber weapons ever discovered. It was a sophisticated
computer worm believed to be developed by the U.S. and Israel to sabotage Iran's nuclear
program.
• Significance: This was the first publicly known instance of a cyber weapon causing
physical destruction, marking a shift in global cyber warfare strategies.
Conclusion
Cyber weapons have transformed modern warfare and national security. While they offer
strategic advantages, their use raises ethical and legal concerns, as well as the potential for
retaliation and escalation in cyber conflicts.
Cyber Extortion
Cyber extortion is a type of cybercrime in which attackers threaten individuals, businesses, or
governments with digital harm—such as data theft, system shutdowns, or exposure of
sensitive information—unless a ransom is paid. This crime is often carried out through
ransomware, Distributed Denial-of-Service (DDoS) attacks, or data breaches.
3. Data Theft and Blackmail – Hackers steal sensitive data and threaten to release it
publicly.
One of the most devastating cyber extortion cases was the WannaCry ransomware attack,
which affected hundreds of thousands of computers worldwide.
• Target: Over 200,000 computers in 150+ countries, including hospitals, businesses, and
government agencies.
• Impact: It disrupted critical services, including UK’s National Health Service (NHS),
causing appointment cancellations and patient care delays.
Conclusion
Cyber extortion is a growing threat, with attackers leveraging vulnerabilities to hold data or
services hostage. Organizations can mitigate risks through regular security updates,
employee training, and robust backup strategies.
2. Shimming – A more advanced method where a thin chip is inserted into an ATM card
reader to intercept data from chip-based cards.
3. ATM Malware Attacks – Hackers install malware on ATMs to make them dispense
cash without needing a card (also called jackpotting).
6. Card Trapping – The ATM retains a customer’s card due to a tampering device, and
criminals later retrieve it.
The Lazarus Group, a North Korean cybercriminal organization, conducted a massive ATM
cyber fraud operation between 2017 and 2018, targeting banks globally.
• Method Used: The attackers hacked into banks' ATM networks and deployed
malware (like FASTCash) to manipulate ATM transactions.
• Impact:
o Hackers used "money mules" to physically collect cash from infected ATMs.
• Key Target: The attack primarily targeted banks in Asia and Africa due to weaker
cybersecurity defenses.
Conclusion
ATM fraud is an evolving cybercrime that poses serious threats to financial institutions and
customers. Banks and individuals can reduce risks by implementing stronger cybersecurity
measures, using chip-based cards, regularly updating ATM software, and monitoring
transactions for anomalies.