Tools and Methods used in Cybercrime
Tools and Methods used in Cybercrime
used in Cybercrime
Mrs. Prajakta Gadre
Proxy Server
A proxy server is a system or router that provides a gateway between users and the internet. Therefore, it
helps prevent cyber attackers from entering a private network.
It is a server, referred to as an “intermediary” because it goes between end-users and the web pages they
visit online.
When a computer connects to the internet, it uses an IP address. This is similar to your home’s street
address, telling incoming data where to go and marking outgoing data with a return address for other
devices to authenticate.
Anonymizers
An anonymizer is a proxy server that makes Internet activity untraceable. An anonymizer protects personally
identifying information by hiding private information on the user’s behalf.
When users anonymize their personal electronic identification information it can enable:
● Risk minimization
● Taboo electronic communications
● Identity theft prevention
● Protection of search history
● Avoidance of legal and/or social consequences
● Phishing-1996
● Phishing is an attack using mail programs to cheat internet users
and disclosing confidential information that can be used for illegal
purpose.
● Phishing is the most common type of social engineering, which is a general
term describing attempts to manipulate or trick computer users.
● Social engineering is an increasingly common threat vector used in almost all
security incidents.
● Social engineering attacks, like phishing, are often combined with other
threats, such as malware, code injection, and network attacks.
How does phishing work?
● Planning
● Setup
● Attack
● Collection
● Identity theft and fraud
Phishing Techniques
Spear Phishing: Spear phishing attacks are targeted to a particular individual or
small group.
Vishing: Vishing or “voice phishing” is a phishing attack performed over the phone. I
Smishing: Smishing is a phishing attack performed using SMS text messages.
Whaling: Whaling attacks are a particular type of spear phishing attack focused on
high-level executives.
Clone Phishing: Clone phishing involves sending a user a phishing email that mimics
an email that they have previously received.
SEO Poisoning: Some phishing attacks direct users to malicious websites by
manipulating the output of common searches.
Business Email Compromise (BEC): BEC attacks — also known as CEO fraud —
involve the attacker impersonating the CEO or a high-level executive. The attacker
then instructs another employee to take some action, such as sending money to
the attacker’s bank account.
Spam: Spam includes unwanted emails that are designed to steal money or sensitive
data from their target.
Password cracking
It takes the information and sends it to a hacker using a command-and-control (C&C) server.
The hacker then analyzes the keystrokes to locate usernames and passwords and uses them to
hack into otherwise secure systems.
It’s important to protect yourself from keylogger attacks used by malicious users. Because
keyloggers can record and quickly identify sensitive information, they are a significant threat to
cybersecurity.
Methods of Keyloggers
Software keyloggers
Software keyloggers consist of applications that have to be
installed on a computer to steal keystroke data. They are the
most common method hackers use to access a user’s
keystrokes.
Hardware keyloggers
A hardware keylogger works much like its software
counterpart. The biggest difference is hardware keyloggers
have to be physically connected to the target computer to
record the user's keystrokes.
Anti Keylogger
Spywares perform the function of maliciously tracking a user’s activity, having access
to data, or even resulting in the crashing of the computer/ laptop system. Spyware in
many cases runs as a background process and slows down the normal functioning of
the computer system.
Types of spyware
● Adware: It is a type of Spyware that keeps track of the user’s activity and gives advertisements based
on the tracked activity of the user.
● Tracking Cookies: It is a type of Spyware that tracks a user’s activity and supplies the same to third
parties.
● Trojans: It is a type of Spyware that is the most dangerous. It aims to steal confidential user
information such as bank details, passwords and transfers it to a third party to perform illegal
transactions or frauds.
● Keyloggers: It is a type of Spyware that keeps a track of all the keystrokes that the user enters
through the keyboard. It is dangerous as it contributes bro cyber fraud where sensitive passwords can
be stolen by keeping an eye on the user who entered the information.
● Stalkerware: It is a type of Spyware that is installed on mobile phones to stalk the user. It tracks the
movement of the user and sends the same to the third party.
● System Monitor: It is a type of Spyware that monitors and keep a track of the entire system including
Prevention
A computer virus is a program that spreads by first infecting files or the system areas of
a computer or network router's hard drive and then making copies of itself. Some
viruses are harmless, others may damage data files, and some may destroy files.
A virus is simply a computer program--it can do anything that any other program you run on
your computer can do. Some viruses are designed to deliberately damage files, and others
may just spread to other computers.
Types of Viruses
Worms
A worm virus refers to a malicious program that replicates itself, automatically spreading through a
network.
The worm virus exploits vulnerabilities in your security software to steal sensitive information, install
backdoors that can be used to access the system, corrupt files, and do other kinds of harm.
● Classification of worms
○ Email-Worm
○ IM-Worm-Instant Messenger
○ IRC-Worm-Internet Relay Chat (IRC)
○ Net-Worm
○ P2P-Worm
Difference
Trojan Horses
It is a code that is malicious in nature and has the capacity to take control of the computer. It is designed to steal, damage, or do
some harmful actions on the computer.
Features of Trojan Horse
● It steals information like a password and more.
● It can be used to allow remote access to a computer.
● It can be used to delete data and more on the user’s computers.
The most basic prevention method: –
● Do not download anything like the images, and audios from an unsecured website.
● Do not click on the ads that pop up on the page with advertisements for online games.
● Do not open any attachment that has been sent from an unknown use.
● The user has to install the anti-virus program. This anti-virus program has the capacity to detect those files which are
affected by a virus.
Some Examples
Backdoors allow the attackers to quietly get into the system by deceiving the security
protocols and gain administrative access.
It is similar to the real-life robbery in which burglars take advantage of the loopholes in a
house and get a 'backdoor' entry for conducting the theft.
the cyber attackers could perform various horrendous tasks like injecting spyware, gaining remote
access, hack the device, steal sensitive information, encrypt the system through ransomware, and
many more.
Backdoors are originally meant for helping software developers and testers, so they are not
always bad.
Prevention
Digital watermarking is the process of possibly irreversibly embedding information into a digital
signal.
Types of Steganography
Types of Steganography
Text steganography − It includes hiding data within the text files. In this approach, the secret information is
hidden behind each nth letter of each words of text message. Numbers of approaches are available for hiding
information in text file.
Image steganography − It can hiding the information by taking the cover object as image is defined as image
steganography. In image steganography, pixel intensities are used to conceal the data.
Audio steganography − Audio Steganography is the technology of embedding information in an audio channel. It
can be used for digital copyright security.
Watermarking is an approach which hides one piece of information [message] in another element of information
[carrier]. It is generally used for applications including audio clip etc.
Types of Steganography
Video steganography − It is an approach of concealing some kind of documents or information into computer
video format. In this method, video (set of pictures) can be used as carrier for hiding the information.
Generally discrete cosine transform (DCT) insert the values (such as 8.667 to 9) which can be utilized to conceal the
data in each of the images in the video, which is unnoticeable by the human eye. H.264, Mp4, MPEG, AVI are the
layout used by video steganography.
Network or protocol steganography − It includes hiding the information by creating the network protocol
including TCP, UDP, ICMP, IP etc. as cover object. In the OSI layer network model there happen covert channels where
steganography can be utilized.
Stagnanalysis
● Bandwidth attacks
● Logic attacks
● Protocol attacks
● Unintentional attacks
DDoS
a DDoS attack is like an unexpected traffic jam clogging up the highway, preventing
regular traffic from arriving at its destination.
Botnet
● Router filters
● Disable unused network services
● Examine physical security
● Use tool to detect configuration change
● Regular backup schedule
● Password policies
SQL Injection
SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the
queries that an application makes to its database. This can allow an attacker to view data that
they are not normally able to retrieve.
A successful SQL injection attack can result in unauthorized access to sensitive data,
such as:
● Passwords.
● Credit card details.
● Personal user information.
Prevention from SQL Injection
Define :
1. Rainbow table
2. Anti Keylogger
3. Stagnanalysis
4. Anonymizers
5. spyware