Cyber Crime
Contents
Introduction of Cyber Crime
Easily, we can say that cybercrime is defined as illicit conduct committed using a computer as either a tool, a target, or both. Cyber Crimes can include classic criminal behaviors including theft, fraud, forgery, defamation, and mischief, all of which are punishable under the Indian Penal Code. The abuse of computers has also given rise to a slew of new-age crimes, addressed under the Information Technology Act of 2000.
We may categorize cyber crimes in two ways.
- Computer as a Target: Using a computer to attack other computers.
Examples include hacking, virus/worm assaults, and DOS attacks.
- Computer as a weapon: Using a computer to perform real-world crimes.
For example, cyber terrorism, IPR infringement, credit card fraud, EFT fraud, pornography, etc.
Cybercrime involves a multitude of actions. Cybercrime may be split into three primary categories:
- Harassment is an example of a cyber crime against people that occurs in or through the internet. Harassment might be sexual, racial, religious, or otherwise.
- Cyber crime against property includes computer wreckage (the destruction of others’ property), the delivery of destructive programs, unauthorized trespassing, and the unauthorized possession of computer information.
- As cyber crimes against the government, such as cyber terrorism.
There are some Cyber Crimes.
- Child pornography, also known as child sexually abusive material (CSAM), is material that contains sexual pictures of a kid who has been harmed or exploited.
- Cyberbullying is a type of harassment or bullying that occurs via the use of electronic or communication equipment such as computers, mobile phones, laptops, and so on.
- Cyberstalking is the act of persistently contacting or attempting to contact another individual despite their lack of interest or consent.
- Cyber grooming is the act of befriending and forming an emotional connection with a youngster to sexually abuse them.
- Online Job Fraud: Scammers place fraudulent job adverts on job boards and other media platforms to trick job searchers into paying for a job that does not exist.
- Online sextortion is the act of threatening to expose sexually explicit photos or videos of someone unless they pay a ransom.
- Phishing is the act of sending false emails or messages that appear to be from a reputable source to fool individuals into disclosing personal information such as passwords, credit card details, etc.
Examples of cybercrimes.
Malware attacks
A malware assault occurs when a computer system or network becomes infected with a computer virus or another sort of malware. In the realm of digital malfeasance, cybercriminals often exploit the vulnerabilities of malware-infected machines to pursue a myriad of nefarious objectives. These include stealing private data, exploiting the computer to commit other crimes, or causing data loss.
The infamous WannaCry ransomware rampage, unleashed globally in May 2017, stands as a poignant reminder of the havoc wrought by malware incursions, etching its mark as a landmark event in the annals of cyber warfare.. WannaCry is a sort of ransomware, which is software designed to extract money from victims by encrypting their data or devices. The malware exploited a Microsoft Windows vulnerability.
At the height of its rampage, the WannaCry ransomware contagion swiftly infiltrated and compromised an astounding 230,000 systems across a staggering expanse of 150 countries, leaving a trail of digital devastation in its wake. Users were locked out of their files and received a message demanding a Bitcoin payment to restore access.
Worldwide, the WannaCry cyberattack is believed to have cost $4 billion in financial losses. To this day, the attack is notable for its sheer scale and effect.
Phishing
A phishing campaign occurs when spam emails or other kinds of contact are delivered to deceive users into doing something that compromises their security. Within the deceptive folds of phishing campaigns lie cunning messages, often laden with infected attachments or tantalizing links to malicious websites. Alternatively, they may cunningly coax recipients into divulging sensitive information under the guise of urgency or false pretenses.
A well-known example of a phishing fraud occurred during the World Cup in 2018. Our research unveiled a sinister scheme during the 2018 Fraud World Cup, where cybercriminals unleashed a wave of World Cup-themed phishing scams tailored to ensnare unsuspecting football aficionados. These deceptive emails cunningly targeted the passion of fans, luring them into a trap of deceit and potential digital peril. These spam letters attempted to attract supporters with false free vacations to Moscow, where the World Cup was being held. Individuals who opened and clicked on the links in these emails had their personal information taken.
Another form of phishing effort is spear-phishing. These are targeted phishing attempts that attempt to deceive certain personnel into jeopardizing the security of the organization for which they work.
Unlike bulk phishing efforts, which have a fairly generic style, spear-phishing messages are often designed to appear to be from a trustworthy source. For example, they are designed to appear to have come from the CEO or the IT manager. They may not have any visible cues that indicate they are false.
Impact of cybercrime in India
- Cyber crime has had a huge influence on India’s economy and culture. According to Norton Cyber crime research, 30 million Indians were victims of cyber crime in 2011, costing the Indian economy $7.6 billion annually. In 2019, cyber crime in India cost Rs. 1.25 lakh crore, placing India second among nations impacted by cyberattacks between 2016 and 2018. Cyber crime may inflict direct monetary losses, undermine customer trust, and harm businesses and financial institutions’ reputations.
- In India, cyber crime is widely divided into two types: cyber crime which targets computers, and cyber crime which utilizes computers to perform other crimes. Cyber crimes in India include child pornography, cyberbullying, cyberstalking, online job fraud, phishing, and data breaches.
- If you have been a victim of cyber crime, you can report it online using India’s National Cyber Crime Reporting Portal 4. For more assistance, contact the Indian Computer Emergency Response Team (CERT-IN or ICERT).
How to defend oneself from cybercrime:
- Consider adopting a full-service internet security suite: such as Norton 360 with LifeLock Select, which offers all-in-one protection for your devices, online privacy, and identity, as well as helping secure your private and financial information when you go online.
- Use strong passwords: Do not use the same password on many websites, and change your passwords frequently. Make them more complicated by combining at least ten characters, numbers, and symbols. A password management program can help you keep your credentials secure.
- Keep your software up to date: This is especially critical for operating systems and internet security applications. Cybercriminals typically get access to your system by exploiting known software weaknesses.
- Be wary of strange emails and messages: Don’t click on links or download files from unfamiliar sources. If you get an email or communication that appears questionable, check the sender’s identification before taking any action.
- Use a secure internet connection: With a strong encrypted password and a VPN (Virtual Private Network), you can safeguard your online identity and data from hackers.
- Take care with your personal information: Avoid giving out important information such as your social security number, credit card information, or bank account information online.
- Educate Yourself: Stay up to date on the newest cyber risks and how to recognize them. This might help you make proactive efforts to safeguard yourself from cybercrime.
Individual Hackers: Among the shadows of cyberspace lurk individuals driven by diverse motivations—be it personal gain, the adrenaline rush of thrill-seeking, or unwavering ideological fervor. Operating in the digital realm, they traverse the landscape as lone wolves or band together as formidable cohorts within organized hacking syndicates, each pursuing their own agenda with calculated precision.
Organised Crime Syndicates: These organisations are usually involved in sophisticated cybercrime operations including identity theft, financial fraud, ransomware attacks, and selling stolen data on the dark web.
Nation-State Actors: Within the realm of digital conflict, government agencies and military units orchestrate state-sponsored cyber espionage and warfare endeavors, driven by the imperative to gather intelligence, sow disruption within critical infrastructure, or engage in covert operations aimed at advancing political or economic agendas. These clandestine maneuvers unfold within the intricate web of global cyberspace, shaping the geopolitical landscape with each keystroke and algorithmic incursion.
Insiders: Employees or insiders within organisations can commit cybercrime by using their access rights to steal sensitive information, disrupt systems, or commit fraud.
Cyber terrorists: Individuals or organisations may use cyberterrorism to disrupt, terrorise, or damage vital infrastructure, government institutions, or civilian populations.
Increased Connectivity: The proliferation of internet-enabled devices, as well as the expanding interconnectedness of systems and networks, have increased cybercriminals’ attack surface, opening up new options for exploitation.
Sophisticated Techniques: Cybercriminals are constantly developing and using new tools, such as ransomware, phishing, and social engineering, to circumvent security measures and attack individuals, organisations, and vital infrastructure.
Monetary Gain: Many cybercriminals are motivated by monetary gain. Cybercrime provides profitable possibilities to steal sensitive data, engage in fraudulent operations (such as online frauds and identity theft), and extort victims via ransomware attacks.
Anonymity and Global Reach:Empowered by the veil of anonymity bestowed by the internet, cybercriminals navigate effortlessly across borders, shielded from the prying eyes of law enforcement. This cloak of invisibility renders detection a formidable challenge, emboldening offenders to orchestrate their nefarious schemes with impunity. As a result, law enforcement authorities grapple with the daunting task of apprehending and penalizing these elusive perpetrators, whose virtual footprints blur across the global digital landscape.
Emerging Technologies: Cryptocurrencies and the dark web give cybercriminals with tools and venues for carrying out illegal operations while disguising their identities and transactions.
Insufficient Cybersecurity Measures: Inadequate cybersecurity measures, such as obsolete software, weak passwords, and a lack of security knowledge among users, create vulnerabilities that hackers can utilise to access systems and networks.
State-Sponsored Activities: Nation-states use cyber espionage, cyber warfare, and cyberterrorism to acquire intelligence, damage opponents’ infrastructure, and achieve geopolitical goals, all of which contribute to a rise in cyber risks.
Exploitation of Supply Chain Weaknesses: In the intricate web of supply chains, cybercriminals strategically exploit vulnerabilities, honing in on unsuspecting third-party vendors and service providers. Through these gateways, they clandestinely infiltrate larger networks and organizations, gaining unauthorized access with calculated precision. This insidious tactic underscores the critical importance of fortifying the entire supply chain ecosystem against digital incursions, as the repercussions of a single breach reverberate far beyond its initial point of entry.