Cyber Crime PDF
Cyber Crime PDF
Phishing has always been prevalent and, at one point, it became the most
significant cybersecurity threat in a year. To combat phishing attacks, security
companies over the years, kept developing new methods, such as hardware-
based authentication and renewed approaches to security-oriented training and
awareness, yet phishing is still effective today and many still fall victim to it.
Another tactic has had widespread success. Hackers are imitating a Skype login
page and are conning users into providing their usernames and passwords, as
they believed they were logging into a legitimate platform. Cybercriminals have
been so successful at this because they are aware that 90% of data breaches are
caused by human error.
The phishing threat has reached an all-new level. Google’s Threat Analysis
Group shared that they blocked 18 million Covid-19 themed emails that
contained phishing links and malware downloads per day (Security Magazine,
2020). This is a staggering number of emails that got caught but there are still
numerous emails that managed to escape cybersecurity nets. To prevent falling
victim to phishing scams, users need to be more vigilant with the links they open
and the files they download.
2. Ransomware Attacks
Ransomware remains one of the biggest threats on the web today. First coming
into the fore in 2017 with the effects of global campaigns Not pets and
WannaCry, reports show that the number of ransomware attacks doubled in
2018, hitting 10.5 billion globally. In the following year, however, that figure
decreased to 9.9 billion (SonicWall, 2020).
The first half of 2020 saw a 200% increase in Business Email Compromise (BEC)
attacks (Bit-defender, 2020). The targets of these cyberattacks were businesses
that frequently dealt with suppliers abroad and who exchange money online.
In the third quarter of 2020, Iran, Bangladesh, and Algeria topped the list of
countries with the most mobile malware attacks. The report shows that 30.29%
of mobile users in Iran experienced a mobile malware attack. Bangladesh and
Algeria follow closely behind, with 17.18% and 16.28%, respectively of mobile
users reporting mobile malware (Secure-list, 2020). Pakistan, which used to be
among the top three countries most afflicted by mobile malware, is no longer
even in the top 10.
Like other kinds of cyber threats, mobile malware is also becoming more
sophisticated. Last 2020, the Microsoft 365 Defender Research Team uncovered
a new Android malware, which was the latest evolution of mobile ransomware
and also much more sophisticated than its predecessors. This malware fully
disabled the use of Android devices and forced individuals to pay the ransom to
gain back control (Microsoft, 2020).
This evolution is not going to halt anytime soon. According to the same research
team, more variants are to be expected in the future. This is due mainly to
machine learning, which feeds the evolution of malware.
To guard against mobile malware, users have to be more mindful of the
websites they the files they download, and the links they click on. It would also
be prudent to install a cybersecurity app to help prevent such attacks.
5. Cyber activism
Cybercrime is no longer just for thieves. Cyber activists are now also
contributing to the vast amount of cybercrimes that happen daily. Modern
activist movements consider cyber activism as a significant milestone. And
according to cybersecurity analysts, hacktivism shows no signs of stopping th is
year and in the years to come.
Cyber activists are the online equivalents of protesters fighting for a particular
agenda. One of their main purposes is to interrupt the website operations of a
company or an organisation as a way of getting across their messages to the
higher-ups. Another motive is to spread awareness about a company’s bad
practices.
One such example of cyber activism is the infamous attack on PayPal and
MasterCard. In 2010, a group of cyber activists who claimed to be part of
Anonymous executed a DDoS attack on PayPal in response to PayPal’s shutdown
of payment services to WikiLeaks. Cyber activism is expected to grow in the
coming years and affect business sales and revenues.
6. AI and IoT in Cybercrime
AI goes both ways in cyberspace: it can both be a blessing and a curse. With the
advent of IoT devices, AI is predicted to commit more cybercrimes than actual
people in the year 2040. AI and IoT are gradually making things easier for
cybercriminals. Any device that can be connected to the Internet carries the risk
of getting hacked. And with the rapid growth of the technological
advancements in the AI aspect, IoT devices are facing security issues that seem
to have no solutions as of yet.
Even the United Nations Interregional Crime and Justice Research Institute
(UNICRI) have begun looking into the advanced understanding of AI applications
for criminal justice and crime prevention. But while AI could prevent and deter
crimes, the risk lies in the system that can pose a global security threat if left
alone with its machine-operated directives.
7. Supply Chain Attacks
While supply chain attacks are not the most common cybercrime, they are still
extremely damaging. These can occur when cybercriminals find a weakness or a
number of vulnerabilities in an organisation’s ecosystem, particularly through
third-party systems. This is fuelled by the sudden surge of digitalisation, the rise
in remote work, and the growing number of connected devices. Because of these
drivers, cybercriminals are able to exploit more entry points in the supply chain
(World Economic Forum, 2021).
A most damaging supply chain attack happened to Solar Winds in 2020. The
company deals in system management tools that are widely used by IT
professionals, the most popular of which is Orion NMS. Hackers exploited the
configurations of the software, particularly its integrations. They inserted
malware into SolarWinds’s servers, which was packaged as part of an update.
This effectively allowed the threat group to get inside the systems of all
organisations using Orion NMS, among which are the US Department of Defence
and 425 names in the US Fortune 500 (SANS Institute, 2020).
8. Data Breaches
Data breaches happen daily, and it is one of the biggest cyber threats
on the web today. Every year, the number of data breaches continues
to increase. Just between January and September 2019, more than 7.9
billion data records were breached. This figure was a 33% increase
from 2018.
But while organisation’s have taken steps to better secure their data,
data breach incidents still increased in 2020. In the first quarter of
2020 alone, there was a 273% rise in incidents. From this alone, we
can surmise that data breaches are most likely going to continue and
may become more damaging in the coming years. (IdentityForce,
2020).
9. Crypto jacking
There are three reasons why crypto jacking will continue to thrive ahead:
While targeted attacks are not exactly new in the cybercrime scene, it is no less
threatening than the existing types of cyberattacks. Targeted threats are crime-
ware designed for specific industries or corporations, and with its ability to
capture sensitive information, it continues to become a major concern for most
organisations.
In 2019, the Asia-Pacific region experienced the most targeted cyber attacks in
the corporate or internal network (75%). Meanwhile, though Latin America did
not suffer much from the same kind of cybercrime (25%), the region’s IT
environments were most hurt in the eCommerce sector (75%) (Trust wave,
2020). The following year, it was observed that Brazil was the most targeted
country in Latin America for cyberattacks, with 55.97% of users hit by
cybercriminals (Mondo en Lines, 2020)
The value of bitcoin more than doubled in 2019. In the coming months, it could
rally even higher than the $12,902 level in June of the same year. And because
of its value, anonymity, and decentralised system, cybercriminals are naturally
drawn to it. It became the preferred currency of dark-net criminals and thus
increased the number of cryptocurrency malware. In 2017, Malware bytes, an
anti-malware software company, reported having to stop 250 million attempts
to infect PCs with coin-mining malware in just one month.
Bitcoin popularity trends highlights
For the first time, DDoS attacks breached the 10 million mark for annual attacks
in 2020. This figure is almost 1.6 million higher than the 2019 count. An IT
security organisation observed that the rate of DDoS attacks started increasing
in March of 2020, which coincides with the outbreak of the COVID-19 pandemic.
During that period, the month of May saw the most attacks with 929,000
recorded. Sectors most affected by these attacks are commerce, online learning,
healthcare, and broadband providers (NET-SCOUT, 2021). The surge in such
attacks can also be attributed to the sudden jump in digitisation or reliance on
online services for business continuity.
Distributed denial of access attacks trends highlights
In 2021, this is a trend that will be seen often, considering that there are many
new, cheap software in the market. While they may seem cost-effective, they
can hide vulnerabilities like open-source components that can be exploited by
cybercrooks easily. Thus, it is important that organisations ensure that they are
dealing with vendors that are transparent with the use of open-source elements
for active prevention.
Business email compromise trends highlights
Social engineering attacks can affect businesses of all sizes, and that is still true
in 2019, especially with the amount of trust businesses and individuals place on
online communication. Computer-based social engineering, which includes
phishing campaigns, baiting, and clicking on malicious links, remains prevalent
in today’s highly digital era. Even the best cybersecurity software
companies would admit that social engineering in cybercrime is still a major
concern.
Because of the rise of RDPs, this year saw a decline in automated attack
toolkits. Designed to exploit vulnerabilities in widely used software, automated
attack toolkits are now being replaced by RDP attacks. RDP credentials can give
attackers remote access to a corporate environment, which further leads to a
network search of intellectual properties or crypto-lock systems.
Thus, RDP is now becoming a common method for cybercriminals to gain access
to systems and data, with their targets usually small and medium-sized
businesses (SMBs). According to Beasley, about 71 percent of ransomware
attacks target SMBs, and RDP usually acts as an attack vector to further launch
a ransomware attack.
As it is with the proverbial coin, there are two sides to cyberspace. Cyberspace is
a great place for commerce, societal advancement, and innovation. However,
the same place harbours hooks who are ready to pounce any chance they get.
Advanced technology and systems give an edge to businesses and organisations,
but it means newer and more advanced methods for cybercriminals to attack
too, leading to a marked increase in dangerous cybercrime trends.
Cybercrime presents the trickiest types of criminals to deal with. Armed with
sophisticated tools of the trade, they are getting more audacious every day,
threatening businesses of all sizes. Bigger r have deeper pockets for more
advanced security tools to face cyber threats, but small business enterprises are
not always so lucky. Thus, staying aware and vigilant at all times can go a long
way in preventing these cyberattacks from occurring, and it is also helpful to
know what IT security solutions are perfect to protect your site.
References:
1. AS (2020). Anonymous: Who are They and Why are They Threatening
Trump? AS
2. CDC. (2020). COVID-19-Related Phone Scams and Phishing Attacks. CDC
3. Cloud tic. (2020). Cybersecurity statistics in the first half of 2020.
4. IdentityForce. (2020). 2020 Data Breaches: The Most Significant Breaches
of the Year. IdentityForce
5. Info sec. (2020). Top 9 Cybercrime Tactics, Techniques and Trends in 2020:
A Recap.
6. Munro en Lines. (2020). Kaspersky: Businesses are the main target of
cyberattacks in Latin America.
7. Nets out. (2020). DDoS Attacks in 2020.
8. SANS Institute. (2020). What You Need to Know About the SolarWinds
Supply-Chain Attack. SANS Institute
9. Secure-list. (2020). IT Threat Evolution Q3 2020 Mobile Statistics.
10. Security Magazine. (2020). How Hackers are Using COVID-19 to Find
New Phishing Victims. Security Magazine
11. SonicWall. (2021). 2021 SonicWall Cyber Threat Report. SonicWall
12. Sophie. (2020). The State of Ransomware 2020.
13. Trust wave. (2020). 2020 Trust wave Global Security Report.
14. World Economic Forum. (2021). These are the Top Cybersecurity
Challenges of 2021. World Economic Forum
WHAT ARE THE CATEGORIES OF CYBER CRIME?
Cyber crimes are categorised into three broad categories,
individual, property and government. Based on each category
of cyber crime, cybercriminals use different levels and types of
threats.
In this Age of Technology and easy access to the internet, anyone can
easily reach it. Because of this fast pace growth from the previous decade.
Besides, the internet has opened a world of information on which anyone
can connect.
Due to, this the rate of crime especially the rate of Cyber Crime has
increased much fold. Moreover, the rate of circulation of data is also
increased much fold due to the higher speed of internet. Above all, due to
all these issues, the Cybersecurity has become a major concern for society.
Laws related to Cyber Crimes
Listed below are some of the ways to fight different types of cybercrime:
Updating your operating system and software: The latest security
patches for your computer are only available if you keep your
software and operating system up to date.
information.
Contact the companies directly if you notice suspicious requests from
anyone claiming to be calling on their behalf.
Be mindful about the URLs (websites) you open: Check the URLs that
you’re visiting. Do not click on links that have URLs that are strange
or unfamiliar. Before making any financial transactions online, check
to see if your internet security software includes transaction security
functionality.