ABSTRACT
In today’s tech world, different types of cybercrime are on the rise. World Wide Web
criminals exploit the personal information of Internet users for their own gain.
They delve deep into the dark web to buy and sell illegal products and services.
You can also access classified government information. Cybercrime is at an all-
time high, costing businesses and individuals billions of dollars each year. Even
more frightening is that this figure is only for the last five years and there is no
end in sight. Technological developments and increased access to smart
technology mean that users’ homes have multiple access points for hackers to
exploit. Criminals continue to take advantage of the anonymity of the Internet to
proliferate as law enforcement seeks to address a growing problem.
Defining cybercrime
Cybercrime in the united states and in general Cybercrime is defined as a crime in which a computer is the target of a crime or is
used as a tool to commit a crime. Cybercriminals can use your device to access
your personal, sensitive business, and government information, or even disable
your device. Selling or soliciting any of the above information online is also a
cybercrime.
History of Cybercrime
Malicious connections to hacking were first documented in the 1970s when early
computerized telephones were targeted. Tech-savvy people are known as “phreakers”
have found a way to pay for long-distance calls using a series of codes.
organized cybercrime is a relatively new term as compared to malicious
connections .
They were the first hackers to learn how to exploit the system, modifying hardware and
software to steal time on long-distance calls. This has made people realize that
computer systems are vulnerable to criminal activity, and as systems become
more complex, they become more vulnerable to cybercrime.
The Electronic Frontier Foundation was established to respond to threats to public
liberties that arise when law enforcement errs or engages in unnecessary activities
to investigate cybercrime. Their mission was to protect and defend consumers
against unlawful prosecution. It was helpful, but it also opened the door to hacker
loopholes and anonymous surfing where many criminals offer illegal services.
Cybercrime Types
Categories of Cybercrime falls into three main categories: personal,
property, and government. The methods and difficulty used vary by category.
PERSONAL- Cybercrime identity theft
This is similar to real-life cases where criminals illegally
possess someone’s bank or credit card details. Hackers steal someone’s banking
information to access funds, make online purchases, or carry out phishing scams
to trick people into revealing their information. Malicious software could also be
used to access her website containing sensitive information.
INDIVIDUAL
In this category of cybercrime, individuals spread
malicious or illegal information online. This includes cyber stalking, distribution
of pornography, and human trafficking.
GOVERNMENT
This is the least common form of cybercrime, but it is
also the most serious. Crimes against governments are also known as cyber
terrorism. Government cybercrime includes hacking of government his website
and military website, spreading propaganda. These criminals are usually terrorists
or hostile governments of other countries.\
Here are 5 of the top cybercrimes affecting businesses and individuals in
2022:
A. Phishing Scams
B. Website Spoofing
C. Ransom ware
D. Malware
A. PHISHING SCAMS
In this type of attack, hackers send malicious email
attachments or URLs to users to gain access to their accounts or computers.
Cybercriminals are becoming more and more established, and many of these
emails are not marked as spam. Users are tricked into emails claiming they need
to change their password or update their billing information, giving criminals
access.
B. WEBSITE SPOOFING
The word spoof means to deceive. Website spoofing is
when a website is designed to look like the real her website, tricking users into
believing it is a genuine her website. This is done to gain trust, gain access to
systems, steal data, steal money, or distribute malware.
Website spoofing works by duplicating the legitimate website using the style,
branding, user interface and even domain name of a large company and tricking
users into entering usernames and passwords. This is how criminals can get your
data or place malware on your computer.
Fake websites are usually used in conjunction with emails that link to illegal
websites. As of August, of last year, spoofing and phishing have cost businesses
up to $354 million.
C. RANSOMWARE
Ransomware is a modern twist on the age-old crime of
extortion. Essentially, ransomware works when criminals steal something of great
value and demand payment for it. For most companies, this means encrypting
corporate data. When ransomware strikes, businesses come to a halt and
employees can’t do their jobs. Without recoverable backup data, companies are
generally at the mercy of attackers, who hold data hostage in exchange for
decryption keys that can be purchased with Bitcoin.
Ransomware has grown into its own malware category and is a top concern for
all businesses. Ransomware attacks are up 13% over the past five years
combined, according to new research.
D. MALWARE
Norton defines malware as “malicious software” specially
designed to access or damage your computer. With Ransomware, the goal is to
hold your data hostage, but that’s not all. Malware has multiple goals: power,
influence, money, and information, but the result is always the same.
TYPES OF CYBERCRIMES
BOTNETS
A botnet is a network of compromised computers controlled
externally by remote hackers. Remote hackers spam or attack other computers
through these botnets. Botnets can also act as malware and be used to perform
malicious tasks.
STALKING
This type of cybercrime involves online harassment, exposing
users to a flood of online messages and emails. Cyberstalkers typically use social
media, websites, and search engines to intimidate and intimidate users. Cyberstalkers usually know their victims and want to scare them or worry about their
safety.
SOCIAL ENGINEERING
Using social engineering, criminals usually contact you
directly by phone or email. They want to earn your trust and usually pretend to be
customer service representatives so they can give you the information they need.
This is typically your password, the company you work for, or bank information.
Cybercriminals will try to find out everything they can about you on the internet
and add you as a friend on your social accounts. Once they have access to your
account, they can sell your information or protect your account on your behalf.
PROHIBITED / ILLEGAL CONTENT
In this cybercrime, criminals share and disseminate
inappropriate content that is considered highly distressing and offensive.
Objectionable content includes, but is not limited to, adult sex acts, videos of
extreme violence, and videos of criminal activity. Illegal content includes content
advocating terrorism and child exploitation. This kind of content exists both on
the everyday Internet and on the dark web, an anonymous network.
PRINCIPLE ELEMENTS OF CYBERSECURITY STRATEGY
BE SMART WITH DEVICES
Inadequately accessible computers, smartphones,
tablets, and social media sites are also avenues for bad actors to steal data. It’s not
a perfect doomsday scenario. Every device or website usually comes with
security controls in the form of PINs, passwords, and control over who sees the
content. Brush up on your security features and use them to your advantage. And
finally, be smart. Do not share passwords, codes, or pins with anyone.
BE CAREFUL IN PUBLIC
Free WIFI in shops, restaurants, and other public
places is free, but it can have side effects. In other words, even free can cost you if
you’re not careful.
Remember: If you are free, blackmailing actors is also free. Be careful when
entering personal information, using apps with passwords, or entering login
credentials, as hackers can see what you do. The best advice is to avoid public his
Wi-Fi or enter data that can be compromised.
DON’T PHISH
Beware of a saying as old as the hills: If it doesn’t seem to be true, it probably is.
The same applies if a link, text, email, online advertisement, or website looks
appealing but questionable. Beware of any type of call requesting personal
information, including calls from credit card companies.
SUBMITTED BY
MS. VAISHNAVI KRUSHNA PARATE Intern at Fastrack Legal Solutions