Module 2
Module 2
cyber crimes can be classified under three heads, depending on the groups they are targeted at.
1. Cyber crime against Individual
▪ Email spoofing: A spoofed email is one in which the e-mail header is forged so
that the mail appears to originate from one source but actually has been sent
from another source.
▪ Spamming: Spamming means sending multiple copies of unsolicited mails or
mass e-mails such as chain letters.
▪ Cyber Defamation: This occurs when defamation takes place with the help of
computers and/or the Internet. E.g. someone publishes defamatory matter
about someone on a website or sends e-mails containing defamatory
information.
▪ Harassment & Cyber stalking: Cyber Stalking Means following an individual's
activity over internet. It can be done with the help of many protocols available
such as e- mail, chat rooms, user net groups.
2. Cyber crime Against Property
▪ Credit Card Fraud: As the name suggests, this is a fraud that happens by the use
of a credit card. This generally happens if someone gets to know the card number
or the card gets stolen.
▪ Intellectual Property crimes: These include Software piracy: Illegal copying of
programs, distribution of copies of software. Copyright infringement: Using
copyrighted material without proper permission. Trademarks violations: Using
trademarks and associated rights without permission of the actual holder. Theft
of computer source code: Stealing, destroying or misusing the source code of a
computer.
▪ Internet time theft: This happens by the usage of the Internet hours by an
unauthorized person which is actually paid by another person.
3. Cyber crime Against Organization
▪ Unauthorized Accessing of Computer: Accessing the computer/network
without permission from the owner. It can be of 2 forms: a)
Changing/deleting data: Unauthorized changing of data. b) Computer
5. Online Grooming: Predators may use online platforms to groom children for sexual
exploitation. They build trust with the child and gradually manipulate them into
sharing personal information or engaging in inappropriate activities.
6. Child Pornography: The distribution, possession, or creation of child pornography is
illegal and exploits children. Criminals often use the internet to share such material.
7. Online Trafficking: Human traffickers may use the internet to lure and exploit women
and children, including for purposes of forced labor or sexual exploitation. Online
platforms can be used to recruit victims.
8. Cyberstalking: This involves persistent and unwanted online attention, often leading
to fear or emotional distress. Women and children can be targeted by cyberstalkers
who may threaten or harass them through digital means.
9. Financial Fraud: Women can also be victims of financial fraud, including online scams
targeting personal finances or online dating scams where perpetrators exploit
emotional connections for financial gain.
10. Privacy Violations: Privacy breaches can occur when personal information or
photographs are shared without consent, affecting both women and children. This can
lead to identity theft or other forms of cybercrime.
▪ To combat cybercrimes against women and children, various organizations and
governments have implemented laws and initiatives aimed at raising awareness, providing
support to victims, and prosecuting offenders.
Financial frauds
▪ Financial frauds can have devastating consequences for individuals and the economy as a
whole. While digital payments have made life convenient and easy In India, they have also
made us prone to all kinds of financial frauds.
▪ Ponzi Schemes: A Mirage of False Promises
• Ponzi schemes lure investors with promises of unusually high returns in a short period.
The fraudsters use funds from new investors to pay off earlier investors, creating a false
illusion of profitability.
• One infamous example is the Saradha chit fund scam, where millions of investors lost
their hard-earned money. The group, consisting of over 200 private companies, falsely
portrayed its collective investment schemes as chit funds.
• With an estimated collection of ₹200 to 300 billion (US$4–6 billion), the scheme
managed to attract deposits from more than 1.7 million individuals before its eventual
downfall.
▪ Identity fraud
• Identity fraud is common on Internet. Criminals have a few options when it comes to
stealing your sensitive information.
• They might target you with a phishing attack where they email, call, or text pretending
to be from your bank. Or, they could target you with a cyber attack to get you to install
malware on your devices that steals your logins and passwords.
• How do you know you're being targeted?
− Unfamiliar transactions on your credit card.
− Strange charges on your bank statements.
− New credit cards or loans in your name.
− Missing or error-filled tax returns.
− Calls from debt collectors about purchases you didn’t make.
− A drop in credit score.
− Bounced checks.
▪ Fraudulent charities
• Scammers use philanthropy as fraud, too. Charity fraud entails creating a fake charity and
collecting “donations” that disappear along with the thief
• How does charity fraud happen?
− Scammers create fake charities — like military veteran charities — that sound like
ones you know and trust. These scams are especially common during natural
disasters or international news events.
• What are the warning signs?
− Claiming that you’re a previous donor when you know you’ve never sent them
money.
− Only accepting donations through cash, cryptocurrency, gift cards, or wire
transfers
Social Engineering
▪ It is the “technique to influence” & “persuasion to deceive” people to obtain the
information.
▪ It exploits the fact that people are the weak link in security.
▪ Social engineers build the trust with the victim/person to gain the unauthorized
information/access
▪ Their goal is to fool someone into providing valuable information.
▪ Example: The attacker (social engineer) calling a user & pretending to be a tech support
person & ask questions about the confidential files, passwords, etc.
Types of Malware
1. Adware: Display ads (sometimes malicious ads) to users as they work on their computers or
browse the web.
2. Viruses: A virus infects a computer and performs a variety of payloads. It may corrupt files,
destroy operating systems, delete or move files, or deliver a payload at a specific date.
3. Worms: A worm is a self-replicating virus, but instead of affecting local files, a worm spreads
to other systems and exhausts resources.
4. Trojans: A Trojan is named after the Greek war strategy of using a Trojan horse to enter the
city of Troy. The malware masquerades as a harmless program, but it runs in the background
stealing data, allowing remote control of the system, or waiting for a command from an
attacker to deliver a payload.
5. Bots: Infected computers can become a part of a botnet used to launch a distributed denial-
of-service by sending extensive traffic to a specific host.
6. Keyloggers: Capture keystrokes as users type in URLs, credentials, and personal information
and send it to an attacker.
7. RAT: “Remote access tools” enable attackers to access and control the targeted device
remotely.
8. Downloaders: Download other malware to install locally. The type of malware depends on
the attacker’s motives.
9. POS: Compromise a point-of-sale (PoS) device to steal credit card numbers, debit card and
PINs, transaction history, and contact information.
How do I know I’ve been infected with malware?
▪ The most common signs that your computer has been compromised by malware are:
▪ Slow computer performance
▪ Browser redirects, or when your web browser takes you to sites you did not intend to visit
▪ Infection warnings, frequently accompanied by solicitations to buy something to fix them
▪ Problems shutting down or starting up your computer
▪ Frequent pop-up ads
Ransomware Attack
▪ A ransomware attack is a malware that encrypts personal information and documents while
demanding a ransom amount to decrypt them.
▪ Once the files are encrypted or locked behind a password, a text file is available to the
victim, explaining how to make the ransom payment and unlock the files for it.
How Does a Ransomware Attack Work?
▪ The spread of ransomware mostly starts with phishing attacks. A ransomware attack gains
access to a victim's device through infected emails, messages, and malicious sites
and encrypts the data in that device.
▪ The ransomware uses simple asymmetric encryption algorithms, blocks a user's files, and
makes them difficult to decrypt without knowing the key.
▪ Another way to breach a system with ransomware is by using the Remote Desktop Protocol
or RDP access. It can access remotely a computer using this protocol, allowing a hacker to
install malicious software on the system with the owner, unaware of these developments.
▪ Ransomware adds instruction files describing the pay-for-decryption process, then uses
those files to present a ransom note to the user.
▪ Ransomware usually terminates and destroys itself by leaving only the payment instruction
files.
Types of Ransomware
1. Locker ransomware
▪ It is a type of malware that blocks standard computer functions from being accessed
until the payment to the hackers is not complete.
▪ It shows a lock screen that doesn't allow the victim to use the computer for primary
purposes.
2. Crypto ransomware
▪ This ransomware encrypts the local files and documents on the computers.
▪ Once the files are encrypted, finding the decryption key is impossible unless the
ransomware variant is old and the keys are already available on the internet.
3. Scareware
▪ It is a fake software that claims to have detected a virus or other issue on your
computer and directs you to pay to resolve the problem.
▪ Some scareware locks the computer, while others flood the screen with pop-up alerts
without damaging files.
How to Prevent Ransomware Attacks?
▪ One must always have backups of their data. Cloud storage for backup is easy,
but a physical backup in a hard drive is always recommended.
▪ Keeping the system updated with the latest security patches is always a good
idea.
▪ Apart from system updates, one must always have reputed antivirus software
installed.
Zero click
▪ zero-click attacks require no action from the victim – meaning that even the most advanced
users can fall prey to serious cyber hacks and spyware tools.
▪ also called interaction-less or fully remote attacks.
▪ spying software relies on convincing the targeted person to click on a compromised link or
file to install itself on their phone, tablet, or computer.
▪ However, with a zero-click attack, the software can be installed on a device without the
victim clicking on any link. As a result, zero-click malware or no-click malware is much more
dangerous.
▪ The target of a zero-click attack can be anything from a smartphone to a desktop computer
and even an IoT device
information about cyber threats and work with law enforcement. Reporting incidents to
these organizations can help in identifying trends and patterns.
5. Report to Financial Institutions: If the cybercrime involves financial fraud, contact your
bank or financial institution immediately. They can help you secure your accounts and
investigate any unauthorized transactions.
6. Report to Internet Service Providers (ISPs): If you have evidence of cybercrimes, such as
hacking or distribution of illegal content, involving an IP address, contact the relevant
Internet Service Provider (ISP). They may take action against the offender or provide
assistance to law enforcement.
7. Document the Incident: Make sure to document all evidence related to the cybercrime,
including emails, messages, screenshots, IP addresses, and any other relevant information.
This documentation can be crucial for investigations.
8. Use Online Reporting Portals: Many countries and regions have online reporting portals
where you can report cybercrimes. These portals may be managed by government agencies
or law enforcement. Check if your region offers such a service.
9. Consider Legal Advice: In some cases, it may be necessary to seek legal advice or consult
with a cybersecurity expert to understand the best course of action and to help with the
investigation.
10. Protect Yourself: While reporting the cybercrime, take steps to secure your online presence,
change passwords, update security settings, and install or update security software to
prevent further incidents.
▪ Remember that reporting cybercrimes is essential for both your own protection and the
collective effort to combat online threats. The information you provide can help authorities
take action and prevent future cybercrimes.
Remedial Measures:
1. Incident Response: In the event of a cyber crime, organizations should have an incident
response plan in place to quickly identify, contain, and mitigate the impact of the attack. This
includes isolating affected systems, restoring backups, and applying patches or security
updates.
2. Forensic Investigation: Engaging professional forensic investigators can help identify the
source and extent of the cyber crime, gather evidence, and aid in legal proceedings.
3. Data Recovery: If data is compromised or encrypted due to a cyber attack, organizations
should have backups in place to restore affected systems and minimize data loss.
Mitigation Measures:
1. Strong Security Practices: Implement robust security measures, such as firewalls, antivirus
software, and intrusion detection and prevention systems, to protect against cyber threats.
2. Regular Updates and Patching: Keep software, operating systems, and firmware up to date
with the latest security patches to mitigate vulnerabilities that cyber criminals may exploit.
3. Employee Education: Provide cybersecurity awareness and training programs to employees
to educate them about common cyber threats, phishing techniques, and safe online
practices.
4. Multi-factor Authentication (MFA): Implement MFA wherever possible to add an extra
layer of security, making it harder for cyber criminals to gain unauthorized access to
accounts or systems.
5. Data Encryption: Encrypt sensitive data, both in transit and at rest, to ensure that even if it is
intercepted or stolen, it remains unreadable and unusable for unauthorized individuals.
6. Regular Security Audits: Conduct regular security audits and vulnerability assessments to
identify and address any weaknesses or potential entry points for cyber criminals.
3. Intellectual property
4. Data protection and privacy
Legal perspective of cybercrime in India
▪ In India, cybercrime is primarily governed by the Information Technology Act, 2000 (IT
Act). This law was established to address various cyber offenses and provide a legal
framework for electronic transactions, digital signatures, and data protection.
▪ The purpose of the Indian IT Act(ITA) was to amend the Indian Penal Code(IPC).
▪ In India, several organizations are involved in dealing with cybercrime and cybersecurity at
various levels, including law enforcement, regulatory bodies, and agencies focused on
awareness and prevention.
▪ Some prominent ones include:
1. National Cyber Security Coordinator (NCSC): The NCSC operates under the Prime
Minister's Office and is responsible for coordinating all cybersecurity initiatives in
the country.