Hacking and Cybercrime

download Hacking and Cybercrime

of 23

Transcript of Hacking and Cybercrime

  • 7/26/2019 Hacking and Cybercrime

    1/23

    Atlantic International University,Honolulu, Hawaii 96813

    By MBANZABUGABO Jean Baptiste, ID# UD30956SCO39530

    School: Science and Engineering

    rogra!: "octorate

    Majo! Co"pte S$ien$e

    %i&a'i ( )*ANDA

    0

    HACKING AND CYBERCRIME

  • 7/26/2019 Hacking and Cybercrime

    2/23

    TABLE OF CONTENTS

    ABSTRACT........................................................................................................................1

    1. INTRODUCTION........................................................................................................2

    2. DISCUSSION OF CURRENT SCENARIOS.................................................................2

    2.1 Target Cybercrime......................................................................................................2

    2.2 Cybercrime statistics..................................................................................................5

    2.3 Ethica !ac"i#g..........................................................................................................$

    %h& is A !ac"er Act'ay.............................................................................................(

    2.) The *hi&s&*hy behi#+ the sce#e.............................................................................13

    2.).1 Cybercrime i# U, - case st'+y.........................................................................13

    2.).2 Cybercrime i# R%ANDA - case st'+y /&0t i#te#siies cybercrime ight. ...1)2.5 Cybercrime as Ser0ice..............................................................................................15

    2.$ Tre#+s a#+ F&recast..................................................................................................1$

    CONCUSION..................................................................................................................14

    END NOTES.....................................................................................................................14

    REFERENCES..................................................................................................................2

    +

  • 7/26/2019 Hacking and Cybercrime

    3/23

    ABSTRACT

    Cybercrime is a "i#+ & crime that ha**e#s i# 6cybers*ace67 that is7 ha**e#s i# the 8&r+

    & c&m*'ter a#+ the I#ter#et base+ Net8&r". Ath&'gh ma#y *e&*e ha0e a imite+

    "#&8e+ge & 6cybercrime67 this "i#+ & crime has the seri&'s *&te#tia &r se0ere im*act

    &'r i0es a#+ s&ciety7 beca'se &'r s&ciety is bec&mi#g a# i#&rmati s&ciety7 ' &

    i#&rmati e9cha#ge ha**e#i#g i# 6cybers*ace6. %hie there are se0era te9tb&&"s

    ta"i#g ab&'t cybercrime a#+ hac"i#g7 this *a*er7 8i i#tr&+'ce the +ei#iti &rigi#s

    a#+ e0&'ti & cybercrime i# res*ect t& hac"i#g *ara+igm. Sec+7 the categ&ries &

    cybercrime7 8hich are target cybercrime7 !ac"i#g t&& a#+ cybercrime t&&7 c&m*'ter

    i#ci+e#ta7 are *rese#te+ i# each secti res*ecti0ey7 8here s&me hac"i#g cases 8i be

    st'+ie+. Fi#ay7 the s'mmary 8i be gi0e#.

    Keywords: !ac"er7 !ac"i#g7 Cyber7 Crime7 Cybercrime7 C&m*'ter crime7 Ethica

    !ac"i#g7 Threats7 :a8are a#+ S&cia E#gi#eeri#g.

  • 7/26/2019 Hacking and Cybercrime

    4/23

    1. INTRODUCTION

    Thr&'gh&'t the 8&r+ i#creasi#g #'mbers & g&0er#me#ts a#+ *'bic a'th&rities are

    reyi#g IT i#rastr'ct'res t& *er&rm a 8i+e ra#ge & +'ties. Am&st e0erythi#g is

    i#terc#ecte+ #&8a+ays7 a#+ *e&*e i# a *&sitis are acc'st&me+ at sh'tti#g

    i#&rmati 8here it is #ee+e+.

    The tr'th is that +ata are #&t sae 8hether the 'sers sit i# their &ice7 i# a ase eei#g &

    sec'rity7 &r i# a h&te r&&m7 air*&rt &'#ge &r the &ice & a &reig# *art#er. S*eciic

    sec'rity re;'ireme#ts a**y e0ery8here7 b&th i# the a**are#ty rie#+y &ice s*ace a#+

    i# the &*e# 8&r+. A +eiberate crimi#a acti ca# target i#&rmati 8here0er it sits

    E0e# th&'gh the e0e & a8are#ess & cyber threats has i#crease+7 a#+ a8 e#&rceme#t

    acts g&bay t& c&mbat them7 iega *r&its ha0e reache+ amas beca'se there 8ere sti t&& ma#y

    c&m*a#ies that ai t& ;'a#tiy the &sses reate+ t& cybercrime. I# s&me cases7 they

    t&tay ig#&re that they>re 0ictims & attac"s. The ma?&rity & estimates reie+ a

    i#0estigati a#+ &ss estimates are base+ ra8 ass'm*tis ab&'t the mag#it'+e a#+

    eect & cyber@attac"s t& *r&0i+e a# ec&mic e0a'ati.

    2.1 Tr!e" Cy#er$r%&e

  • 7/26/2019 Hacking and Cybercrime

    5/23

    %he# a c&m*'ter is the target & &e#se7 the *er*etrat&r attac"s the c&m*'ter by

    brea"i#g i#t& it &r attac"i#g it r&m &'tsi+e. This "i#+ & cybercrime may be the m&st

    6*r&essia6 i# the cybercrime categ&ries7 beca'se the crimi#a +&es *r&grammi#g a#+

    ma"es 'se & s&me e9*&its c&m*'ter7 8h& a8ays has *retty strg *r&essia

    bac"gr&'#+ & c&m*'ter scie#ce.

    Cyber@crimi#a acti0ities are i#creasi#g by i#ci+e#ce i# a sce#ari& ma+e 8&rse by theec&mic crisis. %e as& ace tighte#e+ s*e#+i#g by the *ri0ate sect&r7 a#+ re+'ce+

    i#a#cia i;'i+ity.

    Neary ( & cybercrime acts are estimate+ t& &rigi#ate i# s&me &rm & &rga#i

  • 7/26/2019 Hacking and Cybercrime

    6/23

    Most common cybercrime acts encountered by national police in Europe, Asia and

    Oceania, Americas, Africa are the following:

    Iega +ata i#terere#ce &r system +amage

    Iega access t& a c&m*'ter system

    Iega access7 I#terce*ti &r ac;'isiti & c&m*'ter +ata

    C&m*'ter reate+ c&*yright a#+ tra+emar" &e#ces

    Se#+i#g &r ctr&i#g se#+i#g & S=A:

    C&m*'ter reate+ ra'+ a#+ &rgery

    C&m*'ter reate+ acts i#0&0i#g racism a#+ 9e#&*h&bia

    C&m*'ter reate+ acts i# s'**&rt & terr&rism &e#ces a#+ a#ti@*&itics *arties

    Breach & *ri0acy &r +ata *r&tecti meas'res

    C&m*'ter reate+ i+e#tiy &e#ces

    C&m*'ter reate+ s&icitati &r gr&&mi#g & chi+re#

    C&m*'ter reate+ acts ca'si#g *ersa harms

    C&m*'ter reate+ *r&+'cti +istrib'ti &r *&ssessi & chi+ *&r#&gra*hy

    %he# assessi#g the eect & cybercrime7 it>s #ecessary t& e0a'ate a series & act&rs

    The &ss & i#teect'a *r&*erty a#+ se#siti0e +ata.

    O**&rt'#ity c&sts7 i#c'+i#g ser0ice a#+ em*&yme#t +isr'*tis.

    Damage t& the bra#+ image a#+ c&m*a#y re*'tati.

    =e#aties a#+ c&m*e#sat&ry *ayme#ts t& c'st&mers &r i#ce#ie#ce &r

    cse;'e#tia &ss7 &r ctract'a c&m*e#sati &r +eays7 etc.

    C&st & c&'#termeas'res a#+ i#s'ra#ce.

  • 7/26/2019 Hacking and Cybercrime

    7/23

    C&st & mitigati strategies a#+ rec&0ery r&m cyber@attac"s.

    The &ss & tra+e a#+ c&m*etiti0e#ess.

    Dist&rti & tra+e.

    &b &ss.

    F%!'re ( Es"%&"ed $os" o) $y#er$r%&e *Tre+dM%$ro,

    2.2 Cy#er$r%&e s""%s"%$s

    T& better '#+ersta#+ the eect & cybercrime a g&ba scae7 I +eci+e+ t& i#tr&+'ce the

    res'ts a##&'#ce+ by the st'+y7 tite+ The 213 C&st & Cyber Crime St'+y7 *r&0i+es a#

    estimati & the ec&mic im*act & cybercrime. It>s s*s&re+ by != &r the &'rth

    csec'ti0e year. It re0eas that the c&st & cybercrime i# 213 escaate+ ( *erce#t7

    8hie the time #ecessary t& res&0e *r&bems has i#crease+ by #eary 2 *erce#t i# &'r

    years. :ea#8hie7 the a0erage c&st t& res&0e a si#ge attac" t&tae+ m&re tha# G1

    mii.

    Information is a powerful weapon in an organizations cyber security arsenal. Based on

    real-world experiences and in-depth views many security professionals around the globe,

    the ost of yber rime research provide valuable insights into the causes and costs of

    cyber-attac!s. "he research is designed to help organizations ma!e the most cost-

    effective decisions possible in minimizing the greatest ris!s to their companies,# s%d Dr.

    Lrry -o+e&o+ $/%r&+ +d )o'+der o) "/e -o+e&o+ I+s"%"'"e.

  • 7/26/2019 Hacking and Cybercrime

    8/23

    The re;'e#cy a#+ c&st & the cyber@attac"s i#crease+ i# the ast 12 mths. The a0erage

    a##'ai

  • 7/26/2019 Hacking and Cybercrime

    9/23

    hac"i#g acti0ities7 a#+ has acce*te+ hac"i#g as a iestye a#+ *hi&s&*hy & their ch&ice7

    is cae+ a hac"er.

    !ac"i#g ca# 'rther be +ei#e+ i# ma#y 8ays. The m&st s'itabe mea#i#g & hac"i#g is

    ha0i#g a# '#a'th&ri

  • 7/26/2019 Hacking and Cybercrime

    10/23

    The c&st & maici&'s cyber acti0ity is mai#y reate+ t& the thet & i#teect'a *r&*erty

    a#+ the &ss & i#a#cia assets.

    6/o %s A H$er A$"'y

    !ac"ers are th&se 8h& are 0ery i#teige#t *erssE9*erts 8h& s*e#+s &ts & time i#

    researchi#g a#+ e9*&ri#g c&m*'ter res&'rces7 #et8&r"s7 +atabases7 ser0ers t& i#+

    sec'rity iss'es a#+ as& *r&tecti#g i#&rmati & &rga#i

  • 7/26/2019 Hacking and Cybercrime

    11/23

    the targete+ c&m*a#y 8i be i#&rme+ & a#y 8ea"#esses a#+ 8i re*air it7 b't i"e the

    bac"@hat hac"er the grey@hat hac"er is hac"i#g 8ith&'t *ermissi.

    ). B'e H"- E9ter#a c&m*'ter sec'rity cs'ti#g irms are em*&ye+ t& b'g@test a

    system *ri&r t& its a'#ch7 &&"i#g &r 8ea" i#"s 8hich ca# the# be c&se+. B'e !at is

    as& ass&ciate+ 8ith a# a##'a sec'rity cere#ce he+ by :icr&s&t 8here :icr&s&t

    e#gi#eers a#+ hac"ers ca# &*e#y c&mm'#icate.

    5. E%"e /$er- These ty*es & hac"ers ha0e a re*'tati &r bei#g the best i# the

    b'si#ess a#+ are csi+ere+ as the i##&0at&rs a#+ e9*erts. Eite hac"ers 'se+ a#

    i#0e#te+ a#g'age cae+ eets*ea" t& ccea their sites r&m search e#gi#es. The

    a#g'age mea#t s&me etters i# a 8&r+ 8ere re*ace+ by a #'merica i"e#ess &r &ther

    etters that s&'#+e+ simiar.

    $. H$"%3%s" - S&mee 8h& hac"s i#t& a c&m*'ter #et8&r"7 &r a *&iticay &r

    s&ciay m&ti0ate+ *'r*&se. The ctr&0ersia 8&r+ ca# be cstr'cte+ as cyber

    terr&rism as this ty*e & hac"i#g ca# ea+ t& #@0i&e#t t& 0i&e#t acti0ities. The 8&r+

    8as irst c&i#e+ i# 144$ by the C't & the Dea+ C&8 &rga#isati.

    . S$r%5" %dd%es- Amate'r hac"er 8h& &&8s +irectis a#+ 'ses scri*ts a#+ she

    c&+es r&m &ther hac"ers a#+ 'ses them 8ith&'t 'y '#+ersta#+i#g each ste*

    *er&rme+.

    (. S5y /$ers- C&r*&ratis hire hac"ers t& i#itrate the c&m*etiti a#+ stea tra+e

    secrets. They may hac" i# r&m the &'tsi+e &r gai# em*&yme#t i# &r+er t& act as am&e. S*y hac"ers may 'se simiar tactics as hac"ti0ists7 b't their y age#+a is t&

    ser0e their cie#ts g&as a#+ get *ai+.

    4. Cy#er "error%s"s- These hac"ers7 ge#eray m&ti0ate+ by reigi&'s &r *&itica

    beies7 attem*t t& create ear a#+ cha&s by +isr'*ti#g critica i#rastr'ct'res. Cyber

    terr&rists are by ar the m&st +a#ger&'s7 8ith a 8i+e ra#ge & s"is a#+ g&as. Cyber

    Terr&rists 'timate m&ti0ati is t& s*rea+ ear7 terr&r a#+ c&mmit m'r+er.

    1. Mo#%e /$ers- These +ays> i#+i0i+'as st&re e0erythi#g their m&bie *hes7r&m *ersa i#&rmati s'ch as ctact #'mbers a#+ a++resses t& cre+it car+ +etais.

    F&r these reass m&bie *hes are i#creasi#gy bec&mi#g attracti0e t& hac"ers@@the@

    h&&7 either by hac"i#g a'ty m&bie chi*s &r *&i#t@t&@*&i#t 8ireess #et8&r"s7 s'ch as

    B'et&&th.

  • 7/26/2019 Hacking and Cybercrime

    12/23

    S&'rces"7 :cAeeJ R&bert Siciia#&7 %i"i*e+ia

    %ith the rise & cyber@crime7 ethica hac"i#g has bec&me a *&8er' strategy i# the ight

    agai#st i#e threats. I# ge#era terms7 ethica hac"ers are a'th&ri

  • 7/26/2019 Hacking and Cybercrime

    13/23

    their i#rastr'ct're7 &r e9am*e a+&*ti#g *eer@t&@*eer *r&t&c&s7 &r hi+i#g c&mma#+ a#+

    ctr& i#rastr'ct'res i# a#ymi i#e beha0i&rs7 the +a#gers a#+ i#a#cia c&st &

    cybercrime.

    As&7 their +ata cirms the ccer#i#g res'ts & &ther a#aysis. Cybercrimi#a acti0ities

    a#+ reate+ *r&it are i# csta#t gr&8th7 the c&st *er cybercrime 0ictim is '* 5 *erce#t7

    a#+ the g&ba *rice tag & cs'mer cybercrime is G113 bii a##'ay. That>s a res't

    & the ccer#s sec'rity a#aysts csi+er. It as& aects the act'a g&ba ec&mic

    sce#ari& a#+ the +iic'ties ace+ by e#ter*rises.

    This +ata 8as re*&rte+ i# the N&rt Re*&rt7 a +&c'me#t csi+ere+ e & the

    8&r+>s largest consumer cybercrime studies, based on self-reported experiences of

    more than (/,000 adults across '& countries, aimed at understanding how cybercrime

    affects consumers, and how the adoption and evolution of new technologies impacts

    consumers security.#

    The N&rt Re*&rt as& states that the #'mber & i#e a+'ts 8h& ha0e e9*erie#ce+

    cybercrime has +ecrease+7 8hie the a0erage c&st *er 0ictim has rise#.

    Syma#tec e9*erts ha0e as& a#ay

  • 7/26/2019 Hacking and Cybercrime

    14/23

    'sers. Cyber crimi#as are &&"i#g at *at&rms as 0ect&rs &r i#e ra'+s 8ith i#crease+

    i#terest. The #'mber & crimes base+ m&bie +e0ices a#+ s&cia me+ia is e9*&+i#g.

    The 21) N&rt Re*&rt states that the ac" & eicie#t a'the#ticati mecha#isms a#+

    +ee#se mecha#isms is the *rimary ca'se & i#ci+e#ts &r m&bie 'sers. Am&st ha +>t

    'se basic *reca'tis a#+ a thir+ 8ere 0ictims & iega acti0ities ast year. %hat>s 0ery

    ccer#i#g is that7 gi0e# the a8are#ess e0e & 'sers regar+i#g cyber threats7 y asma *&rti & m&bie 'sers 2$ ha0e i#stae+ sec'rity s&t8are a#+ 5 are#>t

    a8are & e9iste#ce & sec'rity s&'tis &r m&bie e#0irme#ts. These #'mbers e9*ai#

    8hy m&bie tech#&&gy is s& attracti0e &r cybercrime. I# the ma?&rity & cases7 the

    systems are t&tay e9*&se+ t& cyber threats +'e t& ba+ habits a#+ ris"y beha0i&r.

    The greatest chae#ge &r the m&bie sect&r is the *r&misc'&'s 'sage & 'sers. )4 'se

    *ersa m&bie +e0ices i# the 8&r"&rce7 8ith seri&'s re*erc'ssis the &0era

    sec'rity & b'si#esses a#+ e#ter*rises. Csi+er that 3$ re0eae+ that say their c&m*a#y

    has #& *&icy t& reg'ate that matter.

    If this was a test, mobile consumers would be failing. 1hile consumers are protecting

    their computers, there is a general lac! of awareness to safeguard their smartphones and

    tablets. Its as if they have alarm systems for their homes, but theyre leaving their cars

    unloc!ed with the windows wide open.# said 2arian 2erritt, Internet 3afety 4dvocate,

    and 3ymantec.

    Cybercrime acti0ity aects the *ri#ci*a tre#+s & IT. Ne8 b'si#ess &**&rt'#ities7 m&bie

    *at&rms7 c&'+s a#+ s&cia me+ia are csi+ere+ *ri0iege+ 0ect&rs t& reach a 8i+e

    a'+ie#ce '#a8are & cyber threats. The 213 N&rt re*&rt highights the i#ci+e#ce &

    cybercrime s&cia me+ia. Users> ris"y beha0i&r is res*sibe &r ma#y i#ci+e#ts. 12

    & 'sers re0eae+ that s&mee has hac"e+ their acc&'#t i# the ast year. I# 34 & cases7

    'sers +>t &g &'t ater each sessi a#+ 25 share s&cia me+ia cre+e#tias. O#e i#

    three acce*ts re;'est &rms r&m '#"#&8# *arties.

    These ris"y *ractices are 0ery +a#ger&'s a#+ are a csi+erabe ca'se & the i#crease &

    cyber@attac"s. O# the &ther si+e7 cyber crimi#as are a+&*ti#g hac"i#g tech#i;'es that are

    e0e# m&re s&*histicate+. S*eciicay +esig#e+ ma8are a#+ *hishi#g cam*aig#s are the

    m&st c&mm tech#i;'es & attac"s &bser0e+ i# rece#t mths.

  • 7/26/2019 Hacking and Cybercrime

    15/23

    "odays cyber criminals are using more sophisticated attac!s, such as ra#s&m8are a#

    s*ear@*hishi#g7 8hich yield them more money per attac! than ever before,# said 3tephen

    "rilling, hief "echnology $fficer, 3ymantec.

    /reat i#terest is +e+icate+ t& c&'+ c&m*'ti#g7 a#+ i# *artic'ar t& c&'+ st&rage s&'tis

    that ma"e it easy t& archi0e a#+ share ies. 2) & 'sers 'se the same c&'+ st&rage

    acc&'#t &r *ersa a#+ 8&r" acti0ities. 1( share their c&ecti & +&c'me#ts 8ith

    their rie#+s. O#ce agai#7 ba+ habits aciitate cybercrime. C&'+ ser0ices b'#+e a

    m'tit'+e & +ata ser0ices i# e *ace7 s& they>re attracti0e targets &r hac"ers.

    F%!'re ( Cy#er$r%&e +d $o'd s"or!e /#%"s *Sy&+"e$,

    2. T/e 5/%oso5/y #e/%+d "/e s$e+e

    2.4.1 Cybercrime in UK case study

    T& cte9t'ais i#teresti#g t& csi+er the +ata a0aiabe &r

    a c&'#try i"e the U#ite+ ,i#g+&m. It>s e & the #atis 8ith the highest tech#&&gica

    *e#etrati e0es. The +ata *'bishe+ i# a rece#t st'+y c+'cte+ by cyber sec'rity

    e9*erts at the U#i0ersity & ,e#t is m&re sh&c"i#g. O0er 4 mii a+'ts i# Britai# ha0e

    ha+ i#e acc&'#ts hac"e+7 a#+ ( & the U, citi

  • 7/26/2019 Hacking and Cybercrime

    16/23

    The mai# crime s'ere+ by U, i#e 'sers is the hac"i#g & their 8eb ser0ices

    acc&'#ts. Th&se i#c'+e i#e ba#"i#g7 emai7 a#+ s&cia me+ia. I# #eary 33 & the

    cases7 the &e#se 8as re*eate+.

    I# 2137 the U, g&0er#me#t +&c'me#te+ i# a# &icia re*&rt that the &0era c&st &

    cybercrime ec&my 8as 2 bii a year. I+e#tity thet 8as m&st c&mm crime7

    acc&'#ti#g &r 1. bii. That 8as &&8e+ by i#e scams7 8ith 1.) bii.Cybercrime i# the U, 8as m&st i#si+i&'s &r &rga#i

  • 7/26/2019 Hacking and Cybercrime

    17/23

    The cam*aig#7 +'bbe+ Stay Sae O#i#e7 is mea#t t& a++ress the gr&8i#g ccer#s

    cybercrime as m&re R8a#+a#s cti#'e t& embrace i#&rmati a#+ c&mm'#icati

    tech#&&gy ICT.

    Acc&r+i#g t& R8a#+a Utiities Reg'at&ry Age#cy RURA7 i#ter#et *e#etrati rate has

    rise# r&m .1 i# 23 t& .) by '#e 212.

    !&8e0er7 ami+st this achie0eme#t7 e#ters cybercrime7 the '#8a#te+ esc&rt & a this

    a+0a#ceme#t a#+ i##&0atis i# ICT 'se7 the &st i# ig're 8as #&t +ramaticay

    a##&'#ce+ b't & ca'se it is. Cyber@attac"s t& s*eciic sect&rs s'ch as m&bie mey

    tra#ser ca# be +isastr&'s t& the #atia ec&my. I# 21)7 the sect&r ha+ m&re tha# 1)

    mii tra#sactis 8&rth &0er R8 $41 bii.

    Amg the sect&rs m&st targete+ by cyber@attac"s is the ba#"i#g sect&r a#+

    teec&mm'#icati c&m*a#ies 8hereby the R8a#+a Natia =&ice as& has a i#a#cia

    I#teige#ce U#it attache+ t& Natia Ba#" & R8a#+a7 that i#0estigates i#a#cia a#+

    cybercrimes i# ba#"s.

    R8a#+a Natia =&ice RN= 8i#g is tryi#g its best t& ctai# these IT cme# a#+ as

    a matter & act they he+ a# a#ti@cybercrime trai#i#g this year 8ith the he* & I#ter*& t&

    e;'i* &icers 8ith s"is t& +etect a#+ i#0estigate cybercrime7 '#+ersta#+ cyber

    terr&rism7 *ri#ci*es & e0i+e#ce c&ecti &r cybercrime7 eectric mey tra#ser

    tech#&&gy7 a#+ basic IT t&&s i# a#ays a't&mate+ +ata *r&cessi#g system &r

    simiar systems 8ith i#te#t t& i#+ &'t eectricay st&re+ &r tra#smitte+ +ata7 regar+ess

    & the &cati is iabe t& a term & im*risme#t & e 1 year t& three 3 years a#+ a

    i#e & e mii 177 t& three mii 377 R8a#+a# ra#cs.

    2.; Cy#er$r%&e s Ser3%$e

    The terms Attac"@as@a@Ser0ice7 :a8are@as@a@Ser0ice7 a#+ Fra'+@as@a@Ser0ice are

    'se+ t& ;'aiy m&+es & sae i# 8hich cybercrimi#as se &r re#t their c&eag'es

    hac"i#g ser0ice a#+ maici&'s c&+e7 t& c+'ct iega acti0ities. The cce*t is

    re0&'tiary7 the bac" mar"et &ers e#tire i#rastr'ct'res t& ser0ice ma8are e.g.

    b'et@*r&& h&sti#g &r re#t c&m*r&mise+ machi#es begi#g t& h'ge b&t#ets7 a#+

  • 7/26/2019 Hacking and Cybercrime

    18/23

    &'ts&'rci#g a#+ *art#ershi*s ser0ices7 i#c'+i#g s&t8are +e0e&*me#t7 hac"i#g ser0ices7

    a#+7 & c&'rse7 c'st&mer s'**&rt.

    The ma?&rity & these ser0ices are *rese#te+ i# the '#+ergr&'#+ ec&my7 base+ a

    s'bscri*ti &r at@rate ee m&+e7 ma"i#g them ce#ie#t a#+ attracti0e. The *ri#ci*a

    c&st & arra#gi#g crimi#a acti0ities is share+ bet8ee# a c'st&mers. This 8ay7 ser0ice

    *r&0i+ers c&'+ i#crease their ear#i#gs7 a#+ cie#ts be#eit r&m a se#sibe re+'cti &

    their e9*e#+it're7 8ith the "#&8e+ge #ee+e+ t& ma#age iega b'si#esses.

    These ser0ices are characteri

  • 7/26/2019 Hacking and Cybercrime

    19/23

    Tech#&&gies s'ch as m&bie a#+ s&cia #et8&r"i#g are i#creasi#gy threate#e+ by cyber

    crimi#as. They>re a+a*ti#g cs&i+ate+ attac" meth&+s t& th&se *at&rms7 a#+ are

    +ei#i#g #e8 &e#si0e strategies.

    "he proliferation of mobile devices will lead to an amplification of abuse based on

    !nowledge8attac! vectors targeting to social media.#

    Acc&r+i#g t& sec'rity e9*erts a#+ sec'rity irms7 bac" mar"et &ers s'**&rt the gr&8th

    & cyber threats 8ithi# the cybercrime ec&system.

    As re*&rte+ i# ENISA Threat a#+sca*e7 :i+@Kear 2137 the &&8i#g t&* threats are

    ca#+i+ates t& +&mi#ate the crimi#a a#+sca*e i# the me+i'm term

    Dr%3e4#y4e=5o%"s: Br&8ser@base+ attac"s sti remai# the m&st re*&rte+

    threats7 a#+ a0a remai#s the m&st e9*&ite+ s&t8are &r this "i#+ & threat.

    !orms"#ro$ans: S&*histicate+ ma8are is 'se+ by cyber crimi#as a#+

    g&0er#me#ts &r 0ari&'s *'r*&ses7 s'ch as &e#si0e attac"s7 cyber es*iage7

    a#+ s&*histicate+ cyber scams.

    Cybercrime ma"es e9te#si0e 'se & ma8are7 es*eciay &r ba#"i#g ra'+.

    The m&bie *at&rm a#+ s&cia #et8&r" sit'ati is 0ery ccer#i#g. Th&se

    *at&rms are e9*&ite+ t& s*rea+ arge@scae maici&'s age#ts.

    Code I+>e$"%o+: Attac"s are #&taby *&*'ar agai#st 8eb Cte#t

    :a#ageme#t Systems C:Ss. D'e t& their 8i+e 'se7 *&*'ar C:Ses

    cstit'te a csi+erabe attac" s'race that has +ra8# the atte#ti & cyber@

    crimi#as. C&'+ ser0ice *r&0i+i#g #et8&r"s are i#creasi#gy 'se+ t& h&st

    t&&s &r a't&mate+ attac"s.

    B&t#ets7 De#ia & Ser0ices7 r&g'e8areJscare8are7 targete+ attac"s7 i+e#tity thet a#+

    search e#gi#e *&isi#g 8i cti#'e t& re*rese#t a seri&'s me#ace t& the IT

    c&mm'#ity.

    My eyes "o 5red%$" "/e %!'o's +d $o+s"r%+"s %+ "/e +e=" $o&%+! yers

    Base the e0&'ti & tech#&&gy 8here #e8 a#+ massi0e tech#&&gy emerge7 I t&&"

    time t& as" myse the &&8i#g ;'esti

    %hat 8i the cybercrime a#+sca*e &&" i"e i# 22P It>s +iic't t& *re+ict the

    e0&'ti & s'ch a c&m*e9 ec&system. Tech#&&gies e0&0e at im*ressi0e s*ee+7 a#+

    8ith them7 &**&rt'#ities &r cybercrime.

  • 7/26/2019 Hacking and Cybercrime

    20/23

    The ass'm*ti ca# be '#+eri#e+ i# the three +iere#t *ers*ecti0es7 r&m a# i#+i0i+'a7

    c&m*a#y a#+ g&0er#me#t *&i#t & 0ie8.

    The 8&rst@case are the &&8i#g

    I#crease+ ab'se &r c&'+ i#rastr'ct'res. Cyber crimi#as 8i i#crease the

    'se & c&'+ tech#&&gy t& a'#ch DDOS attac"s7 &r h&st b&t#ets.

    U#+ergr&'#+ mar"et &eri#gs 8i mat're t& s'**&rt cyber ga#gs i# the

    &rga#i

  • 7/26/2019 Hacking and Cybercrime

    21/23

    I#terce*ti &r es*iage

    :a#i*'ati & i#&rmati &r #et8&r"s

    Data +estr'cti

    :is'se & *r&cessi#g *&8er

    C&'#tereit items

    E0asi t&&s a#+ tech#i;'es

    It is #ecessary that cyber strategies & g&0er#me#ts i#c'+e a series & mitigati

    c&'#termeas'res &r *ri#ci*a cyber threats. Critica i#rastr'ct're a#+ +ee#se systems

    8i re*rese#t *ri0iege+ targets &r cyber crimi#as a#+ state s*s&re+ hac"ers.

    CONCLUSION

    The +ata *r&0i+e+ by sec'rity irms the g&ba im*act & cybercrime are ?'st a ra8

    estimati i# my &*i#i. They c&'+ gi0e a rea+er ?'st a basic i+ea & the &0era +amage

    ca'se+ by iega acti0ities. A#ay

  • 7/26/2019 Hacking and Cybercrime

    22/23

    2 Too $y#er$r%&e:crime i# 8hich a c&m*'ter is 'se+ as a t&& i# c&mmitti#g the

    &e#se. I# this categ&ry7 crime agai#st *r&*erty7 i#c'+i#g thet7 ra'+ a#+ e9t&rti a#+

    crime agai#st *erss7 i#c'+i#g *hysica harm a#+ *sych&&gica harm are e9ami#e+.

    3 Co&5'"er %+$%de+":crimes i# 8hich a c&m*'ter *ays a mi#&r r&e i# c&mmitti#g

    the &e#se. I# this categ&ry7 the chae#ges &r c&ecti#g the e0i+e#ce are *rese#te+7

    8hich i#c'+e e0i+e#tiary chae#ge a#+ +igita *ri0acy.

    REFERENCES

    S'sa# %. Bre##er7 6Cybercrime Crimi#a Threats r&m Cybers*ace76 =raeger7 217

    ISBN@13 4(@3133$5)$1.

    atha# C&'gh7 6=ri#ci*es & Cybercrime76 Cambri+ge7 217 ISBN@13 4(@

    521(44253.

    Bac" !at System i#"s y&'r ace t& y&'r S&cia Sec'rity #'mber a#+ &ther *ri0ate

    thi#gs6M htt*JJ888.#et8&r"8&r+.c&mJ#e8sJ211J(111@bac"hat@acia@

    rec&g#iti.htm QA #e8s ta"i#g ab&'t e hac"i#g meth&+ t& get *e&*es *ri0ate +ata.

    %hita"er Ne8ma#7 =e#etrati Testi#g a#+ Net8&r" Dee#se7 Cisc& =ress7

    I#+ia#a*&is7 IN. 2$. ISBN 1@5(5@2(@3.

    htt*JJres&'rces.i#&seci#stit'te.c&mJcybercrime@a#+@the@'#+ergr&'#+@mar"etJ

    htt*JJsec'rityaairs.c&J8&r+*ressJ1(2$Jcyber@crimeJ@sec're@threat@re*&rt@h3@

    213.htm

    htt*JJsec'rityaairs.c&J8&r+*ressJ1(51Jcyber@crimeJ*em@213@c&st@&@cyber@

    crime.htm

    htt*JJsec'rityaairs.c&J8&r+*ressJ1()5Jcyber@crimeJ213@#&rt@re*&rt.htm

    htt*JJ888.cybersec."e#t.ac.'"JS'r0ey1.*+

    htt*JJ888.emc.c&mJc&ateraJra'+@re*&rtJc'rre#t@state@cybercrime@213.*+

    htt*sJJ888.ics*a.&rgJ'*&a+sJme+iaJICS=A=r&?ect22

    E2(43Sce#ari&s&rtheF't're&Cybercrime.*+

    http://resources.infosecinstitute.com/cybercrime-and-the-underground-market/http://securityaffairs.co/wordpress/18206/cyber-crime/f-secure-threat-report-h3-2013.htmlhttp://securityaffairs.co/wordpress/18206/cyber-crime/f-secure-threat-report-h3-2013.htmlhttp://securityaffairs.co/wordpress/18517/cyber-crime/ponemon-2013-cost-of-cyber-crime.htmlhttp://securityaffairs.co/wordpress/18517/cyber-crime/ponemon-2013-cost-of-cyber-crime.htmlhttp://securityaffairs.co/wordpress/18475/cyber-crime/2013-norton-report.htmlhttp://www.cybersec.kent.ac.uk/Survey1.pdfhttp://www.emc.com/collateral/fraud-report/current-state-cybercrime-2013.pdfhttps://www.icspa.org/uploads/media/ICSPA_Project_2020_%E2%80%93_Scenarios_for_the_Future_of_Cybercrime.pdfhttps://www.icspa.org/uploads/media/ICSPA_Project_2020_%E2%80%93_Scenarios_for_the_Future_of_Cybercrime.pdfhttp://resources.infosecinstitute.com/cybercrime-and-the-underground-market/http://securityaffairs.co/wordpress/18206/cyber-crime/f-secure-threat-report-h3-2013.htmlhttp://securityaffairs.co/wordpress/18206/cyber-crime/f-secure-threat-report-h3-2013.htmlhttp://securityaffairs.co/wordpress/18517/cyber-crime/ponemon-2013-cost-of-cyber-crime.htmlhttp://securityaffairs.co/wordpress/18517/cyber-crime/ponemon-2013-cost-of-cyber-crime.htmlhttp://securityaffairs.co/wordpress/18475/cyber-crime/2013-norton-report.htmlhttp://www.cybersec.kent.ac.uk/Survey1.pdfhttp://www.emc.com/collateral/fraud-report/current-state-cybercrime-2013.pdfhttps://www.icspa.org/uploads/media/ICSPA_Project_2020_%E2%80%93_Scenarios_for_the_Future_of_Cybercrime.pdfhttps://www.icspa.org/uploads/media/ICSPA_Project_2020_%E2%80%93_Scenarios_for_the_Future_of_Cybercrime.pdf
  • 7/26/2019 Hacking and Cybercrime

    23/23

    htt*JJ888.theg'ar+ia#.c&mJtech#&&gyJ213Ja'gJ23Jcybercrime@hits@#i#e@mii@'"@

    8eb@'sers

    htt*JJ888.'#&+c.&rgJ+&c'me#tsJ&rga#i