Skip to main content

Types of Cybercrime and Targeted Hosts

 Types of Cybercrime and Targeted Hosts

Cybercrime is vastly growing in the world of tech today. Criminals of the World Wide Web exploit internet users’ personal information for their own gain. They dive deep into the dark web to buy and sell illegal products and services. They even gain access to classified government information.

Cybercrimes are at an all time high, costing companies and individuals billions of dollars annually. What’s even more frightening is that this figure only represents the last 5 years with no end in sight. The evolution of technology and increasing accessibility of smart tech means there are multiple access points within users’ homes for hackers to exploit. While law enforcement attempts to tackle the growing issue, criminal numbers continue to grow, taking advantage of the anonymity of the internet.

Types of Cybercrime


1. DDoS Attacks:

These are used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources. Large networks of infected devices known as Botnets are created by depositing malware on users’ computers. The hacker then hacks into the system once the network is down.


2. Botnets: 

Botnets are networks from compromised computers that are controlled externally by remote hackers. The remote hackers then send spam or attack other computers through these botnets. Botnets can also be used to act as malware and perform malicious tasks.


3. Identity Theft:

This cybercrime occurs when a criminal gains access to a user’s personal information to steal funds, access confidential information, or participate in tax or health insurance fraud. They can also open a phone/internet account in your name, use your name to plan a criminal activity and claim government benefits in your name. They may do this by finding out user’s passwords through hacking, retrieving personal information from social media, or sending phishing emails.

4. Cyberstalking:

This kind of cybercrime involves online harassment where the user is subjected to a plethora of online messages and emails. Typically cyberstalkers use social media, websites and search engines to intimidate a user and instill fear. Usually, the cyberstalker knows their victim and makes the person feel afraid or concerned for their safety.


5. Social Engineering:

Social engineering involves criminals making direct contact with you usually by phone or email. They want to gain your confidence and usually pose as a customer service agent so you’ll give the necessary information needed. This is typically a password, the company you work for, or bank information. Cybercriminals will find out what they can about you on the internet and then attempt to add you as a friend on social accounts. Once they gain access to an account, they can sell your information or secure accounts in your name.


6. PUPs:

PUPS or Potentially Unwanted Programs are less threatening than other cybercrimes, but are a type of malware. They uninstall necessary software in your system including search engines and pre-downloaded apps. They can include spyware or adware, so it’s a good idea to install an antivirus software to avoid the malicious download.


7. Phishing:

This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer. Cybercriminals are becoming more established and many of these emails are not flagged as spam. Users are tricked into emails claiming they need to change their password or update their billing information, giving criminals access.


8. Prohibited/Illegal Content:

This cybercrime involves criminals sharing and distributing inappropriate content that can be considered highly distressing and offensive. Offensive content can include, but is not limited to, sexual activity between adults, videos with intense violent and videos of criminal activity. Illegal content includes materials advocating terrorism-related acts and child exploitation material. This type of content exists both on the everyday internet and on the dark web, an anonymous network.


9. Online Scams:

These are usually in the form of ads or spam emails that include promises of rewards or offers of unrealistic amounts of money. Online scams include enticing offers that are “too good to be true” and when clicked on can cause malware to interfere and compromise information.


10. Exploit Kits:

Exploit kits need a vulnerability (bug in the code of a software) in order to gain control of a user’s computer. They are readymade tools criminals can buy online and use against anyone with a computer. The exploit kits are upgraded regularly similar to normal software and are available on dark web hacking forums.


 

Comments

Popular posts from this blog

What is Cyber crime? Meaning & Terminologies

 What is Cyber crime? Meaning & Terminologies   What is cyber crime? Cybercrime is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may harm someone's security and financial health. There are many privacy concerns surrounding Cybercrime when confidential information is intercepted or disclosed, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Cyber-crimes crossing international borders and involving the actions of at least one nation-state are sometimes referred to as cyber warfare. Warren Buffet describes Cybercrime as the "number one problem with mankind" and "poses real risks to humanity." A report (sponsored by McAfee) published in 2014 estimated that the annual damage to the global economy was $445 billion. A 2016 report by Cybersecurity

History of Cybercrime and It's Impact on Society

 History of Cybercrime and It's Impact on Society History of Cybercrime The malicious tie to hacking was first documented in the 1970s when early computerized phones were becoming a target. Tech-savvy people known as “phreakers” found a way around paying for long distance calls through a series of codes. They were the first hackers, learning how to exploit the system by modifying hardware and software to steal long distance phone time. This made people realize that computer systems were vulnerable to criminal activity and the more complex systems became, the more susceptible they were to cybercrime. Fast Forward to 1990, where a large project named Operation Sundevil was exposed. FBI agents confiscated 42 computers and over 20,000 floppy disks that were used by criminals for illegal credit card use and telephone services. This operation involved over 100 FBI agents and took two years to track down only a few of the suspects. However, it was seen as a great public relations effort,

Common Computer and Internet Cyber Crimes

 Common Computer and Internet Cyber Crimes The Internet can be a scary place, full of scammers, thieves, and saboteurs. If you think that sounds like an exaggeration, consider this statistic: According to the Norton Cyber Security Insights Report, over 143 million Americans have been affected by computer crimes in the last year, with 80% of those surveyed reporting they or someone they knew had been victimized. With the ubiquity of smartphones and social media reporting our every move, it’s no surprise that cyber-crime is on the rise. From theft to fraud to solicitation, here are nine common Internet crimes that are impacting Americans today. 1. Phishing Phishing is when criminals send fraudulent emails pretending to be from legitimate businesses, in an attempt to collect sensitive, personal information. Often, any links in the email will redirect to a website owned by the scammer, so always be careful about what information you give out on the Internet. 2. Harassment Cyberstalkers use