hacking and cybercrime
TRANSCRIPT
-
7/26/2019 Hacking and Cybercrime
1/23
Atlantic International University,Honolulu, Hawaii 96813
By MBANZABUGABO Jean Baptiste, ID# UD30956SCO39530
School: Science and Engineering
rogra!: "octorate
Majo! Co"pte S$ien$e
%i&a'i ( )*ANDA
0
HACKING AND CYBERCRIME
-
7/26/2019 Hacking and Cybercrime
2/23
TABLE OF CONTENTS
ABSTRACT........................................................................................................................1
1. INTRODUCTION........................................................................................................2
2. DISCUSSION OF CURRENT SCENARIOS.................................................................2
2.1 Target Cybercrime......................................................................................................2
2.2 Cybercrime statistics..................................................................................................5
2.3 Ethica !ac"i#g..........................................................................................................$
%h& is A !ac"er Act'ay.............................................................................................(
2.) The *hi&s&*hy behi#+ the sce#e.............................................................................13
2.).1 Cybercrime i# U, - case st'+y.........................................................................13
2.).2 Cybercrime i# R%ANDA - case st'+y /&0t i#te#siies cybercrime ight. ...1)2.5 Cybercrime as Ser0ice..............................................................................................15
2.$ Tre#+s a#+ F&recast..................................................................................................1$
CONCUSION..................................................................................................................14
END NOTES.....................................................................................................................14
REFERENCES..................................................................................................................2
+
-
7/26/2019 Hacking and Cybercrime
3/23
ABSTRACT
Cybercrime is a "i#+ & crime that ha**e#s i# 6cybers*ace67 that is7 ha**e#s i# the 8&r+
& c&m*'ter a#+ the I#ter#et base+ Net8&r". Ath&'gh ma#y *e&*e ha0e a imite+
"#&8e+ge & 6cybercrime67 this "i#+ & crime has the seri&'s *&te#tia &r se0ere im*act
&'r i0es a#+ s&ciety7 beca'se &'r s&ciety is bec&mi#g a# i#&rmati s&ciety7 ' &
i#&rmati e9cha#ge ha**e#i#g i# 6cybers*ace6. %hie there are se0era te9tb&&"s
ta"i#g ab&'t cybercrime a#+ hac"i#g7 this *a*er7 8i i#tr&+'ce the +ei#iti &rigi#s
a#+ e0&'ti & cybercrime i# res*ect t& hac"i#g *ara+igm. Sec+7 the categ&ries &
cybercrime7 8hich are target cybercrime7 !ac"i#g t&& a#+ cybercrime t&&7 c&m*'ter
i#ci+e#ta7 are *rese#te+ i# each secti res*ecti0ey7 8here s&me hac"i#g cases 8i be
st'+ie+. Fi#ay7 the s'mmary 8i be gi0e#.
Keywords: !ac"er7 !ac"i#g7 Cyber7 Crime7 Cybercrime7 C&m*'ter crime7 Ethica
!ac"i#g7 Threats7 :a8are a#+ S&cia E#gi#eeri#g.
-
7/26/2019 Hacking and Cybercrime
4/23
1. INTRODUCTION
Thr&'gh&'t the 8&r+ i#creasi#g #'mbers & g&0er#me#ts a#+ *'bic a'th&rities are
reyi#g IT i#rastr'ct'res t& *er&rm a 8i+e ra#ge & +'ties. Am&st e0erythi#g is
i#terc#ecte+ #&8a+ays7 a#+ *e&*e i# a *&sitis are acc'st&me+ at sh'tti#g
i#&rmati 8here it is #ee+e+.
The tr'th is that +ata are #&t sae 8hether the 'sers sit i# their &ice7 i# a ase eei#g &
sec'rity7 &r i# a h&te r&&m7 air*&rt &'#ge &r the &ice & a &reig# *art#er. S*eciic
sec'rity re;'ireme#ts a**y e0ery8here7 b&th i# the a**are#ty rie#+y &ice s*ace a#+
i# the &*e# 8&r+. A +eiberate crimi#a acti ca# target i#&rmati 8here0er it sits
E0e# th&'gh the e0e & a8are#ess & cyber threats has i#crease+7 a#+ a8 e#&rceme#t
acts g&bay t& c&mbat them7 iega *r&its ha0e reache+ amas beca'se there 8ere sti t&& ma#y
c&m*a#ies that ai t& ;'a#tiy the &sses reate+ t& cybercrime. I# s&me cases7 they
t&tay ig#&re that they>re 0ictims & attac"s. The ma?&rity & estimates reie+ a
i#0estigati a#+ &ss estimates are base+ ra8 ass'm*tis ab&'t the mag#it'+e a#+
eect & cyber@attac"s t& *r&0i+e a# ec&mic e0a'ati.
2.1 Tr!e" Cy#er$r%&e
-
7/26/2019 Hacking and Cybercrime
5/23
%he# a c&m*'ter is the target & &e#se7 the *er*etrat&r attac"s the c&m*'ter by
brea"i#g i#t& it &r attac"i#g it r&m &'tsi+e. This "i#+ & cybercrime may be the m&st
6*r&essia6 i# the cybercrime categ&ries7 beca'se the crimi#a +&es *r&grammi#g a#+
ma"es 'se & s&me e9*&its c&m*'ter7 8h& a8ays has *retty strg *r&essia
bac"gr&'#+ & c&m*'ter scie#ce.
Cyber@crimi#a acti0ities are i#creasi#g by i#ci+e#ce i# a sce#ari& ma+e 8&rse by theec&mic crisis. %e as& ace tighte#e+ s*e#+i#g by the *ri0ate sect&r7 a#+ re+'ce+
i#a#cia i;'i+ity.
Neary ( & cybercrime acts are estimate+ t& &rigi#ate i# s&me &rm & &rga#i
-
7/26/2019 Hacking and Cybercrime
6/23
Most common cybercrime acts encountered by national police in Europe, Asia and
Oceania, Americas, Africa are the following:
Iega +ata i#terere#ce &r system +amage
Iega access t& a c&m*'ter system
Iega access7 I#terce*ti &r ac;'isiti & c&m*'ter +ata
C&m*'ter reate+ c&*yright a#+ tra+emar" &e#ces
Se#+i#g &r ctr&i#g se#+i#g & S=A:
C&m*'ter reate+ ra'+ a#+ &rgery
C&m*'ter reate+ acts i#0&0i#g racism a#+ 9e#&*h&bia
C&m*'ter reate+ acts i# s'**&rt & terr&rism &e#ces a#+ a#ti@*&itics *arties
Breach & *ri0acy &r +ata *r&tecti meas'res
C&m*'ter reate+ i+e#tiy &e#ces
C&m*'ter reate+ s&icitati &r gr&&mi#g & chi+re#
C&m*'ter reate+ acts ca'si#g *ersa harms
C&m*'ter reate+ *r&+'cti +istrib'ti &r *&ssessi & chi+ *&r#&gra*hy
%he# assessi#g the eect & cybercrime7 it>s #ecessary t& e0a'ate a series & act&rs
The &ss & i#teect'a *r&*erty a#+ se#siti0e +ata.
O**&rt'#ity c&sts7 i#c'+i#g ser0ice a#+ em*&yme#t +isr'*tis.
Damage t& the bra#+ image a#+ c&m*a#y re*'tati.
=e#aties a#+ c&m*e#sat&ry *ayme#ts t& c'st&mers &r i#ce#ie#ce &r
cse;'e#tia &ss7 &r ctract'a c&m*e#sati &r +eays7 etc.
C&st & c&'#termeas'res a#+ i#s'ra#ce.
-
7/26/2019 Hacking and Cybercrime
7/23
C&st & mitigati strategies a#+ rec&0ery r&m cyber@attac"s.
The &ss & tra+e a#+ c&m*etiti0e#ess.
Dist&rti & tra+e.
&b &ss.
F%!'re ( Es"%&"ed $os" o) $y#er$r%&e *Tre+dM%$ro,
2.2 Cy#er$r%&e s""%s"%$s
T& better '#+ersta#+ the eect & cybercrime a g&ba scae7 I +eci+e+ t& i#tr&+'ce the
res'ts a##&'#ce+ by the st'+y7 tite+ The 213 C&st & Cyber Crime St'+y7 *r&0i+es a#
estimati & the ec&mic im*act & cybercrime. It>s s*s&re+ by != &r the &'rth
csec'ti0e year. It re0eas that the c&st & cybercrime i# 213 escaate+ ( *erce#t7
8hie the time #ecessary t& res&0e *r&bems has i#crease+ by #eary 2 *erce#t i# &'r
years. :ea#8hie7 the a0erage c&st t& res&0e a si#ge attac" t&tae+ m&re tha# G1
mii.
Information is a powerful weapon in an organizations cyber security arsenal. Based on
real-world experiences and in-depth views many security professionals around the globe,
the ost of yber rime research provide valuable insights into the causes and costs of
cyber-attac!s. "he research is designed to help organizations ma!e the most cost-
effective decisions possible in minimizing the greatest ris!s to their companies,# s%d Dr.
Lrry -o+e&o+ $/%r&+ +d )o'+der o) "/e -o+e&o+ I+s"%"'"e.
-
7/26/2019 Hacking and Cybercrime
8/23
The re;'e#cy a#+ c&st & the cyber@attac"s i#crease+ i# the ast 12 mths. The a0erage
a##'ai
-
7/26/2019 Hacking and Cybercrime
9/23
hac"i#g acti0ities7 a#+ has acce*te+ hac"i#g as a iestye a#+ *hi&s&*hy & their ch&ice7
is cae+ a hac"er.
!ac"i#g ca# 'rther be +ei#e+ i# ma#y 8ays. The m&st s'itabe mea#i#g & hac"i#g is
ha0i#g a# '#a'th&ri
-
7/26/2019 Hacking and Cybercrime
10/23
The c&st & maici&'s cyber acti0ity is mai#y reate+ t& the thet & i#teect'a *r&*erty
a#+ the &ss & i#a#cia assets.
6/o %s A H$er A$"'y
!ac"ers are th&se 8h& are 0ery i#teige#t *erssE9*erts 8h& s*e#+s &ts & time i#
researchi#g a#+ e9*&ri#g c&m*'ter res&'rces7 #et8&r"s7 +atabases7 ser0ers t& i#+
sec'rity iss'es a#+ as& *r&tecti#g i#&rmati & &rga#i
-
7/26/2019 Hacking and Cybercrime
11/23
the targete+ c&m*a#y 8i be i#&rme+ & a#y 8ea"#esses a#+ 8i re*air it7 b't i"e the
bac"@hat hac"er the grey@hat hac"er is hac"i#g 8ith&'t *ermissi.
). B'e H"- E9ter#a c&m*'ter sec'rity cs'ti#g irms are em*&ye+ t& b'g@test a
system *ri&r t& its a'#ch7 &&"i#g &r 8ea" i#"s 8hich ca# the# be c&se+. B'e !at is
as& ass&ciate+ 8ith a# a##'a sec'rity cere#ce he+ by :icr&s&t 8here :icr&s&t
e#gi#eers a#+ hac"ers ca# &*e#y c&mm'#icate.
5. E%"e /$er- These ty*es & hac"ers ha0e a re*'tati &r bei#g the best i# the
b'si#ess a#+ are csi+ere+ as the i##&0at&rs a#+ e9*erts. Eite hac"ers 'se+ a#
i#0e#te+ a#g'age cae+ eets*ea" t& ccea their sites r&m search e#gi#es. The
a#g'age mea#t s&me etters i# a 8&r+ 8ere re*ace+ by a #'merica i"e#ess &r &ther
etters that s&'#+e+ simiar.
$. H$"%3%s" - S&mee 8h& hac"s i#t& a c&m*'ter #et8&r"7 &r a *&iticay &r
s&ciay m&ti0ate+ *'r*&se. The ctr&0ersia 8&r+ ca# be cstr'cte+ as cyber
terr&rism as this ty*e & hac"i#g ca# ea+ t& #@0i&e#t t& 0i&e#t acti0ities. The 8&r+
8as irst c&i#e+ i# 144$ by the C't & the Dea+ C&8 &rga#isati.
. S$r%5" %dd%es- Amate'r hac"er 8h& &&8s +irectis a#+ 'ses scri*ts a#+ she
c&+es r&m &ther hac"ers a#+ 'ses them 8ith&'t 'y '#+ersta#+i#g each ste*
*er&rme+.
(. S5y /$ers- C&r*&ratis hire hac"ers t& i#itrate the c&m*etiti a#+ stea tra+e
secrets. They may hac" i# r&m the &'tsi+e &r gai# em*&yme#t i# &r+er t& act as am&e. S*y hac"ers may 'se simiar tactics as hac"ti0ists7 b't their y age#+a is t&
ser0e their cie#ts g&as a#+ get *ai+.
4. Cy#er "error%s"s- These hac"ers7 ge#eray m&ti0ate+ by reigi&'s &r *&itica
beies7 attem*t t& create ear a#+ cha&s by +isr'*ti#g critica i#rastr'ct'res. Cyber
terr&rists are by ar the m&st +a#ger&'s7 8ith a 8i+e ra#ge & s"is a#+ g&as. Cyber
Terr&rists 'timate m&ti0ati is t& s*rea+ ear7 terr&r a#+ c&mmit m'r+er.
1. Mo#%e /$ers- These +ays> i#+i0i+'as st&re e0erythi#g their m&bie *hes7r&m *ersa i#&rmati s'ch as ctact #'mbers a#+ a++resses t& cre+it car+ +etais.
F&r these reass m&bie *hes are i#creasi#gy bec&mi#g attracti0e t& hac"ers@@the@
h&&7 either by hac"i#g a'ty m&bie chi*s &r *&i#t@t&@*&i#t 8ireess #et8&r"s7 s'ch as
B'et&&th.
-
7/26/2019 Hacking and Cybercrime
12/23
S&'rces"7 :cAeeJ R&bert Siciia#&7 %i"i*e+ia
%ith the rise & cyber@crime7 ethica hac"i#g has bec&me a *&8er' strategy i# the ight
agai#st i#e threats. I# ge#era terms7 ethica hac"ers are a'th&ri
-
7/26/2019 Hacking and Cybercrime
13/23
their i#rastr'ct're7 &r e9am*e a+&*ti#g *eer@t&@*eer *r&t&c&s7 &r hi+i#g c&mma#+ a#+
ctr& i#rastr'ct'res i# a#ymi i#e beha0i&rs7 the +a#gers a#+ i#a#cia c&st &
cybercrime.
As&7 their +ata cirms the ccer#i#g res'ts & &ther a#aysis. Cybercrimi#a acti0ities
a#+ reate+ *r&it are i# csta#t gr&8th7 the c&st *er cybercrime 0ictim is '* 5 *erce#t7
a#+ the g&ba *rice tag & cs'mer cybercrime is G113 bii a##'ay. That>s a res't
& the ccer#s sec'rity a#aysts csi+er. It as& aects the act'a g&ba ec&mic
sce#ari& a#+ the +iic'ties ace+ by e#ter*rises.
This +ata 8as re*&rte+ i# the N&rt Re*&rt7 a +&c'me#t csi+ere+ e & the
8&r+>s largest consumer cybercrime studies, based on self-reported experiences of
more than (/,000 adults across '& countries, aimed at understanding how cybercrime
affects consumers, and how the adoption and evolution of new technologies impacts
consumers security.#
The N&rt Re*&rt as& states that the #'mber & i#e a+'ts 8h& ha0e e9*erie#ce+
cybercrime has +ecrease+7 8hie the a0erage c&st *er 0ictim has rise#.
Syma#tec e9*erts ha0e as& a#ay
-
7/26/2019 Hacking and Cybercrime
14/23
'sers. Cyber crimi#as are &&"i#g at *at&rms as 0ect&rs &r i#e ra'+s 8ith i#crease+
i#terest. The #'mber & crimes base+ m&bie +e0ices a#+ s&cia me+ia is e9*&+i#g.
The 21) N&rt Re*&rt states that the ac" & eicie#t a'the#ticati mecha#isms a#+
+ee#se mecha#isms is the *rimary ca'se & i#ci+e#ts &r m&bie 'sers. Am&st ha +>t
'se basic *reca'tis a#+ a thir+ 8ere 0ictims & iega acti0ities ast year. %hat>s 0ery
ccer#i#g is that7 gi0e# the a8are#ess e0e & 'sers regar+i#g cyber threats7 y asma *&rti & m&bie 'sers 2$ ha0e i#stae+ sec'rity s&t8are a#+ 5 are#>t
a8are & e9iste#ce & sec'rity s&'tis &r m&bie e#0irme#ts. These #'mbers e9*ai#
8hy m&bie tech#&&gy is s& attracti0e &r cybercrime. I# the ma?&rity & cases7 the
systems are t&tay e9*&se+ t& cyber threats +'e t& ba+ habits a#+ ris"y beha0i&r.
The greatest chae#ge &r the m&bie sect&r is the *r&misc'&'s 'sage & 'sers. )4 'se
*ersa m&bie +e0ices i# the 8&r"&rce7 8ith seri&'s re*erc'ssis the &0era
sec'rity & b'si#esses a#+ e#ter*rises. Csi+er that 3$ re0eae+ that say their c&m*a#y
has #& *&icy t& reg'ate that matter.
If this was a test, mobile consumers would be failing. 1hile consumers are protecting
their computers, there is a general lac! of awareness to safeguard their smartphones and
tablets. Its as if they have alarm systems for their homes, but theyre leaving their cars
unloc!ed with the windows wide open.# said 2arian 2erritt, Internet 3afety 4dvocate,
and 3ymantec.
Cybercrime acti0ity aects the *ri#ci*a tre#+s & IT. Ne8 b'si#ess &**&rt'#ities7 m&bie
*at&rms7 c&'+s a#+ s&cia me+ia are csi+ere+ *ri0iege+ 0ect&rs t& reach a 8i+e
a'+ie#ce '#a8are & cyber threats. The 213 N&rt re*&rt highights the i#ci+e#ce &
cybercrime s&cia me+ia. Users> ris"y beha0i&r is res*sibe &r ma#y i#ci+e#ts. 12
& 'sers re0eae+ that s&mee has hac"e+ their acc&'#t i# the ast year. I# 34 & cases7
'sers +>t &g &'t ater each sessi a#+ 25 share s&cia me+ia cre+e#tias. O#e i#
three acce*ts re;'est &rms r&m '#"#&8# *arties.
These ris"y *ractices are 0ery +a#ger&'s a#+ are a csi+erabe ca'se & the i#crease &
cyber@attac"s. O# the &ther si+e7 cyber crimi#as are a+&*ti#g hac"i#g tech#i;'es that are
e0e# m&re s&*histicate+. S*eciicay +esig#e+ ma8are a#+ *hishi#g cam*aig#s are the
m&st c&mm tech#i;'es & attac"s &bser0e+ i# rece#t mths.
-
7/26/2019 Hacking and Cybercrime
15/23
"odays cyber criminals are using more sophisticated attac!s, such as ra#s&m8are a#
s*ear@*hishi#g7 8hich yield them more money per attac! than ever before,# said 3tephen
"rilling, hief "echnology $fficer, 3ymantec.
/reat i#terest is +e+icate+ t& c&'+ c&m*'ti#g7 a#+ i# *artic'ar t& c&'+ st&rage s&'tis
that ma"e it easy t& archi0e a#+ share ies. 2) & 'sers 'se the same c&'+ st&rage
acc&'#t &r *ersa a#+ 8&r" acti0ities. 1( share their c&ecti & +&c'me#ts 8ith
their rie#+s. O#ce agai#7 ba+ habits aciitate cybercrime. C&'+ ser0ices b'#+e a
m'tit'+e & +ata ser0ices i# e *ace7 s& they>re attracti0e targets &r hac"ers.
F%!'re ( Cy#er$r%&e +d $o'd s"or!e /#%"s *Sy&+"e$,
2. T/e 5/%oso5/y #e/%+d "/e s$e+e
2.4.1 Cybercrime in UK case study
T& cte9t'ais i#teresti#g t& csi+er the +ata a0aiabe &r
a c&'#try i"e the U#ite+ ,i#g+&m. It>s e & the #atis 8ith the highest tech#&&gica
*e#etrati e0es. The +ata *'bishe+ i# a rece#t st'+y c+'cte+ by cyber sec'rity
e9*erts at the U#i0ersity & ,e#t is m&re sh&c"i#g. O0er 4 mii a+'ts i# Britai# ha0e
ha+ i#e acc&'#ts hac"e+7 a#+ ( & the U, citi
-
7/26/2019 Hacking and Cybercrime
16/23
The mai# crime s'ere+ by U, i#e 'sers is the hac"i#g & their 8eb ser0ices
acc&'#ts. Th&se i#c'+e i#e ba#"i#g7 emai7 a#+ s&cia me+ia. I# #eary 33 & the
cases7 the &e#se 8as re*eate+.
I# 2137 the U, g&0er#me#t +&c'me#te+ i# a# &icia re*&rt that the &0era c&st &
cybercrime ec&my 8as 2 bii a year. I+e#tity thet 8as m&st c&mm crime7
acc&'#ti#g &r 1. bii. That 8as &&8e+ by i#e scams7 8ith 1.) bii.Cybercrime i# the U, 8as m&st i#si+i&'s &r &rga#i
-
7/26/2019 Hacking and Cybercrime
17/23
The cam*aig#7 +'bbe+ Stay Sae O#i#e7 is mea#t t& a++ress the gr&8i#g ccer#s
cybercrime as m&re R8a#+a#s cti#'e t& embrace i#&rmati a#+ c&mm'#icati
tech#&&gy ICT.
Acc&r+i#g t& R8a#+a Utiities Reg'at&ry Age#cy RURA7 i#ter#et *e#etrati rate has
rise# r&m .1 i# 23 t& .) by '#e 212.
!&8e0er7 ami+st this achie0eme#t7 e#ters cybercrime7 the '#8a#te+ esc&rt & a this
a+0a#ceme#t a#+ i##&0atis i# ICT 'se7 the &st i# ig're 8as #&t +ramaticay
a##&'#ce+ b't & ca'se it is. Cyber@attac"s t& s*eciic sect&rs s'ch as m&bie mey
tra#ser ca# be +isastr&'s t& the #atia ec&my. I# 21)7 the sect&r ha+ m&re tha# 1)
mii tra#sactis 8&rth &0er R8 $41 bii.
Amg the sect&rs m&st targete+ by cyber@attac"s is the ba#"i#g sect&r a#+
teec&mm'#icati c&m*a#ies 8hereby the R8a#+a Natia =&ice as& has a i#a#cia
I#teige#ce U#it attache+ t& Natia Ba#" & R8a#+a7 that i#0estigates i#a#cia a#+
cybercrimes i# ba#"s.
R8a#+a Natia =&ice RN= 8i#g is tryi#g its best t& ctai# these IT cme# a#+ as
a matter & act they he+ a# a#ti@cybercrime trai#i#g this year 8ith the he* & I#ter*& t&
e;'i* &icers 8ith s"is t& +etect a#+ i#0estigate cybercrime7 '#+ersta#+ cyber
terr&rism7 *ri#ci*es & e0i+e#ce c&ecti &r cybercrime7 eectric mey tra#ser
tech#&&gy7 a#+ basic IT t&&s i# a#ays a't&mate+ +ata *r&cessi#g system &r
simiar systems 8ith i#te#t t& i#+ &'t eectricay st&re+ &r tra#smitte+ +ata7 regar+ess
& the &cati is iabe t& a term & im*risme#t & e 1 year t& three 3 years a#+ a
i#e & e mii 177 t& three mii 377 R8a#+a# ra#cs.
2.; Cy#er$r%&e s Ser3%$e
The terms Attac"@as@a@Ser0ice7 :a8are@as@a@Ser0ice7 a#+ Fra'+@as@a@Ser0ice are
'se+ t& ;'aiy m&+es & sae i# 8hich cybercrimi#as se &r re#t their c&eag'es
hac"i#g ser0ice a#+ maici&'s c&+e7 t& c+'ct iega acti0ities. The cce*t is
re0&'tiary7 the bac" mar"et &ers e#tire i#rastr'ct'res t& ser0ice ma8are e.g.
b'et@*r&& h&sti#g &r re#t c&m*r&mise+ machi#es begi#g t& h'ge b&t#ets7 a#+
-
7/26/2019 Hacking and Cybercrime
18/23
&'ts&'rci#g a#+ *art#ershi*s ser0ices7 i#c'+i#g s&t8are +e0e&*me#t7 hac"i#g ser0ices7
a#+7 & c&'rse7 c'st&mer s'**&rt.
The ma?&rity & these ser0ices are *rese#te+ i# the '#+ergr&'#+ ec&my7 base+ a
s'bscri*ti &r at@rate ee m&+e7 ma"i#g them ce#ie#t a#+ attracti0e. The *ri#ci*a
c&st & arra#gi#g crimi#a acti0ities is share+ bet8ee# a c'st&mers. This 8ay7 ser0ice
*r&0i+ers c&'+ i#crease their ear#i#gs7 a#+ cie#ts be#eit r&m a se#sibe re+'cti &
their e9*e#+it're7 8ith the "#&8e+ge #ee+e+ t& ma#age iega b'si#esses.
These ser0ices are characteri
-
7/26/2019 Hacking and Cybercrime
19/23
Tech#&&gies s'ch as m&bie a#+ s&cia #et8&r"i#g are i#creasi#gy threate#e+ by cyber
crimi#as. They>re a+a*ti#g cs&i+ate+ attac" meth&+s t& th&se *at&rms7 a#+ are
+ei#i#g #e8 &e#si0e strategies.
"he proliferation of mobile devices will lead to an amplification of abuse based on
!nowledge8attac! vectors targeting to social media.#
Acc&r+i#g t& sec'rity e9*erts a#+ sec'rity irms7 bac" mar"et &ers s'**&rt the gr&8th
& cyber threats 8ithi# the cybercrime ec&system.
As re*&rte+ i# ENISA Threat a#+sca*e7 :i+@Kear 2137 the &&8i#g t&* threats are
ca#+i+ates t& +&mi#ate the crimi#a a#+sca*e i# the me+i'm term
Dr%3e4#y4e=5o%"s: Br&8ser@base+ attac"s sti remai# the m&st re*&rte+
threats7 a#+ a0a remai#s the m&st e9*&ite+ s&t8are &r this "i#+ & threat.
!orms"#ro$ans: S&*histicate+ ma8are is 'se+ by cyber crimi#as a#+
g&0er#me#ts &r 0ari&'s *'r*&ses7 s'ch as &e#si0e attac"s7 cyber es*iage7
a#+ s&*histicate+ cyber scams.
Cybercrime ma"es e9te#si0e 'se & ma8are7 es*eciay &r ba#"i#g ra'+.
The m&bie *at&rm a#+ s&cia #et8&r" sit'ati is 0ery ccer#i#g. Th&se
*at&rms are e9*&ite+ t& s*rea+ arge@scae maici&'s age#ts.
Code I+>e$"%o+: Attac"s are #&taby *&*'ar agai#st 8eb Cte#t
:a#ageme#t Systems C:Ss. D'e t& their 8i+e 'se7 *&*'ar C:Ses
cstit'te a csi+erabe attac" s'race that has +ra8# the atte#ti & cyber@
crimi#as. C&'+ ser0ice *r&0i+i#g #et8&r"s are i#creasi#gy 'se+ t& h&st
t&&s &r a't&mate+ attac"s.
B&t#ets7 De#ia & Ser0ices7 r&g'e8areJscare8are7 targete+ attac"s7 i+e#tity thet a#+
search e#gi#e *&isi#g 8i cti#'e t& re*rese#t a seri&'s me#ace t& the IT
c&mm'#ity.
My eyes "o 5red%$" "/e %!'o's +d $o+s"r%+"s %+ "/e +e=" $o&%+! yers
Base the e0&'ti & tech#&&gy 8here #e8 a#+ massi0e tech#&&gy emerge7 I t&&"
time t& as" myse the &&8i#g ;'esti
%hat 8i the cybercrime a#+sca*e &&" i"e i# 22P It>s +iic't t& *re+ict the
e0&'ti & s'ch a c&m*e9 ec&system. Tech#&&gies e0&0e at im*ressi0e s*ee+7 a#+
8ith them7 &**&rt'#ities &r cybercrime.
-
7/26/2019 Hacking and Cybercrime
20/23
The ass'm*ti ca# be '#+eri#e+ i# the three +iere#t *ers*ecti0es7 r&m a# i#+i0i+'a7
c&m*a#y a#+ g&0er#me#t *&i#t & 0ie8.
The 8&rst@case are the &&8i#g
I#crease+ ab'se &r c&'+ i#rastr'ct'res. Cyber crimi#as 8i i#crease the
'se & c&'+ tech#&&gy t& a'#ch DDOS attac"s7 &r h&st b&t#ets.
U#+ergr&'#+ mar"et &eri#gs 8i mat're t& s'**&rt cyber ga#gs i# the
&rga#i
-
7/26/2019 Hacking and Cybercrime
21/23
I#terce*ti &r es*iage
:a#i*'ati & i#&rmati &r #et8&r"s
Data +estr'cti
:is'se & *r&cessi#g *&8er
C&'#tereit items
E0asi t&&s a#+ tech#i;'es
It is #ecessary that cyber strategies & g&0er#me#ts i#c'+e a series & mitigati
c&'#termeas'res &r *ri#ci*a cyber threats. Critica i#rastr'ct're a#+ +ee#se systems
8i re*rese#t *ri0iege+ targets &r cyber crimi#as a#+ state s*s&re+ hac"ers.
CONCLUSION
The +ata *r&0i+e+ by sec'rity irms the g&ba im*act & cybercrime are ?'st a ra8
estimati i# my &*i#i. They c&'+ gi0e a rea+er ?'st a basic i+ea & the &0era +amage
ca'se+ by iega acti0ities. A#ay
-
7/26/2019 Hacking and Cybercrime
22/23
2 Too $y#er$r%&e:crime i# 8hich a c&m*'ter is 'se+ as a t&& i# c&mmitti#g the
&e#se. I# this categ&ry7 crime agai#st *r&*erty7 i#c'+i#g thet7 ra'+ a#+ e9t&rti a#+
crime agai#st *erss7 i#c'+i#g *hysica harm a#+ *sych&&gica harm are e9ami#e+.
3 Co&5'"er %+$%de+":crimes i# 8hich a c&m*'ter *ays a mi#&r r&e i# c&mmitti#g
the &e#se. I# this categ&ry7 the chae#ges &r c&ecti#g the e0i+e#ce are *rese#te+7
8hich i#c'+e e0i+e#tiary chae#ge a#+ +igita *ri0acy.
REFERENCES
S'sa# %. Bre##er7 6Cybercrime Crimi#a Threats r&m Cybers*ace76 =raeger7 217
ISBN@13 4(@3133$5)$1.
atha# C&'gh7 6=ri#ci*es & Cybercrime76 Cambri+ge7 217 ISBN@13 4(@
521(44253.
Bac" !at System i#"s y&'r ace t& y&'r S&cia Sec'rity #'mber a#+ &ther *ri0ate
thi#gs6M htt*JJ888.#et8&r"8&r+.c&mJ#e8sJ211J(111@bac"hat@acia@
rec&g#iti.htm QA #e8s ta"i#g ab&'t e hac"i#g meth&+ t& get *e&*es *ri0ate +ata.
%hita"er Ne8ma#7 =e#etrati Testi#g a#+ Net8&r" Dee#se7 Cisc& =ress7
I#+ia#a*&is7 IN. 2$. ISBN 1@5(5@2(@3.
htt*JJres&'rces.i#&seci#stit'te.c&mJcybercrime@a#+@the@'#+ergr&'#+@mar"etJ
htt*JJsec'rityaairs.c&J8&r+*ressJ1(2$Jcyber@crimeJ@sec're@threat@re*&rt@h3@
213.htm
htt*JJsec'rityaairs.c&J8&r+*ressJ1(51Jcyber@crimeJ*em@213@c&st@&@cyber@
crime.htm
htt*JJsec'rityaairs.c&J8&r+*ressJ1()5Jcyber@crimeJ213@#&rt@re*&rt.htm
htt*JJ888.cybersec."e#t.ac.'"JS'r0ey1.*+
htt*JJ888.emc.c&mJc&ateraJra'+@re*&rtJc'rre#t@state@cybercrime@213.*+
htt*sJJ888.ics*a.&rgJ'*&a+sJme+iaJICS=A=r&?ect22
E2(43Sce#ari&s&rtheF't're&Cybercrime.*+
http://resources.infosecinstitute.com/cybercrime-and-the-underground-market/http://securityaffairs.co/wordpress/18206/cyber-crime/f-secure-threat-report-h3-2013.htmlhttp://securityaffairs.co/wordpress/18206/cyber-crime/f-secure-threat-report-h3-2013.htmlhttp://securityaffairs.co/wordpress/18517/cyber-crime/ponemon-2013-cost-of-cyber-crime.htmlhttp://securityaffairs.co/wordpress/18517/cyber-crime/ponemon-2013-cost-of-cyber-crime.htmlhttp://securityaffairs.co/wordpress/18475/cyber-crime/2013-norton-report.htmlhttp://www.cybersec.kent.ac.uk/Survey1.pdfhttp://www.emc.com/collateral/fraud-report/current-state-cybercrime-2013.pdfhttps://www.icspa.org/uploads/media/ICSPA_Project_2020_%E2%80%93_Scenarios_for_the_Future_of_Cybercrime.pdfhttps://www.icspa.org/uploads/media/ICSPA_Project_2020_%E2%80%93_Scenarios_for_the_Future_of_Cybercrime.pdfhttp://resources.infosecinstitute.com/cybercrime-and-the-underground-market/http://securityaffairs.co/wordpress/18206/cyber-crime/f-secure-threat-report-h3-2013.htmlhttp://securityaffairs.co/wordpress/18206/cyber-crime/f-secure-threat-report-h3-2013.htmlhttp://securityaffairs.co/wordpress/18517/cyber-crime/ponemon-2013-cost-of-cyber-crime.htmlhttp://securityaffairs.co/wordpress/18517/cyber-crime/ponemon-2013-cost-of-cyber-crime.htmlhttp://securityaffairs.co/wordpress/18475/cyber-crime/2013-norton-report.htmlhttp://www.cybersec.kent.ac.uk/Survey1.pdfhttp://www.emc.com/collateral/fraud-report/current-state-cybercrime-2013.pdfhttps://www.icspa.org/uploads/media/ICSPA_Project_2020_%E2%80%93_Scenarios_for_the_Future_of_Cybercrime.pdfhttps://www.icspa.org/uploads/media/ICSPA_Project_2020_%E2%80%93_Scenarios_for_the_Future_of_Cybercrime.pdf -
7/26/2019 Hacking and Cybercrime
23/23
htt*JJ888.theg'ar+ia#.c&mJtech#&&gyJ213Ja'gJ23Jcybercrime@hits@#i#e@mii@'"@
8eb@'sers
htt*JJ888.'#&+c.&rgJ+&c'me#tsJ&rga#i