What is cyber crime? Cybercrime is a broad term for illegal activities that use computers, networks, or communication devices to commit or facilitate crime. Cybercriminals exploit vulnerabilities in systems and networks to gain unauthorized access, steal sensitive information, and cause harm.
Some type of cybercrime include: Email spoofing Email fraud(Phishing) Identity Theft Data Theft Ransomware DDos Attack
Identity theft is a type of cybercrime that occurs when someone steals your personal information like bank account ,Credit card ,ATM card details and uses it to commit fraud or theft . Identity Theft : Types of Identity Theft : Financial Identity Theft Social Security Identity Theft Medical Identity Theft Tax Identity Theft Criminal Identity Theft
A real-world example of identity theft is the Equifax data breach that occurred in 2017. This breach exposed the personal information of 147 million Americans , including Social Security numbers, birth dates, addresses, and driver's license numbers. Attackers exploited a vulnerability in Equifax's website software, gaining access to sensitive data that could be used for identity theft, such as opening new credit accounts, obtaining loans, or filing fraudulent tax returns. This incident had a massive impact, as millions of people were left vulnerable to identity theft. Equifax was later fined and required to pay over $700 million in settlements to affected individuals. . Example :
Data Theft : Data theft is the act of stealing or duplicating sensitive information such as passwords ,financial records or intellectual property from a device, server, or computer without authorization.
Example: In 2013, Target, one of the largest retail chains in the U.S., experienced one of the most significant data breaches in history. The breach compromised the personal and financial information of around 40 million credit and debit cardholders and the personal data of up to 70 million additional customers. Impact : The breach resulted in massive financial and reputational damage, including $18.5 million in settlement costs.
Email spoofing : Email spoofing is a cyber crime that involves sending emails with a fake sender address to trick recipients into believing the email is from a trusted source. The goal is to deceive the recipient into taking an action, such as visiting a website, downloading malware, or entering account credentials.
How to identify Email spoofing :
A large financial organization with multiple branches globally fell victim to an email spoofing attack in 2021. The attacker impersonated the CEO of the company and sent fraudulent emails to the finance department requesting an urgent wire transfer to a foreign account. The finance department believed the email was legitimate due to its seemingly official nature and the urgency expressed in the message. The company lost $250,000, which could not be recovered due to the transfer being completed before detection. Example :
Phishing : Phishing is a type of online scam where attackers try to trick you into giving them sensitive information, like passwords, credit card numbers, or personal details. They usually do this by pretending to be a trustworthy organization, like a bank or a popular website, and send fake emails or messages asking you to click on a link or download something. Once you do, they can steal your information or infect your device with malware.
A recent real-world phishing attack occurred in 2024 targeting Microsoft users. Attackers sent fake emails that looked like they came from Microsoft services, such as OneDrive, claiming that users needed to verify their accounts or that their storage was full. The email contained a link to a fake login page, which looked identical to the real Microsoft login page. When users entered their credentials, the attackers captured them and gained access to their accounts . Example :
Ransomware : Ransomware is a type of malicious software (malware) that attackers use to lock or encrypt a victim's files, data, or entire system. Once the ransomware infects a computer, the victim is unable to access their data unless they pay a ransom, usually in cryptocurrency like Bitcoin, to the attacker. Even after payment, there's no guarantee the data will be restored.
There are two main types of ransomware: Encrypting Ransomware : Encrypting ransomware is a type of ransomware that encrypts a victim's files and data, making them inaccessible until a ransom is paid. The attacker uses encryption algorithms to lock the files, and the victim receives a message demanding payment (usually in cryptocurrency) in exchange for the decryption key. Without the key, the files remain unusable. 2.Locker Ransomware : Locker ransomware is a type of malware that locks a victim out of their entire computer or device, preventing any access to the system or files. Unlike encrypting ransomware, locker ransomware doesn’t encrypt individual files but instead blocks access to the operating system itself. The attacker then demands a ransom in exchange for unlocking the system.
A real-world example of ransomware is the Colonial Pipeline attack in 2021. This attack was carried out by the darkside ransomware group. The hackers infiltrated the systems of Colonial Pipeline, the largest fuel pipeline in the U.S., encrypting crucial data and forcing the company to shut down operations temporarily. The attack led to fuel shortages across several states. The attackers demanded a ransom, which Colonial Pipeline paid, amounting to approximately $4.4 million in Bitcoin. However, even after paying the ransom, the recovery process took time as not all systems could be restored immediately. Example :
DDos attack : A DDoS attack (Distributed Denial of Service attack) is a type of cyberattack in which multiple compromised computers or devices are used to flood a target server, website, or network with an overwhelming amount of traffic. A DDoS attack uses multiple servers and Internet connections to flood the targeted resource.
Types of DDoS Attacks: Volume-Based Attacks : Volume-based attack that focuses on overwhelming a target’s network bandwidth with massive amounts of traffic. 2. Protocol Attacks: Protocol attack that targets weaknesses in network protocols to exhaust server resources or disrupt network services. 3. Application Layer Attacks: Application layer attack, also known as Layer 7 DDoS attacks, target the top layer of the OSI model, where web applications and services interact with the end user.
On February 28, 2018 , GitHub, one of the largest software development platforms, experienced a massive DDoS attack that lasted about 10 minutes. The attackers exploited a vulnerability in memcached , a caching system used to speed up networks. By sending small queries to misconfigured memcached servers and spoofing GitHub’s IP address, the attackers were able to amplify the traffic by up to 50,000 times . GitHub's DDoS mitigation service responded quickly, rerouting traffic and absorbing the attack within minutes. After about 10 minutes, the attackers ceased their activities, and GitHub’s services were fully restored. Example :
How to protect yourself against cybercrime: 1. Keep software and operating system updated 2. Use anti-virus software and keep it updated 3. Use strong passwords 4. Never open attachments in spam emails 5. Do not click on links in spam emails or untrusted websites 6. Do not give out personal information unless secure 7. Contact companies directly about suspicious requests 8. Be mindful of which website URLs you visit 9. Keep an eye on your bank statements . How to protect yourself against cybercrime: 1. Keep software and operating system updated 2. Use anti-virus software and keep it updated 3. Use strong passwords 4. Never open attachments in spam emails 5. Do not click on links in spam emails or untrusted websites 6. Do not give out personal information unless secure 7. Contact companies directly about suspicious requests 8. Be mindful of which website URLs you visit 9. Keep an eye on your bank statements