CYBER-CRIME, ATTACK & VIRUS [IT Trends PGDCA/DCA]
CYBER-CRIME, ATTACK & VIRUS [IT Trends PGDCA/DCA]
cyber-crime-cyber-attack-virus |
What is cybercrime?
Cybercrime involves criminal activities that focus on exploiting or utilizing computers, computer networks, or networked devices. The majority of cybercrime is perpetrated by cybercriminals or hackers with financial motives. Perpetrators of cybercrime can be individuals or groups, ranging from highly organized and technically proficient individuals to inexperienced hackers. In some cases, cybercrime may have non-monetary objectives, such as political or personal reasons.
Types of cybercrime
The majority of cybercrime can be classified into two primary categories:
criminal activity that directly targets computers and
criminal activity that utilizes computers to facilitate other illegal activities.
Cybercrime targeting computers frequently involves the dissemination of viruses and various forms of malware.
Malware
Malware, short for malicious software, refers to a variety of harmful computer programs such as viruses, worms, Trojans, and others that hackers use to cause damage and obtain unauthorized access to confidential information. According to Microsoft, malware is a broad term that encompasses any software designed to harm a single computer, server, or computer network. In essence, software is classified as malware based on its intended purpose, rather than the specific technique or technology used in its development.
![]() |
Malware & Types of malware |
The distinction between malware and a virus is often misunderstood. It is important to note that a virus falls under the category of malware. Therefore, all viruses can be classified as malware, but not all forms of malware are viruses.
Types of malware
There
are a number of different ways of categorizing malware.
1. A worm is an independent form of malicious software that replicates and moves from one computer to another.
2. A virus is a type of computer code that embeds itself in the code of another independent program, compelling that program to carry out harmful actions and spread.
3. A trojan is a software program that lacks the ability to replicate itself, instead pretending to be something desirable to the user in order to deceive them into activating it for the purpose of causing harm and spreading.
![]() |
types of malware |
Spyware
Spyware denotes software that covertly implants itself on your computer and initiates concealed monitoring of your online behavior without your awareness or consent. This type of malware discreetly gathers information about individuals or organizations and transmits it to other entities. These entities may comprise advertisers or marketing data companies, which is why spyware is sometimes labeled as "adware." It is typically installed without user agreement through techniques such as drive-by downloads, trojans bundled with legitimate programs, or deceptive pop-up windows.
![]() |
Spyware |
Spyware employs your internet connection to send personal information such as your name, address, browsing behavior, preferences, interests, or downloads. Different variations of spyware hijack your browser to redirect it to another site, prompt your device to make calls or send texts automatically, or show bothersome ads even when you are not connected to the internet. Spyware that steals your username, password, or other credentials is labeled as a “keylogger” – a crucial component for cybercrime.
Symptoms of a spyware infiltration may present as unwarranted actions and a decrease in system performance. It has the capability to utilize CPU capacity, disk space, and network traffic. Common stability concerns include applications freezing, boot failures, connectivity difficulties with the internet, and system crashes.
Spam Mail/Email spam
Spam emails are frequently utilized for commercial purposes, despite being considered unethical by some. Many businesses continue to send spam due to its extremely low cost per email and the ability to consistently send out large quantities. However, it is important to note that spam emails can also pose a security threat by attempting to gain unauthorized access to your computer. Most spam emails are dangerous as they may contain links to phishing websites or sites hosting malware, or even include malware as file attachments. Spammers gather email addresses from various sources such as chat rooms, websites, customer lists, newsgroups, and viruses that extract addresses from users' address books. These collected email addresses are sometimes sold to other spammers.
Logic Bombs
When discussing cybersecurity threats, it is essential to mention logic bombs, which are detrimental programs designed to activate upon meeting a specific logical condition. This condition could be triggered by the completion of a specific number of transactions or the arrival of a predetermined date (also known as a time bomb). It is worth noting that logic bombs are frequently embedded within malware like worms, which initially operate in a certain manner and subsequently alter their tactics at a predefined date and time.
Logic bomb |
A logic bomb, sometimes referred to as slag code, is a set of malicious code utilized to inflict harm on a network once certain conditions are met. The term is derived from the concept that a logic bomb "explodes" when activated by a specific event, such as a particular date or time, the deletion of a specific record from a system, or the initiation of an infected software application.
How logic bombs work
The insertion of logic bombs into a computer network is accomplished through the use of malicious code, done in a clandestine manner. This code can be embedded within the computer's pre-existing software or bundled alongside other malicious software like viruses, worms, or Trojan horses. Subsequently, these logic bombs remain inactive and often remain undetected until the specified trigger event occurs.
Denial-of-service attack (DOS attack)
A denial-of-service attack, also known as a DOS attack, is a type of cyber-attack where the attacker aims to render a machine or network resource inaccessible to its rightful users by disrupting the services of a host connected to the Internet, either temporarily or permanently. This is usually done by overwhelming the targeted machine or resource with excessive requests in order to overload systems and block legitimate requests from being processed.
![]() |
Dos Attack |
Distributed Denial-of-service attack (DDoS attack)
![]() |
DDos Attack |
Hacking
Hacking involves the deliberate act of exploiting a computer system or infiltrating a private network within a computer. In essence, it refers to the unauthorized manipulation or control of computer network security systems with the intention of carrying out illicit activities.
The roots of hacking date back to the early days of computing, as individuals with a thirst for knowledge sought to uncover the inner workings of systems. Over time, hacking has transformed into a complex domain, incorporating diverse motivations and techniques.
Hackers utilize a variety of methods, encompassing social engineering, deploying malware, and exploiting vulnerabilities in software. The motivations driving hacking activities can differ significantly, ranging from seeking financial benefits and engaging in espionage to promoting activism and satisfying curiosity.
In order to provide a more accurate description of hacking, it is essential to have a thorough understanding of hackers. It is common to perceive them as individuals with high intelligence and exceptional computer skills. Contrary to popular belief, hacking into a security system demands a greater level of intelligence and expertise compared to building one from scratch. There are no definitive criteria for classifying hackers into distinct categories. Nevertheless, within the realm of computer terminology, they are often referred to as white hats, black hats, and grey hats.
![]() |
hackers & their classification |
1. White hat hackers conduct security tests on their own systems to enhance their security measures against hacking attempts. Typically, these professionals are affiliated with the same organization.
2. Black hat hackers infiltrate systems with the intention of gaining personal benefits by either causing damage, stealing information, or blocking authorized users from accessing the system. They exploit vulnerabilities within the system. Some refer to them as crackers instead of hackers.
3. Grey hat hackers are individuals with a level of computer knowledge that allows them to explore potential weaknesses in network security systems by hacking into them out of curiosity.
Grey hats distinguish themselves from black hats by responsibly reporting any weaknesses they find in the system to the network system administrator. Conversely, black hats engage in hacking activities solely for their own gain. It is crucial to understand that all types of hacking are illegal, with the exception of the work carried out by white hat hackers.
Type of Hacking
• Website
• Password
• Network
• Computer
• Online Banking
Phishing
![]() |
Phishing |
Spoofing
Spoofing
attacks come in many forms, primarily:
• Email spoofing:-Email spoofing involves the manipulation of email headers by attackers in order to create the illusion that the message originates from a credible sender, frequently impersonating well-known organizations or individuals.
• Website and/or URL spoofing:-Website spoofing is the act of developing counterfeit websites that imitate authentic ones in order to trick individuals into providing confidential details, like login information or credit card numbers.
• Caller ID spoofing:-Caller ID spoofing enables attackers to manipulate the caller identification information displayed on recipients' phones to mask their true identity and deceive them into answering or trusting the call.
• GPS spoofing:-GPS spoofing involves manipulating GPS signals to provide false location information to navigation systems, mobile devices, or unmanned vehicles.
• IP spoofing:- IP spoofing is the act of falsifying the source IP address of network packets in order to hide the true origin of the communication or to mimic a different system.
![]() |
Spoofing |
Identity Theft
Identity theft, also known as identity fraud, Identity theft is a widespread criminal act that entails the theft of an individual's personal data in order to engage in fraudulent or illicit behavior. This purloined information may encompass social security numbers, credit card details, bank account information, and additional sensitive data. Culprits frequently exploit this data to conduct unauthorized transactions, establish fake accounts, or even fully adopt the victim's identity.
Various techniques are employed by cybercriminals to acquire this information, which includes phishing scams, data breaches, or even theft of physical documents. Once obtained, these stolen details can be utilized to fraudulently open accounts, make unauthorized purchases, or engage in other financial crimes using the victim's identity.
Identity theft can result in serious repercussions for individuals, such as monetary setbacks, compromised credit scores, legal issues, and emotional strain. Uncovering and addressing identity theft can prove to be difficult, as victims must notify the authorities about the crime and implement measures to restore their credit and safeguard their accounts.
Types of identity theft
Identity
theft is categorized in two ways:
True name
The act of true-name identity theft involves the unauthorized utilization of personal details to initiate the establishment of novel accounts. This could encompass actions such as opening a credit card account, activating cellular phone service, or setting up a new checking account with the intention of obtaining blank checks.
Account takeover
Account takeover identity theft refers to the act of an imposter exploiting personal information to gain unauthorized access to someone's established accounts. Typically, the fraudster manipulates the account's mailing address and incurs significant expenses before the victim detects any wrongdoing. The internet has played a pivotal role in enabling identity thieves to utilize the stolen data, as transactions can be conducted devoid of any personal interaction.
![]() |
identity theft & their type |
Type of Identity -Theft
How to protect yourself against cybercrime
conclusion
Frequently Asked Question(FAQ)
What is cybercrime?
Cybercrime involves criminal activities that focus on exploiting or utilizing computers, computer networks, or networked devices.
What is Malware?
Malware, short for malicious software, refers to a variety of harmful computer programs such as viruses, worms, Trojans, and others that hackers use to cause damage and obtain unauthorized access to confidential information.
What is Spyware ?
Spyware denotes software that covertly implants itself on your computer and initiates concealed monitoring of your online behavior without your awareness or consent.
What is Logic Bombs ?
A logic bomb,is a set of malicious code utilized to inflict harm on a network or computer once certain conditions are met.
What is Denial-of-service attack (DOS attack) ?
It is a type of cyber-attack where the attacker aims to render a machine or network resource inaccessible to its rightful users by disrupting the services of a host connected to the Internet, either temporarily or permanently.
Post a Comment