Tools and Techniques To Commit Cyber Crime by ANI
Tools and Techniques To Commit Cyber Crime by ANI
program tries to store more data in a temporary storage area than it can hold. Writing outside
the allocated memory area can corrupt the data, crash the program or cause the execution of
malicious code that can allow an attacker to modify the target process address space.
• Data diddling :- Data diddling is a type of cybercrime in which data is altered as it is entered into
a computer system, most often by a data entry clerk or a computer virus. Computerized
processing of the altered data results in a fraudulent benefit. In some cases, the
• Malware :- Malware Defined Malware is the collective name for a number of malicious software
variants, including viruses, ransomware and spyware. Shorthand for malicious software,
malware typically consists of code developed by cyberattackers, designed to cause extensive
damage to data and systems or to gain unauthorized access to a network .
• Phishing :- Phishing is an online scam where criminals send alluring emails to the organization,
user, and more to collect sensitive information. Mostly, this happens through a link sent by an
unknown email domain.
• Rootkit :- A common rootkit definition is a type of malware program that enables cyber
criminals to gain access to and infiltrate data from machines without being detected. It covers
software toolboxes designed to infect
• Salami attack :- A “salami slicing attack” or “salami fraud” is a technique by which cyber-
criminals steal money or resources a bit at a time so that there’s no noticeable difference in
overall size.
• Sniffer :- A sniffer is a software or hardware tool that allows the cyber criminals to “sniff” or
monitor your internet traffic in real time, capturing all the data flowing to and from your
computer.
• Social engineering :- Social engineering is the art of manipulating people so they give up
confidential information. The types of information these criminals are seeking can vary, but
when individuals are targeted the criminals are usually trying to trick you into giving them your
passwords or bank information, or access your computer to secretly install malicious software–
that will give them access to your passwords and bank information as well as giving them
control over your computer.
• Spoofing :- Spoofing is a type of scam in which criminals attempt to obtain someone's personal
information by pretending to be a legitimate business, a neighbor, or some other innocent
party.
• Spyware :- Spyware. Although it sounds like a James Bond gadget, it’s actually a type of malware
that infects your PC or mobile device and gathers information about you, including the sites you
visit, the things you download, your usernames and passwords, payment information, and the
emails you send and receive.
• Steganography :- the practice of concealing messages or information within other nonsecret text
or data.
• Trojan :- A Trojan horse or Trojan is a type of malware that is often disguised as legitimate
software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users'
systems. Users are typically tricked by some form of social engineering into loading and
executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on
you, steal your sensitive data, and gain backdoor access to your system.
• Worm :- A computer worm is a type of malicious software program whose primary function is to
infect other computers while remaining active on infected systems.
• Zombie :- A zombie virus gains access to a computer or smartphone system through the Internet
and takes control of its resources. It uses the infected computer as its launch-pad – sending
viruses, Trojan horses, or malicious data to other systems. While the virus and the harm it
creates spreads, the original perpetrator’s identity remains hidden
• Spam is unsolicited email, instant messages, or social media messages. These messages are fairly
easy to spot and can be damaging if you open or respond.
•
• Phishing is an email sent from an Internet criminal disguised as an email from a legitimate,
trustworthy source. The message is meant to lure you into revealing sensitive or confidential
information.
•
• Spear Phishing occurs when criminals obtain information about you from websites or social
networking sites, and customize a phishing scheme to you.
•
• Spoofing describes a criminal who impersonates another individual or organization, with the
intent to gather personal or business information.
•
• Pharming is a malicious website that resembles a legitimate website, used to gather usernames
and passwords.