Intro To Cybercrime Hand Out p2
Intro To Cybercrime Hand Out p2
Understanding the world of cybersecurity involves recognizing the diverse spectrum of hackers, each
with distinct motives and methodologies. Here are different types of hackers, along with their definitions
and examples:
White hat hackers are cybersecurity professionals who use their skills to find vulnerabilities in
systems, networks, or applications with the owner's permission. Their goal is to improve security.
Example: A white hat hacker may conduct a penetration test on a company's website to identify and fix
security weaknesses before malicious hackers exploit them.
Black hat hackers are individuals or groups engaged in illegal hacking activities. They exploit
vulnerabilities for personal gain, often involving theft, fraud, or damage.
Example: Malware developers who create ransomware to extort money from victims are considered
black hat hackers.
Grey hat hackers operate in a morally ambiguous area. They may hack into systems without
authorization but not necessarily for malicious purposes. They may disclose vulnerabilities publicly to
prompt fixes.
Example: A grey hat hacker might discover a security flaw in a software application and inform the
company but also publicly disclose the vulnerability if the company doesn't respond promptly.
Script Kiddies:
Script kiddies are individuals with limited technical skills who use pre-written scripts or tools to
launch cyberattacks. They typically lack in-depth knowledge but can still cause harm.
Example: Someone using a readily available tool to launch a DDoS (Distributed Denial of Service) attack
on a website without understanding the underlying technology.
Hacktivists:
Hacktivists are hackers who pursue political or social causes through cyberattacks or digital
activism. They aim to raise awareness or disrupt organizations they oppose.
Example: The hacktivist group Anonymous has targeted various government and corporate websites to
protest issues like censorship and human rights violations.
State-Sponsored Hackers:
Example: A well-known case involves alleged Russian state-sponsored hackers targeting various
international organizations and governments.
Cybersecurity Researchers:
These individuals are not hackers in the traditional sense but experts in cybersecurity. They play
a crucial role in identifying vulnerabilities and developing defenses.
Example: Renowned cybersecurity researcher Kevin Mitnick, after serving time for hacking, shifted his
focus to helping organizations improve their security.
Understanding the motivations and methods of these different hacker types is essential for safeguarding
cyberspace and mitigating the risks associated with cybercrimes.
Financial Gain: Cybercriminals may steal financial information, engage in ransomware attacks, or
conduct credit card fraud to profit financially.
Hacktivism: Hackers may target organizations or governments to promote a political or social agenda,
exposing corruption or advocating for change.
Espionage: Nation-state actors may conduct cyber espionage to gain a competitive advantage or gather
intelligence.
Revenge: Individuals may launch cyberattacks out of personal vendettas, seeking to harm specific
individuals or organizations.
Thrill-Seeking: Some cybercriminals are motivated by the challenge and excitement of hacking, often
referred to as "hacktivists."
DarkTequila: Active in Latin America, targeting financial institutions with banking trojans.
Lizard Squad: Known for DDoS attacks on gaming networks and websites.
APT29 (Cozy Bear): Linked to the Russian government, involved in cyber espionage.
FIN7 (Carbanak): Stole millions from financial institutions using phishing and malware.
Lazarus Group: Linked to North Korea, involved in cyber espionage and attacks on critical infrastructure.
Computer Viruses: Malicious software that attaches to legitimate programs or files, replicating itself and
spreading to other systems. Example: "ILOVEYOU."
Worms: Self-replicating programs that spread independently, often over networks, without the need for
a host file. An example is the "Morris Worm," which exploited vulnerabilities in early internet systems
and significantly disrupted services.
INTRODUCTION TO CYBERCRIME
3
Trojans: Software that appears legitimate but contains hidden malicious functions. A well-known
instance is the "Stuxnet" Trojan, which targeted industrial control systems and disrupted Iran's nuclear
program.
Ransomware: Malware that encrypts a victim's files and demands a ransom for decryption. A prominent
case is the "WannaCry" ransomware attack that affected organizations globally, demanding payments
in Bitcoin for data recovery.
Spyware: Software that secretly collects user information and transmits it to malicious actors. An
example is a "Keylogger" spyware, which records keystrokes and sensitive data without the user's
knowledge.
Adware: Displays unwanted advertisements and may collect user data without consent. "AdChoices" is
an example of adware that tracks user behavior to deliver targeted ads.
Background: The "ILOVEYOU" virus, also known as the "Love Bug" or "Love Letter," is one of the most
infamous computer viruses in history. It emerged in May 2000 and quickly spread globally.
Propagation: The virus was distributed via email with a subject line that read "ILOVEYOU." Inside the
email, there was an attachment named "LOVE-LETTER-FOR-YOU.TXT.vbs." When unsuspecting users
opened this attachment, the virus activated.
Payload: Once activated, the virus executed a malicious VBScript code that overwrote and damaged
various types of files on the infected computer, including images, documents, and audio files. It also had
the ability to spread itself to the victim's email contacts, leading to rapid proliferation.
Impact: The "ILOVEYOU" virus caused widespread disruption, infecting millions of computers worldwide
within hours. It resulted in data loss, financial damages, and the temporary shutdown of email systems.
Origin: The virus was traced back to the Philippines, and two Filipino individuals, Onel de Guzman and
Reonel Ramones, were identified as possible suspects. However, due to gaps in Philippine law at the
time, no charges were filed, and the true authorship remains disputed.
Aftermath: The "ILOVEYOU" virus served as a wake-up call for the cybersecurity community, highlighting
the vulnerability of computer systems to social engineering attacks via email. It prompted organizations
and individuals to improve their security practices and led to the development of stronger email filtering
and antivirus solutions.
The "ILOVEYOU" virus remains a significant milestone in the history of cybercrimes, illustrating the
destructive potential of malware and the need for robust cybersecurity measures.
Pre-20th Century:
An ancient counting device that uses beads on rods to perform arithmetic operations.
20th Century:
The Electronic Numerical Integrator and Computer (ENIAC) was one of the earliest electronic general-
purpose computers.
21st Century:
The iPhone revolutionized mobile communication with its touch screen and app ecosystem.
1. Central Processing Unit (CPU): The CPU is the central brain of the computer, responsible for
executing instructions and performing calculations. It interprets and processes data, making it
the core component of any computer system.
Types:
Microprocessors: These are small, integrated CPUs commonly found in personal computers and
laptops. Examples include Intel Core i7 and AMD Ryzen processors.
Mainframe CPUs: Large-scale computers, such as mainframes, have specialized CPUs designed
for high-performance computing and data processing.
2. Memory (RAM and ROM): Memory in a computer system refers to the ability to store and
retrieve data. Two primary types of memory are RAM (Random Access Memory) and ROM (Read-
Only Memory).
Types:
RAM (Random Access Memory): RAM is volatile memory that provides high-speed data access
for running applications. Examples include DDR4 and DDR5 RAM.
ROM (Read-Only Memory): ROM is non-volatile memory that stores permanent data, such as
firmware and system instructions.
3. Storage Devices (HDD, SSD, and more): Storage devices are used to store data and files long-
term. They come in various types, each with its advantages and disadvantages.
Types:
INTRODUCTION TO CYBERCRIME
5
Hard Disk Drives (HDDs): HDDs use spinning disks to store data. They offer large capacities at a
lower cost but are slower compared to SSDs. Examples include Western Digital Blue and Seagate
Barracuda.
Solid-State Drives (SSDs): SSDs use flash memory for storage. They provide faster data access
and are more durable than HDDs. Examples include Samsung 970 EVO and Crucial MX500.
External Drives: External storage devices, like USB flash drives and external HDDs/SSDs, provide
portable storage options.
Cloud Storage: Services like Google Drive and Dropbox offer online storage accessible from
anywhere with an internet connection.
4. Input Devices: Input devices are hardware components that allow users to provide data or
instructions to the computer. They enable interaction between the user and the system.
Examples:
Touchscreen: Found on tablets and some laptops, it allows direct interaction through touch.
5. Output Devices: Output devices display or produce information from the computer for the user.
They present data in a human-readable form.
Examples:
Computer hardware refers to the physical, tangible components of a computer system that you
can see and touch. In contrast, computer software consists of intangible programs and data that instruct
the hardware on how to perform specific tasks.
INTRODUCTION TO CYBERCRIME
6
Central Processing Unit (CPU): The CPU is a physical microchip that executes instructions and performs
calculations.
Memory Modules (RAM): RAM sticks are physical components that temporarily store data for active
programs.
Storage Drives (HDD, SSD): Hard drives are physical devices for long-term data storage.
Graphics Card: A graphics card is a physical component responsible for rendering images and videos.
Power Supply Unit (PSU): The PSU is a physical device that provides electrical power to the computer.
Computer Software:
Operating System (OS): An OS, like Windows or macOS, is a software that manages hardware resources
and provides a user interface.
Application Software: Examples include Microsoft Office, Adobe Photoshop, and video games.
System Software: This software category includes device drivers, utilities, and antivirus programs.
Web Browsers: Software like Google Chrome and Mozilla Firefox enables internet browsing.
Operating System Kernel: The core of an OS responsible for managing hardware resources.
Device Drivers: These are software components that enable communication between the OS and
hardware devices.
Computer Hardware: Hardware provides the physical foundation for computing. It includes components
like the CPU, memory, and storage devices that execute and store data. Hardware is essential for the
execution of software and the overall functionality of the computer system.
Computer Software: Software serves as the brain of the computer. It includes programs, applications,
and the operating system, which instruct hardware components on how to perform specific tasks.
Software enables users to interact with and utilize hardware for various purposes, from word processing
to gaming.
INTRODUCTION TO CYBERCRIME
7
Function: Smartphones serve as portable computers, enabling communication, internet access, and a
wide range of applications.
Function: Tablets are versatile devices for browsing, entertainment, and productivity.
Laptops and Desktops: Example: Dell XPS 13 (Laptop) and Apple iMac (Desktop).
Function: Laptops and desktops offer powerful computing for various tasks, from work to gaming.
Function: Smart appliances are part of the Internet of Things (IoT) and offer convenience and energy
efficiency.
Operating System (OS): The OS manages hardware resources and provides a platform for running
software applications.
Software Applications: Software applications, or apps, are programs designed for specific tasks or
functions.
Data Storage: Data storage involves saving and retrieving digital data on storage devices.
File Types: File types represent the format and content of digital files, such as .txt, .jpg, and .pdf.
Input/Output (I/O): I/O refers to the communication between a computer and external devices.
User Interface (UI): UI is the point of interaction between the user and the computer, including screens,
menus, and buttons.