0% found this document useful (0 votes)
48 views48 pages

Unit 1

Uploaded by

Aim More
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views48 pages

Unit 1

Uploaded by

Aim More
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 48

CSE459

CYBER LAW AND SECURITY


AUDITING

Unit 1
Introduction to
Cybercrime
Cybercrime

Cybercrime refers to illegal actions using computers or the internet. Some


examples of cybercrime include:

• Stealing and selling corporate data


• Demanding payment to prevent an attack
• Installing viruses on a targeted computer
• Hacking into government or corporate computers
Cybercrime

• Any offenses committed against individuals or groups of individuals to harm


the reputation or cause physical or mental trauma through electronic means
can be defined as Cybercrime.
• Electronic means can include but are not limited to, the use of modern
telecommunication networks such as the Internet (networks including chat
rooms, emails, notice boards and groups) and mobile phones
(Bluetooth/SMS/MMS).
In which type of cybercrime does an
attacker gain unauthorized access to
personal or corporate networks to
steal sensitive information?
A) Identity Theft
B) Hacking
C) Phishing
D) Cyberstalking
Origins of Cybercrime

The telegraph system


• In 1834, two thieves infiltrated the French telegraph system, gained access to financial
markets, and stole data. Many experts consider this event the first cybercrime,
followed by other cybercrimes, each focusing on newly invented technologies.

The telephone system


• The 19th and 20th centuries saw attacks focused on the telephone system. In 1876,
Alexander Graham Bell patented the phone, which allowed transmitting speech using
telegraphy. Two years after the commercialization of this invention, teenage boys
broke into Bell’s telephone company and misdirected calls. In later years (1960s-
1980s), phone hacking (phreaking) became popular.
Origins of Cybercrime

Ethical hacking
In 1940, Rene Carmille, a French computer expert, hacked into the Nazi data registry.
Carmille, a punch card computer expert, used his expertise to reprogram Nazi punch card
machines to prevent them from registering information correctly. His work blocked the Nazis’
attempts to register and track Jewish people.
Phishing scams and malware
In the 1980s, emails became a popular communication form, and by the 1990s, web browsers
and computer viruses rose in popularity. In these years, hackers started using email attachments
to deliver malware and phishing scams and web browsers to spread computer viruses.
1962
The modern history of cybercrime began when Allen
Scherr launched a cyber attack against the MIT
computer networks, stealing passwords from their
database via punch card.
Origins of
1971
Cybercrime The first computer virus was created for research
purposes by Bob Thomas at BBN technologies.
Referred to as the Creeper Virus, the self-replicating
program was detected on the ARPANET in 1971 and
foretold the potential of future viruses to cause
significant damage to computer systems.
1988
The first major cyber attack on the internet came courtesy of
Cornell grad student Robert Morris. The “Morris Worm” struck in
the year before the World Wide Web debuted, back when the
internet was primarily the domain of academic researchers. It
infected computer systems at Stanford, Princeton, Johns Hopkins,
NASA, Lawrence Livermore Labs, and UC Berkeley, among
Origins of other institutions.

Cybercrime 1989
Ransomware made its first appearance. This first strain of
ransomware — the AIDS Trojan — was easy to remove,
rendering it ineffective. Unlike the ransomware of today, this one
appeared on floppy disks, with the cybercriminal handing out
20,000 infected disks to attendees of the World Health
Organization’s AIDS conference.
1994
Datastream Cowboy and Kuji — a 16-year-old
British schoolboy and his accomplice — used a
“password sniffer” program to launch a series of
attacks that crippled the Air Force’s Rome
Laboratory, while stealing research data used as
Origins of attack instructions for warplanes in battle.
Cybercrime
1995
Vladimir Levin was the first known hacker to
attempt to rob a bank. He hacked into Citibank’s
network and conducted many fraudulent
transactions.
• https://konbriefing.com/en-
topics/cyber-
attacks.html#month2024-07
Which of the following represents a
type of cybercrime where criminals
use malicious software to demand
payment from victims?
A) Phishing
B) Ransomware
C) Identity Theft
D) Denial of Service (DoS)
Cybercriminals

• Cybercriminals are hackers and


other malicious users that use the
Internet to commit crimes such as
identity theft, spamming, phishing
and other types of fraud.
Cybercriminals often work together
forming cyber gangs.
Crime against the Individuals: Crimes that are committed by
the cyber criminals against an individual or a person. A few
cyber crimes against individuals are:
• Harassment via electronic mails.
Classifications • Dissemination of obscene material.
• Cyber-stalking.
of
• Defamation.
Cybercrimes • Indecent exposure.
• Cheating.
• Unauthorized control/access over computer system.
• Email spoofing.
• Fraud
Classifications of
Cybercrimes
Crimes against Property: These types of crimes includes vandalism
of computers, Intellectual (Copyright, patented, trademark etc)
Property Crimes, Online threatening etc. Intellectual property crime
includes:
• Computer vandalism.
• Transmitting virus.
• Net-trespass.
• Unauthorized access / control over computer system.
• Internet thefts.
• Intellectual Property crimes- Software piracy, Copyright
infringement, Trademark infringement.
Crime against Organization: Crimes done to threaten the
international governments or any organization by using
internet facilities. These cyber crimes are known as
cybercrimes against Organization. These crimes are
committed to spread terror among people. Cyber terrorism is
Classifications referred as crimes against a government. Cybercrimes against
of Government includes cyber attack on the government website,
military website or cyber terrorism etc.
Cybercrimes
• Unauthorized access / control over computer system.
• Cyber terrorism against the government organization.
• Possession of unauthorized information.
• Distribution of Pirate software.
Classifications of Cybercrimes

Crime against Society: Those cybercrimes which affects the society interest at large are
known as cyber crimes against society, which include:
• Child pornography.
• Indecent exposure of polluting the youth financial crimes.
• Sale of illegal articles.
• Trafficking.
• Forgery.
• Online gambling
Common Types of Cybercrimes
1. Hacking: Unauthorized access to computer systems, often to steal, alter, or destroy data.
2. Identity Theft: Stealing personal information to commit fraud, such as financial theft or accessing confidential
information.
3. Phishing: Fraudulent attempts to obtain sensitive information by disguising oneself as a trustworthy entity via
email, messages, etc.
4. Malware Distribution: Creating and spreading malicious software like viruses, worms, or ransomware to damage
or disrupt systems.
5. Cyberstalking: Using the internet to harass or stalk individuals.
6. Online Fraud: Scams and fraudulent activities conducted online, including credit card fraud and auction fraud.
7. Child Exploitation: Distribution, possession, or production of child pornography or exploitation materials.
8. Cyberterrorism: Use of the internet to conduct terrorist activities, including attacks on critical infrastructure.
9. Data Breach: Unauthorized access and disclosure of sensitive, protected, or confidential data.
Which term describes the use of
malicious software to collect
keystrokes and capture sensitive
information?
A) Malware
B) Keylogging
C) Spoofing
D) Worms
Information
Technology
Act, 2000 as
amended in
2008
Relevant Section in IT
Cyber Crime Brief Description Act Punishments
Stealthily following a
person, tracking their 3 years, or with fine up to
Cyber Stalking internet chats 43, 65, 66 2 lakh
Cyber Pornography Publishing obscene
including child material in electronic form 10 years and fine up to 10
pornography involving children 67, 67A, 67B lakh
Source code tampering,
Intellectual Property piracy, copyright 3 years, or with fine up to
Crimes infringement, etc. 65 2 lakh
Protection against cyber Imprisonment for a term,
Cyber Terrorism terrorism 66F, 69 may extend to life
Destruction, deletion,
alteration, etc. in a 3 years, or with fine up to
Cyber Hacking computer resource 66 5 lakh
Bank financial frauds in 3 years, or with fine up to
Phishing electronic banking 43, 65, 66 2 lakh
1. Use Strong Passwords: Create complex passwords with a mix
of letters, numbers, and special characters. Avoid using easily
guessable information such as birthdays or common words.
2. Enable Two-Factor Authentication (2FA): Use 2FA for an
extra layer of security. This typically involves receiving a code
on your phone in addition to entering your password.
3. Update Software Regularly: Ensure all software, including
operating systems and antivirus programs, are updated to
Cyber-crimes protect against vulnerabilities.
4. Educate Employees and Users: Conduct regular training
prevention sessions on recognizing and avoiding cyber threats.
5. Secure Networks: Use firewalls, encryption, and secure Wi-Fi
connections to protect data and communications.
6. Backup Data: Regularly backup important data to an offline or
cloud storage service to recover information in case of a cyber
attack.
7. Monitor Systems: Use intrusion detection systems and
regularly monitor network traffic for suspicious activities.
Phishing
• Phishing is a type of cybercrime where attackers impersonate legitimate organizations or
individuals via email, messaging, or websites to steal sensitive information such as
usernames, passwords, and credit card details.
• How to Prevent Phishing:
• Verify Emails and Links: Check the sender's email address and hover over links to
verify their legitimacy before clicking.
• Educate Users: Provide training on how to recognize phishing attempts, such as
suspicious emails or unexpected requests for personal information.
• Use Anti-Phishing Tools: Employ browser extensions and email filters that detect
and block phishing attempts.
• Report Phishing: Encourage reporting of phishing attempts to IT departments or
appropriate authorities.
Identity Theft
Identity Theft involves stealing someone's personal information to commit fraud, such as
opening bank accounts, applying for loans, or making unauthorized purchases.

How to Prevent Identity Theft:

• Secure Personal Information: Keep sensitive documents in a safe place and shred any that are no longer
needed.
• Monitor Financial Statements: Regularly check bank and credit card statements for unauthorized transactions.
• Use Secure Websites: Ensure websites are secure (look for "https" in the URL) before entering personal
information.
• Be Cautious with Sharing Information: Avoid sharing personal details on social media and over unsecured
channels.
• Use Identity Theft Protection Services: Consider using services that monitor for signs of identity theft and offer
recovery assistance.
The Colonial Pipeline Ransomware
Attack
• Incident Overview
• In May 2021, the Colonial Pipeline, a major fuel pipeline in the United States, fell
victim to a ransomware attack by the cybercriminal group known as DarkSide.
The attack led to significant disruptions in fuel supply along the East Coast of the
United States, causing widespread panic and fuel shortages.
• How the Attack Happened
1. Initial Access: The attackers gained access to the Colonial Pipeline network
through a compromised VPN account. The account's password had been leaked in
a previous data breach and was not protected by multi-factor authentication
(MFA).
2. Ransomware Deployment: Once inside the network, the attackers deployed
ransomware, which encrypted data and locked Colonial Pipeline out of its
systems.
3. Demand for Ransom: The attackers demanded a ransom payment in
cryptocurrency to provide the decryption key needed to restore access to the
affected systems.
The Colonial Pipeline
Ransomware Attack
• Consequences
• Operational Disruption: The pipeline, responsible for
transporting nearly half of the East Coast's fuel supply, was
shut down for several days, causing fuel shortages and price
increases.
• Ransom Payment: Colonial Pipeline paid the attackers
approximately $4.4 million in cryptocurrency to receive the
decryption key.
• Government Response: The attack prompted the U.S.
government to issue emergency declarations and work with
private sector partners to restore fuel supply.
The Colonial Pipeline Ransomware Attack
•Implement Multi-Factor Authentication (MFA): Ensuring all accounts, especially those with access to
critical infrastructure, are protected by MFA to add an extra layer of security.
•Regularly Update and Patch Systems: Keeping software and systems up to date with the latest security
patches to prevent exploitation of known vulnerabilities.
•Network Segmentation: Segregating critical systems from other parts of the network to limit the spread
of malware and reduce the impact of a breach.
•Employee Training and Awareness: Conducting regular training sessions to educate employees about
cybersecurity best practices and how to recognize phishing attempts and other common attack vectors.
•Incident Response Plan: Developing and regularly updating an incident response plan to ensure a swift
and coordinated response to cyber incidents.
•Backup Data: Regularly backing up critical data and ensuring backups are stored offline and tested for
integrity. This can facilitate recovery without paying ransom.
•Threat Intelligence and Monitoring: Utilizing threat intelligence services to stay informed about
emerging threats and employing continuous monitoring to detect suspicious activity early.
Cyber Offenses
How criminals plan the attacks
• Reconnaissance
• Objective: Gather information about the target.
• Passive Reconnaissance: Collect data without interacting with the target. This includes
searching public records, social media, websites, and using tools like WHOIS to find
domain registration information.
• Active Reconnaissance: Involves interacting with the target system to gather more
detailed information. This can include network scanning, port scanning, and banner
grabbing to identify open ports, services running, and potential vulnerabilities.
How criminals plan
the attacks
• Scanning and Enumeration
• Objective: Identify potential entry points.
• Network Scanning: Use tools like Nmap to identify live
hosts, open ports, and services on the target network.
• Vulnerability Scanning: Use tools like Nessus or
OpenVAS to find known vulnerabilities in the target
systems.
• Enumeration: Gather detailed information about user
accounts, network shares, and other resources that could
be exploited.
How criminals plan
the attacks
• Gaining Access
• Objective: Exploit vulnerabilities to gain unauthorized access.
• Phishing: Send emails or messages that trick users into
revealing credentials or installing malware.
• Exploitation Tools: Use exploit kits or custom exploits to take
advantage of vulnerabilities found during scanning.
• Brute Force Attacks: Attempt to gain access by systematically
trying all possible combinations of passwords or encryption
keys.
How criminals plan
the attacks
• Maintaining Access
• Objective: Ensure continued access to the compromised
system.
• Backdoors: Install backdoor programs to allow re-entry
even if the initial vulnerability is patched.
• Rootkits: Install rootkits to hide the presence of the
attacker and maintain control over the system.
• Credential Theft: Steal credentials to gain access to
other systems or escalate privileges within the network.
How criminals plan
the attacks
• Covering Tracks
• Objective: Avoid detection and protect their presence.
• Log Manipulation: Alter or delete log files to remove
evidence of the attack.
• File Manipulation: Change file timestamps and use
encryption to hide the existence of malware.
• Network Tunneling: Use encrypted tunnels (e.g., VPN,
SSH) to hide their network activity from intrusion
detection systems.
How criminals plan
the attacks
• Exfiltration
• Objective: Steal valuable data without detection.
• Data Compression and Encryption: Compress and encrypt
data to make it harder to detect and easier to transfer.
• Stealth Data Transfer: Use techniques like steganography
(hiding data within images or other files) or covert channels
(using non-standard communication methods) to exfiltrate data.
• Cloud Services: Upload data to cloud storage services to avoid
detection by traditional network security measures.
How criminals plan
the attacks
• Monetization
• Objective: Convert stolen data or access into profit.
• Ransomware: Encrypt the victim’s data and demand a
ransom for the decryption key.
• Selling Data: Sell stolen data on the dark web, including
personal information, financial data, and intellectual
property.
• Bank Fraud: Use stolen credentials to transfer funds,
make purchases, or commit other types of financial
fraud.
Social • Social engineering is a tactic used by
cybercriminals to manipulate individuals
Engineering into divulging confidential information or
performing actions that compromise
security. Unlike traditional hacking
methods that focus on exploiting technical
vulnerabilities, social engineering exploits
human psychology to achieve its
objectives.
Social Engineering
•Phishing
•Description: Sending deceptive emails or messages that appear to come from a trustworthy source to trick
recipients into revealing personal information, such as login credentials or financial details.
•Example: An email claiming to be from a bank, asking the recipient to verify their account by clicking a
link and entering their credentials.
•Spear Phishing
•Description: A more targeted form of phishing, where attackers customize the message for a specific
individual or organization to increase the likelihood of success.
•Example: An email addressed to a company executive, using personal details to appear legitimate and
requesting a wire transfer.
Pretexting

Description: Creating a fabricated scenario (pretext) to obtain


information or perform an action.

Example: An attacker pretends to be an IT support technician and asks


an employee to provide their login details to resolve a non-existent
Social issue.
Baiting
Engineering
Description: Offering something enticing to lure victims into a trap that
compromises their security.

Example: Leaving infected USB drives in public places with labels like
"Confidential" or "Salary Information." When someone plugs the USB
into their computer, malware is installed.
Quid Pro Quo

Description: Offering a service or benefit in exchange for information or


access.
Example: An attacker calls employees, pretending to be from tech support,
and offers to fix their computer issues in exchange for their login credentials.
Tailgating

Social Description: Gaining physical access to restricted areas by following


authorized personnel.
Engineering Example: An attacker follows an employee through a secure door by
pretending to have forgotten their access card.
Vishing (Voice Phishing)

Description: Using phone calls to deceive individuals into providing


confidential information.
Example: An attacker calls a victim, posing as a bank representative, and asks
for their credit card details to resolve a fake issue.
Cyber stalking
• Cyber stalking is the repeated and malicious use of
electronic communications to harass, intimidate, or
threaten an individual. This can include:
• Sending threatening or obscene messages
• Monitoring or tracking online activities
• Posting false or damaging information
• Impersonating the victim online
• Using spyware or other malicious software
Anonymous Access: Users can access the internet
anonymously, which can make it easier for
cyberstalkers to operate without being
immediately identified.

Cyber Shared Devices: Public computers can have


multiple users, increasing the risk of malicious
stalking and activities or monitoring software being installed
cybercafe without proper detection.

Data Privacy: Personal data entered during


cybercafe use (e.g., login credentials, personal
details) can be at risk if not properly protected.
WannaCry Ransomware
• WannaCry is a well-known ransomware attack that occurred in May 2017. Here are key details
about it:
• Nature of Attack:
• WannaCry encrypted files on infected computers and demanded ransom payments in Bitcoin
to decrypt the files.
• Exploitation Method:
• It exploited a vulnerability in Microsoft Windows known as EternalBlue, which was a part of a
leaked set of hacking tools attributed to the NSA (National Security Agency).
• Impact:
• The ransomware spread rapidly across the globe, affecting hundreds of thousands of
computers in over 150 countries. It disrupted various services, including healthcare,
government agencies, and businesses.
• Propagation:
• WannaCry used a worm-like capability to spread
within networks, making it particularly
dangerous for organizations with unpatched
systems.
• Response:
WannaCry • A security researcher named Marcus Hutchins
discovered a kill switch in the ransomware,
Ransomware which helped to slow down its spread. The kill
switch involved the ransomware checking for
the presence of a specific unregistered domain
before continuing its attack. Hutchins found that
this domain was not registered, and he quickly
bought it, stopping further infections.
Thank you

You might also like