Unit-2
Unit-2
How Criminals Plan Them – Introduction, How Criminals Plan The Attacks, Social Engineering,
and Cyber Stalking, Cyber Cafe And Cybercrimes, Botnets: The Fuel For Cybercrime, Attack
Vector Cloud Computing.
Learning Objectives
Understand different types of cyber attacks.
Get an overview of the steps involved in planning cybercrime.
Understand tools used for gathering information about the target.
Get an overview on social engineering – what and how.
Learn about the role of cybercafés in cybercrime.
Understand what cyber stalking is.
Learn about Botnets and attack vector.
Get an overview on cloud computing – what and how.
The categories of vulnerabilities that hackers typically search for are the following:
o Inadequate border protection (border as in the sense of network periphery);
o remote access servers (RASs) with weak access controls;
Cyber Offenses Page 2
o application servers with well-known exploits;
o misconfigured systems and systems with default configurations.
To help the reader understand the network attack scenario, Fig. 2.2 illustrates a small
network highlighting specific occurrences of several vulnerabilities described above.
A passive attack involves gathering information about a target without his/her (individual’s
or company’s) knowledge. It can be as simple as watching a building to identify what time
employees enter the building premises. However, it is usually done using Internet searches or by
Googling (i.e., searching the required information with the help of search engine Google) an
individual or company to gain information.
1. Google or Yahoo search: People search to locate information about employees.
2. Surfing online community groups like Orkut/Facebook will prove useful to gain the
information about an individual.
3. Organization’s website may provide a personnel directory or information about key
employees, for example, contact details, E-Mail address, etc. These can be used in a
social engineering attack to reach the target (see Section 2.3).
4. Blogs, newsgroups, press releases, etc. are generally used as the mediums to gain
information about the company or employees.
5. Going through the job postings in particular job profiles for technical persons can provide
information about type of technology, that is, servers or infrastructure devices a company
maybe using on its network.
2.4 Cyberstalking
The dictionary meaning of “stalking” is an “act or process of following prey stealthily –
trying to approach somebody or something.”
Cyberstalking has been defined as the use of information and communications
technology, particularly the Internet, by an individual or group of individuals to harass
another individual, group of individuals, or organization.
The behavior includes false accusations, monitoring, transmission of threats, ID theft,
damage to data or equipment, solicitation of minors for sexual purposes, and gathering
information for harassment purposes.
Cyberstalking refers to the use of Internet and/or other electronic communications
devices to stalk another person.
It involves harassing or threatening behavior that an individual will conduct
repeatedly, for example, following a person, visiting a person’s home and/or at business
place, making phone calls, leaving written messages, or vandalizing against the person’s
property. As the Internet has become an integral part of our personal and professional
1. Attack by E-Mail: The content is either embedded in the message or linked to by the
message. Sometimes attacks combine the two vectors, so that if the message does not get
you, the attachment will. Spam is almost always carrier for scams, fraud, dirty tricks, or
malicious action of some kind. Any link that offers something “free” or tempting is a
suspect.
2. Attachments (and other files): Malicious attachments install malicious computer code.
The code could be a virus, Trojan Horse, Spyware, or any other kind of malware.
Attachments attempt to install their payload as soon as you open them.
3. Attack by deception: Deception is aimed at the user/operator as a vulnerable entry point.
It is not just malicious computer code that one needs to monitor. Fraud, scams, and to
some extent Spam, not to mention viruses, worms and such require the unwitting
cooperation of the computer’s operator to succeed. Social engineering are other forms of
deception that are often an attack vector too.
4. Hackers: Hackers/crackers are a formidable attack vector because, unlike ordinary
Malicious Code, people are flexible and they can improvise. Hackers/crackers use variety
of hacking tools, heuristics, Cyberoffenses: How and social engineering to gain access to
computers and online accounts. They often install a Trojan Horse to commandeer the
computer for their own use.
5. Heedless guests (attack by webpage): Counterfeit websites are used to extract personal
information. Such websites look very much like the genuine websites they imitate. One
may think he/she is doing business with someone you trust. However, he/she is really
giving their personal information, like address, credit card number, and expiration date.
They are often used in conjunction with Spam, which gets you there in the first place.
Pop-up webpages may install Spyware, Adware or Trojans.
6. Attack of the worms: Many worms are delivered as E-Mail attachments, but network
worms use holes in network protocols directly. Any remote access service, like file