Professional Documents
Culture Documents
Brandon - CyberCrime
Brandon - CyberCrime
These
include identity theft, dissemination of child pornography, privacy issues, fraud, and intellectual
property offenses. Because computers are used so extensively in government, entertainment, and
business, the importance of cybercrime has grown on the internet. While emerging technologies
create new channels for criminal activity, they frequently do not result in completely new types
of criminal conduct. The use of digital computers is the main way that cybercrime differs from
more conventional forms of criminal activity. It is necessary to recognize that technology alone
is insufficient to create a distinct boundary between different domains of unlawful conduct
(Dennis, 2023).
Cybercriminals have become more skilled and are targeting not just corporate and public
organizations but also individuals with their attacks. Inadequate cybersecurity measures are to
blame for the rise in cybercrimes. Cybercrimes entail victims who are both the computer and the
individual who is using it. Unauthorized downloads are only one of the many actions that fall
under the umbrella of cybercrimes. To protect sensitive data, several governments and countries
are now adopting strict cybersecurity rules. People must receive cybersecurity training in order to
protect themselves from the growing threat of cybercrimes (Kaur, 2018).
Email scams are among the many types of cybercrimes that can take many misleading shapes.
Phishing emails trick receivers, and social engineering techniques pressure individuals into
disclosing private information, such credit card numbers, or sending money to the attacker.
Phishing schemes are a common kind of email frauds, in which scammers impersonate reputable
companies. Social media fraud is another type of crime that includes dishonest behavior on sites
like Facebook, Instagram, TikTok, and Twitter. Scams including impersonation, social
engineering, catfishing, and fake internet storefronts are a few examples. Social media fraud
frequently takes advantage of user trust, inexperience, and the propensity to overshare personal
information online. Deceptive actions directed towards financial institutions, clients, and
stakeholders are referred to as Banking fraud. These fraudulent activities, which use advanced
hacking and social engineering techniques, can result in significant financial losses or identity
theft. Examples include internet banking frauds, skimming ATMs, and credit card fraud (Anon.,
2023).
An illegal cyber activity that aims to compromise a cyber asset's security measures and cause
damage, interference, or interruption to the services or information access linked to that
particular national cyber property is called a cyber-attack. It entails the intentional use of a
cyberweapon against a system of information, which leads to a cyber incident (Li & Liu, 2021).
Cyberattacks can aim for a variety of goals and are intentionally designed to do harm. One clear
motivation is financial gain, particularly when it comes to cyberattacks against enterprises
carried out by hackers. These assaults usually target sensitive data, including employee or
consumer credit card numbers, which gives hackers the opportunity to use the identities they
have stolen to their advantage for material or financial gain. Cyberwarfare also refers to the open
and covert cyberattacks carried out by countries across the world, frequently as a component of
ongoing political, economic, or social battles. Cybercriminals also use disruption and retaliation
as a reason for their actions, hoping to sow doubt, disarray, uncertainty, and disorder. These acts,
often affect not just government authorities but also commercial or charitable groups, may be
motivated by a desire for revenge or as a way to publicly damage the reputation of targeted
entities (Gillis & Pratt, 2023).
Q1. Identify about 3 – 5 recent cybercrimes/cyberattacks case studies or scenarios online and briefly
discuss the incident and its impact. (Provide References).
The recent cyberattack which took place over the years are:-
With its main office located in Tulsa, Oklahoma, SolarWinds is a major software company that
provides network and infrastructure monitoring system management solutions to several
enterprises worldwide. The Orion IT performance monitoring system is one of its prominent
features. SolarWinds Orion has special access to IT systems because of its function as an IT
monitoring tool, which enables it to gather log and system performance data. Because of its
favorable position and broad acceptance, SolarWinds was a desirable and profitable target
(Oladimeji & Kerner, 2023).
Incident Overview - A very complex supply chain attack was discovered in 2020 and
was aimed at SolarWinds, a company that specialized in developing software for network
administration and monitoring. The attackers were able to get into SolarWinds' software
update system and spread malicious updates to many companies.
Impact - The attackers, who are thought to have been supported by a state, gained illegal
access to several government offices, IT firms, and other establishments. This incident
demonstrated the vulnerability of software supply chains and the potential for widespread
exploitation from a single breach.
One of the biggest and most important oil pipelines in the United States was built in 1962 and is
called the Colonial Pipeline. This 5,500-mile pipeline was built to make it easier to move oil
from the Gulf of Mexico to the states along the East Coast. It begins in Texas and travels all the
way up to New Jersey, where it is essential in supplying over half of the gasoline for the East
Coast. The Colonial Pipeline, with its headquarters located in Alpharetta, Georgia, specializes in
the distribution of refined oil for use as home heating oil, jet fuel, and gasoline (Kerner, 2022).
The ransomware attack that struck the Baltimore City Government in May 2019 is a notable
example of a cyber event, and its long-lasting effects are still a topic of discussion when it comes
to cybersecurity and ransomware attacks on local governments (Fabritius, 2019).
The SolarWinds Supply Chain Attack principal motives were (Jones, 2021)
The May 2021 cyberattack on the Colonial Pipeline, which was carried out by the DarkSide
ransomware group, was primarily motivated by financial gain. What motivated the attackers was
the desire for financial gain (Research, 2021)
The ransomware's main goals in executing the cyberattack against the Baltimore City
Government were (Labs, 2019)
a. Economic Incentive: Financial goals are often at the center of ransomware attacks. The
attackers hope to obtain financial gain from the impacted organization by encrypting
critical information and then demanding a ransom for the key to unlock it.
b. Espionage and Information Theft: Occasionally, hackers may use ransomware as a
front for more complex espionage operations that aim to collect private information or
breach government systems without authorization.
c. Opportunistic Attacks: Some ransomware attacks follow opportunistic guidelines,
targeting vulnerable systems with financial gain as their primary goal. Hackers profit
from known flaws in cyber-defense systems or vulnerabilities in the system.
Question 5
Briefly discussions of the legal frameworks and challenges faced by law enforcement agencies to arrest
and prosecute cyber criminals.