Unit 1 Notes
Unit 1 Notes
Scan
Scan to
to open
open on
on
Studocu
S tudocu
❖ Introduction To Cyber-Crime
Cybercrime or a computer-oriented crime is a crime that includes a computer and a network.
The computer may have been used in the execution of a crime or it may be the target.
Cybercrime is the use of a computer as a weapon for committing crimes such as committing
fraud, identity theft, or breaching privacy.
Cybercrime encloses a wide range of activities, but these can generally be divided into two
categories:
• Crimes that aim at computer networks or devices. These types of crimes involve
different threats (like virus, bugs etc.) and denial-of-service (DoS) attacks.
• Crimes that use computer networks to commit other criminal activities. These types
of crimes include cyber stalking, financial fraud or identity theft.
()
3. Cyber Warfare –
Cyber warfare is the use or targeting in a battle space or warfare context of computers,
online control systems and networks. It involves both offensive and defensive operations
concerning to the threat of cyber attacks, espionage and sabotage.
4. Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the Internet and could
include hiding of information or providing incorrect information for the purpose of
deceiving victims for money or property. Internet fraud is not considered a single,
distinctive crime but covers a range of illegal and illicit actions that are committed in
cyberspace.
5. Cyber Stalking –
This is a kind of online harassment wherein the victim is subjected to a barrage of online
messages and emails. In this case, these stalkers know their victims and instead of offline
stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not
having the desired effect, they begin offline stalking along with cyber stalking to make
the victims’ lives more miserable.
()
• No harsh punishment-
In Cyber crime there is no harsh punishment in every cases. But there is harsh
punishment in some cases like when somebody commits cyber terrorism in that case
there is harsh punishment for that individual. But in other cases there is no harsh
punishment so this factor also gives encouragement to that person who commits cyber
crime.
()
❖ Cybercrime Era: Survival Mantra for the Netizens
()
70 SECURING ACCESS OR ATTEMPTING TO IMPRISONMENT UPTO 10 OFFENCE IS NON-
SECURE ACCESS TO A PROTECTED YEARS, OR/ AND WITH BAILABLE, COGNIZABLE
SYSTEM FINE.
70B INDIAN COMPUTER IMPRISIONMENT UPTO 1 OFFENCE IS BAILABLE,
EMERGENCYRESPONSE TEAM TO SERVE YEAR, OR/AND WITH NON-COGNIZABLE
AS NATIONAL AGENCY FOR INCIDENT FINE UPTO 1,00,000
RESPONSE.ANY SERVICE
PROVIDE,INTERMEDIARIES,DATA
CENTERSETC,WHO FAILSTO PROVE THE
INFORMATION CALLED FOR OR COMPLY
WITH THE DIRECTION ISSUED BY THE
CERT-IN
71 MISREPRESENTATION TO THE IMPRISIONMENT UPTO 2 OFFENCE IS BAILABLE,
CONTROLLER TO THE CERTIFYING YEARS, OR/AND WITH NON-COGNIZABLE
AUTHORITY FINE UPTO 1,000,00
72 BREACH OF CONFIDENTIALITY AND IMPRISIONMENT UPTO 2 OFFENCE IS BAILABLE,
PRIVACY YEARS, OR/AND WITH NON-COGNIZABLE
FINE UPTO 1,000,00
72A DISCLOSURE OF INFORMATION IN IMPRISIONMENT UPTO 3 OFFENCE IS BAILABLE,
BREACH OF LAWFUL CONTRACT YEARS, OR/AND WITH COGNIZABLE
FINE UPTO 5,00,000
73 PUBLISHING ELECTRONIC SIGNATURE IMPRISIONMENT UPTO 2 OFFENCE IS BAILABLE,
CERTIFICATE FALSE IN CERTAIN YEARS, OR/AND WITH NON-COGNIZABLE
PARTNERS FINE UPTO 1,00,000
74 PUBLICTION FOR FRAUDLENT PURPOSE IMPRISIONMENT UPTO 2 OFFENCE IS BAILABLE,
YEARS, OR/AND WITH NON-COGNIZABLE
FINE UPTO 1,00,000
()
1. Reconnaissance
The literal meaning of "Reconnaissance" is an act of reconnoitering- explore, often with the
goal of finding something or somebody (especially to gain information about an enemy or
potential enemy).
In the world of "hacking," reconnaissance phase begins with "Footprinting" - this is the
preparation toward preattack phase, and involves accumulating data about the target's
environment and computer architecture to find ways to intrude into that environment.
Footprinting gives an overview about system vulnerabilities and provides a judgment about
possible exploitation of those vulnerabilities. The objective of this preparatory phase is to
understand the system, its networking ports and services, and any other aspects of its security
that are needful for launching the attack.
Thus, an attacker attempts to gather information in two phases: passive and active attacks.
2. Passive Attacks
A passive attack involves gathering information about a target without his/her (individual's or
company's) knowledge. It can be as simple as watching a building to identify what time
employees enter the building's premises. However, it is usually done using Internet searches
or by Googling (i,e., searching the required information with the help of search engine
Google) an individual or company to gain information.
1. Google or Yahoo search: People search to locate information about employees.
2. Surfing online community groups like Orkut/Facebook will prove useful to gain the
information about an individual.
3. Organization's website may provide a personnel directory or information about key
employees, for example, contact details, E-Mail address, etc. These can be used in a
social engineering attack to reach the target.
4. Blogs, newsgroups, press releases, etc. are generally used as the mediums to gain
information about the company or employees.
5. Going through the job postings in particular job profiles for technical persons can
provide information about type of technology, that is, servers or infrastructure devices
a company maybe using on its network.
3. Active Attacks
An active attack involves probing the network to discover individual hosts to confirm the
information (IP addresses, operating system type and version, and services on the network)
gathered in the passive attack, phase. It involves the risk of detection and is also called
"Rattling the doorknobs" or "Active reconnaissance."
()
Active reconnaissance can provide confirmation to an attacker about security measures in
place,, but the process can also increase the chance of being caught or raise suspicion.
4. Scanning and Scrutinizing Gathered Information
Scanning is a key step to examine intelligently while gathering information about the target.
The objectives of scanning are as follows:
1. Port scanning: Identify open/close ports and services.
2. Network scanning: Understand IP Addresses and related information about the
computer network systems.
3. Vulnerability scanning: Understand the existing weaknesses in the system.
The scrutinizing phase is always called "enumeration" in the hacking world. The objective
behind this step is to identify:
1. The valid user accounts or groups;
2. Network resources and/or shared resources
3. OS and different applications that are running on the OS.
5. Attack (Gaining and Maintaining the System Access)
After the scanning and enumeration, the attack is launched using the following steps:
1. Crack the password
2. Exploit he password
3. Execute the malicious command/applications;
4. Hide the files (if required);
5. Cover the tracks - delete the access logs, so that there is no trail illicit activity.
Social engineering is the tactic of manipulating, influencing, or deceiving a victim in order to
gain control over a computer system, or to steal personal and financial information.
()
o Spam phishing is a widespread attack for some users. The attacks are non-personal
and try to capture any irresponsible person.
o Phishing and whaling use personal information to target particular users. The whaling
attacks are aimed at high-profile individuals such as celebrities, upper management and
higher government officials.Whether it is direct communication or by a fake website,
anything you share goes directly into the seamster's pocket.You can also be fooled
into the next stage of the phishing attack malware download. The methods used in
phishing are unique methods of delivery.
o Voice phishing (Wishing) phone calls can be an automated messaging system
recording all your inputs. The person can speak with you to build trust.
o SMS phishing (SMS) texts or mobile app messages may indicate a web link or follow-
up via a web link or phone number. A web link, phone number, or malware attachment
may be used.
o Angler phishing takes place on social media, where the attacker mimics the customer
service team of a trusted company. They interrupt your communication with a brand
and turn the conversations into private messages, where they escalate the attack.
o Search engine phishing attempts to place links to fake websites at the top of any search
results. The advertisements will be paid or use valid optimization methods to
manipulate search rankings.The links are given in email, text, social media
messages and online advertisements.
o In-session phishing appears as an interruption to the normal web browsing.For
example, you can see fake pop-ups on the webpages you are currently viewing.
Baiting Attack
Baiting abuses your natural curiosity of exposing yourself as an attacker. The potential for
something exclusive is used to exploit us. An attack involves infecting us with malware.
Popular methods of baiting are:
o USB drives are left in public places, such as libraries and parking lots.
o Email attachment with details with free offer.
Physical Breach Attack
Physical violations include attackers, who would otherwise present themselves as legitimate
to access unauthorized areas or information.
This type of attack is common in enterprise environments, like the government, businesses,
or other organizations. Attackers pretend to be a representative of a trusted vendor for the
()
company. Some attackers may have recently been fired in retaliation against their former
employers.
They obscure their identity but are reliable enough to avoid questions. It requires little research
on the part of the attacker and involves high risk. Therefore, if someone is attempting this
method, they have identified a clear potential for a highly valued reward if successful.
o Preceding Attack:Trusting uses a misleading identity as a "trust" to establish trusts,
such as applying directly to a vendor or facility employee. The approach requires the
attacker to interact with you more actively. Once exploited, they are convinced that you
are legitimate.
o Access tailgating attack: Tailgating or piggybacking is the act of trapping any
authorized staff member in a restricted-access area.
Quid pro quo Attack
The term quid pro quo roughly means "a favor for a favor," which refers to exchanging your
information for some reward or other compensation in exchange for phishing. Offer to
participate in giveaways or research studies may make you aware of this type of attack.
Exploitation comes from making you happy for something valuable that comes with little
investment on your end. However, the attacker does not reward your data for you.
DNS Spoofing and Cash Poisoning Attack
DNS spoofing manipulates your browser and web server to visit malicious websites when you
enter a valid URL. DNS cache poisoning attacksinfect our device with valid URLs or routing
instructions for multiple URLs to connect to fake websites.
Scareware Attack
Scareware is a form of malware that is used to scare you into taking action. The deceptive
malware uses dangerous warnings that report fake malware infections or claim that your
accounts have been compromised.
Water Hole Attack
Watering hole attacks infect popular web pages with malware to affect multiple users at the
same time. Carefully planning on the part of the attacker is required to find vulnerabilities of
the specific sites.
Website owners can choose to delay software updates to keep the software that they know are
stable. Hackers recently misuse this behavior to target vulnerabilities.
Unusual Social Engineering Methods
o Fax-based Phishing: When a bank's customers receive a fake email that claims to be
from the bank - asking the customer to confirm their access code - by regular email.
()
The customer was asked to print out the form in an email, fill in their details and fax
the form to the cyber criminal's telephone number.
o Traditional Mail Malware Delivery: Cybercriminals use a home-delivery service to
deliver CDs infected with Trojan spyware in Japan. The disc was delivered to
customers of a Japanese bank. The addresses was firstly stolen from the bank's
database.
Examples of Social Engineering Attacks
Worm Attack
Cybercriminal aims to get the user's attention to the link or infected file - and then allure the
user to click on it.
o In 2000, the Lavalier worm overloaded on the email servers of many companies. The
victims received an email inviting them to open anattached love letter. When she
opened the attached file, the worm copied all the contacts in the victim's address book.
o In January 2004, the Mydoom email worm, which appeared on the Internet, used texts
that mimicked mail servers' technical messages.
Peer-to-Peer (P2P) Network Attack
P2P networks are used to distribute malware. A worm or any Trojan virus will appear on
the P2P network; its name will attract attention and allow users to download and launch the
file. For example:
o AIM and AOL Password Hacker.exe
o Microsoft CD Key Generator .exe
o Play station emulator crack.exe
How to Solve any Social Engineering Attack
To avoid social engineering, you have to practice self-awareness. Always slow down and think
before you do anything or react.
▪ Have my feelings increased? When you are particularly curious, scared, or excited,
you are less likely to evaluate your actions' results. If your emotional state is advanced,
consider it a red flag.
▪ Did the message come from a valid sender? Carefully inspect email addresses and
social media profiles when receiving suspicious messages. There could be characters
that mimic others, such as "torn@example.com" instead of "tom@example.com." Fake
social media profiles that mimic your friend's photo, and many details are also standard.
()
▪ Has my friend sent me the message? It is always good to ask the sender if they were
the actual sender of the message in question. They can be hacked, and they may not be
detected, or someone may impersonate their accounts.
▪ Are attachments or links suspicious? If a link or filename appears unclear or odd in
a message, rethinking the entire communication's authenticity. Besides, consider when
the message itself raises an odd reference, time, or other red flags.
▪ Can this person prove his identity? It applies both in-person and online, as physical
violations require that you ignore the attacker's identity.
Ways to Protect from Social Engineering
In addition to an attack, you must be proactive about your privacy and security. The following
are some important ways to protect against all types of cyberattacks:
Secure communication and account management habits
▪ Online communication is where you are insecure. Social media, email and text
messages are common goals, but you want to inter-person.
▪ Never click on any email or message link.
▪ Use multi-factor authentication. When only passwords are used to secure them, online
accounts are more secure. Multi-factor authentication adds additional layers to verify
its identity at account login. These "factors" may have biometrics such as fingerprints
or facial recognition or passcodes sent via text message.
▪ Use a strong password. Each of your passwords must be unique and complex. You are
using several types of characters, including uppercase, numbers, and symbols. Also,
you can opt for the more extended password option. You may want to use Password
Manager to store and remember them securely to manage all your custom passwords,.
▪ Avoid sharing your schools, pets, place of birth, or other personal details. You will
make it harder for the criminal to crack your account.
▪ Be very conscious of making online friendships.
Secure Network Usage Habits
▪ Compiled online networks may be another point of exploited vulnerability for
background research. To avoid you using your data, take protective measures for any
network you connect to.
▪ Never let strangers connect to the main Wi-Fi At home or workplace, access to guest
Wi-Fi connections should be provided. It allows secure and secure access to your
primary encrypted, password-protected connection.
()
▪ Never let strangers connect to your personal Wi-Fi network. At home or work, access
to guest Wi-Fi connections should be provided.
▪ Always use aVirtual Private Network (VPN). VPNs are services that provide you with
a private, encrypted "tunnel" over the Internet connection.
▪ Protect all the networked devices and services.
Safe Device Use Habits
Protect your mobile phone, tablet and other computer devices with the belowpoints:
▪ Use comprehensive Internet security software. If the social strategy succeeds, malware
infection is an expected outcome. To counter rootkits, Trojans and bots, it is essential
to employ high-quality Internet security solutions to eliminate infections and help track
their source.
▪ Never keep your devices insecure in public.
▪ Please keep all your software updated as soon as it becomes available. Quick updates
give your software the necessary security fixes. When you skip or delay an update to
the operating system or applications, you leave a security holes to target hackers.
()
A number of unique functional traits of bots and botnets make them well suited for long-term
intrusions. Bots can be updated by the bot-herder to change their entire functionality based on
what he/she would like for them to do and to adapt to changes and countermeasures by the
target system. Bots can also utilize other infected computers on the botnet as communication
channels, providing the bot-herder a near infinite number of communication paths to adapt to
changing options and deliver updates. This highlights that infection is the most important
step, because functionality and communication methods can always be changed later on as
needed.
As one of the most sophisticated types of modern malware, botnets are an immense
cybersecurity concern to governments, enterprises, and individuals. Whereas earlier malware
were a swarm of independent agents that simply infected and replicated themselves, botnets
are centrally coordinated, networked applications that leverage networks to gain power and
resilience. Since infected computers are under the control of the remote bot-herder, a botnet is
like having a malicious hacker inside your network as opposed to just a malicious executable
program.
• Launching the attack: Once infected, a bot allows access to admin-level operations like
gathering and stealing user data, reading and writing system data, monitoring user
activities, performing DDoS attacks, sending spam, launching brute force attacks, crypto
mining, and so on.
As seen in the above image, a bot herder initiates the attack by infecting several devices with
malicious code, which acts as the Botnet. In the next step, these devices take over and
conduct the final cyber attack. Therefore, even if you trace the cyberattack back in such a
scenario, you cannot trace the bot herder easily.
In the next segment of this tutorial on what is a botnet, you will dive deeper into
understanding botnets and look at the architecture of a botnet.
Botnet Architecture
A botnet architecture has developed over a while for improved working and slimmer chances
of getting traced. As seen previously, once it infects the desired number of devices, the
botmaster (bot herder) takes control of the bots using two different approaches.
• Client-Server Model
The client-server model is a traditional model that operates with the help of a command and
control (C&C) server and communication protocols like IRC. For example, IRC or Internet
Relay Chat sends automated commands to the infected bot devices.
()
Before engaging in a cyberattack, it frequently programs the bots to remain dormant and
await commands from the C&C server. When the bot herder issues a command to the server,
it is then relayed to the clients. Following this, the clients run the commands and report back
to the bot herder with the findings.
• The P2P Botnet
()
Emerged in 2009, the Mariposa botnet committed online scams and launch DDoS assaults. It
was also stealing personal account credentials from victims so that its operators could sell
them on the Dark Web.
• Zeus
This financial Trojan accounted for 90% of all global online bank fraud instances at their
peak. Emerging in July 2007, it was used to steal data from the United States Department of
Transportation.
• Storm
First identified in 200, Storm was one of the first P2P botnets with a massive network ranging
from 250,000 to 1 million infected devices. The Storm handled attacks from DDoS to identify
theft.
• 3ve
First discovered in 2016, 3ve was a different type of Botnet that did not steal data or money
and instead generated fake clicks on online advertisements hosted by fake websites.
Those were a few of the destructive and dangerous botnets in history. So, heading to the next
section of this tutorial on what is a botnet, you will learn how to protect yourself from a
botnet attack.
How to Protect Yourself from Botnets
You require an all-inclusive strategy ranging from good surfing habits to software updates to
anti-virus protection to prevent botnet infection. Listed below are some essential methods to
keep botnets away.
1. Updating your operating system is a good malware preventative measure.
2. Beware of phishing emails and avoid email attachments from suspicious sources.
3. Refrain from clicking on suspicious links and be careful about which site you use for
downloading information.
4. Install anti-virus, anti-spyware, and firewalls on your systems.
5. If you are a website owner, establish a multi-factor verification method and
implement DDoS protection tools. This will safeguard your website from botnet
attacks.
Attackers may infect your system with malware that grants remote access to a command and
control server. Once they have infected hundreds or even thousands of computers they can
establish a botnet, which can be used to send phishing emails, launch other cyber attacks,
steal sensitive data, or mine cryptocurrency
()
How Do Attackers Exploit Attack Vectors?
There are many ways to expose, alter, disable, destroy, steal or gain unauthorized access to
computer systems, infrastructure, networks, operating systems, and IoT devices.
In general, attack vectors can be split into passive or active attacks:
Passive Attack Vector Exploits
Passive attack vector exploits are attempts to gain access or make use of information from the
system without affecting system resources, such as typosquatting, phishing, and
other social engineering-based attacks.
Active Attack Vector Exploits
Active cyber attack vector exploits are attempts to alter a system or affect its operation such
as malware, exploiting unpatched vulnerabilities, email spoofing, man-in-the-middle
attacks, domain hijacking, and ransomware.
That said, most attack vectors share similarities:
• The attacker identifies a potential target
• The attacker gathers information about the target using social
engineering, malware, phishing, OPSEC, and automated vulnerability scanning
• Attackers use the information to identify possible attack vectors and create or use
tools to exploit them
• Attackers gain unauthorized access to the system and steal sensitive data or install
malicious code
• Attackers monitor the computer or network, steal information, or use computing
resources.
One often overlooked attack vector is your third and fourth-party vendors and service
providers. It doesn't matter how sophisticated your internal network security and information
security policies are — if vendors have access to sensitive data, they are a huge risk to your
organization.
This is why it is important to measure and mitigate third-party risks and fourth-party risks.
This means it needs to be part of your information security policy and information risk
management program.
Consider investing in threat intelligence tools that help automate vendor risk
management and automatically monitor your vendor's security posture and notify you if it
worsens.
Every organization now needs a third-party risk management framework, vendor
management policy, and vendor risk management program.
()
Before considering a new vendor perform a cybersecurity risk assessment to understand what
attack vectors you could be introducing to your organization by using them and ask about
their SOC 2 compliance.
How to Defend Against Common Attack Vectors
To address common attack vectors, security controls must spread across the majority of the
attack surface. The process begins by identifying all possible entry points into your private
network - a delineation that will differ across all businesses.
The following cyber defense strategies will help you block frequently abused entry points and
also highlight possible regions in your ecosystem that might be housing attack vectors.
• Create secure IoT credentials - Most IoT devices still use their predictable factory
login credentials, making them prime targets for DDoS attacks.
• Use a password manager - Password managers ensure login credentials are strong
and resilient to brute force attacks.
• Educate employees - To prevent staff from falling common for social engineering
and phishing tactics, they need to be trained on how to identify and report potential
cybercriminal activity. Humans will always be the weakest points in every security
program.
• Identify and shut down data leaks - Most businesses are unknowingly leaking
sensitive data that could facilitate data breaches. A data leak detection solution will
solve this critical security issue.
• Detect and remediate all system vulnerabilities - This should be done for both the
internal and external vendor networks. An attack surface monitoring solution can help
you do this.
• Keep antivirus software updated - Updates keep antivirus software informed of the
latest cyber threats roaming the internet.
• Keep third-party software regularly updated - Software updates contain critical
patches for newly discovered attack vectors. Many cyber attackers have achieved
success by abusing known vulnerabilities in out-of-date software.
()