Jump to content

Cybercrime: Difference between revisions

From ICANNWiki
Jessica (talk | contribs)
No edit summary
Jessica (talk | contribs)
No edit summary
Line 3: Line 3:
==History==
==History==
'''Proto-cybercrime: Phone Phreaking''' <br/>
'''Proto-cybercrime: Phone Phreaking''' <br/>
In the 1970s, crimes were committed via telephone lines much like they are today via the Internet. The perpetrators, called "Phreakers," figured out that the U.S. telephone system functioned on the basis of tones. Notoriously, [[John Thomas Draper]], [[Steve Jobs]], and [[Steve Wozniak]] reverse-engineered and imitated the tones needed to route long-distance calls. The computerization of telecommunications led to the end of the phreaking era, and the culture shape-shifted into computer hacking.<ref>[https://goosevpn.com/blog/origin-cybercrime The Origin of Cybercrime, GooseVPN]</ref>  
In the 1970s, crimes were committed via telephone lines much like they are today via the Internet. The perpetrators, called "Phreakers," figured out that the U.S. telephone system functioned on the basis of tones. Notoriously, [[John Thomas Draper]], [[Steve Jobs]], and [[Steve Wozniak]] reverse-engineered and imitated the tones needed to route long-distance calls. The computerization of telecommunications led to the end of the phreaking era, and the culture shape-shifted into computer hacking.<ref>[https://goosevpn.com/blog/origin-cybercrime The Origin of Cybercrime, GooseVPN]</ref> <br/>
'''Hacking Becomes a Criminal Act''' <br/>
'''Hacking Becomes a Criminal Act''' <br/>
In 1982, [[Ian Murphy]], aka Captain Zap, became the first person to be found guilty of a cybercrime, after hacking AT&T and manipulating its internal clock to enable free calls during peak hours.<ref>[https://smartermsp.com/tech-time-warp-curious-cases-early-hackers/]</ref>
In 1982, [[Ian Murphy]], aka Captain Zap, became the first person to be found guilty of a cybercrime, after hacking AT&T and manipulating its internal clock to enable free calls during peak hours.<ref>[https://smartermsp.com/tech-time-warp-curious-cases-early-hackers/]</ref> <br/>
'''First [[DNS Abuse Responses|Governmental Response to DNS Misuse]]'''<br/>
'''First [[DNS Abuse Responses|Governmental Response to DNS Misuse]]'''<br/>
On Nov. 2, 1988, [[Robert Tappan Morris]] released a worm that halted one-tenth of the Internet and led to the founding of the first Computer Emergency Response Team ([[CERT]]).<ref>[https://www.wired.com/2001/02/the-greatest-hacks-of-all-time/ The Greatest Hacks, Wired]</ref>
On Nov. 2, 1988, [[Robert Tappan Morris]] released a worm that halted one-tenth of the Internet and led to the founding of the first Computer Emergency Response Team ([[CERT]]).<ref>[https://www.wired.com/2001/02/the-greatest-hacks-of-all-time/ The Greatest Hacks, Wired]</ref>
 
'''First Time a Hacker Makes Most Wanted List'''
In 1995, the FBI notifies the public that it really wanted to catch [[Kevin Mitnick]] for social engineering attacks and stealing sensitive government and personal financial data.<ref>https://www.mitnicksecurity.com/about-kevin-mitnick-mitnick-security About Kevin, Mitnick Security]</ref>
 
==2021 Cybercrime Reports==  
==2021 Cybercrime Reports==  
Current trends in cybercrime revolve around how the COVID-19 pandemic has shaped everyday work/home life and highlighted the importance of cyber networks in maintaining [[Cybersecurity and Infrastructure Security Agency|critical infrastructure]].  
Current trends in cybercrime revolve around how the COVID-19 pandemic has shaped everyday work/home life and highlighted the importance of cyber networks in maintaining [[Cybersecurity and Infrastructure Security Agency|critical infrastructure]].  

Revision as of 14:29, 23 July 2021

Cybercrime is the use of electronic communication for criminal activities.[1] The concept of cybercrime depends upon the purpose of the term. Cybercrime almost always encompasses acts against the confidentiality, integrity, and availability of computer data or systems. More broadly, the term refers to computer/content-related acts for personal or financial gain or harm.[2]

History

Proto-cybercrime: Phone Phreaking
In the 1970s, crimes were committed via telephone lines much like they are today via the Internet. The perpetrators, called "Phreakers," figured out that the U.S. telephone system functioned on the basis of tones. Notoriously, John Thomas Draper, Steve Jobs, and Steve Wozniak reverse-engineered and imitated the tones needed to route long-distance calls. The computerization of telecommunications led to the end of the phreaking era, and the culture shape-shifted into computer hacking.[3]
Hacking Becomes a Criminal Act
In 1982, Ian Murphy, aka Captain Zap, became the first person to be found guilty of a cybercrime, after hacking AT&T and manipulating its internal clock to enable free calls during peak hours.[4]
First Governmental Response to DNS Misuse
On Nov. 2, 1988, Robert Tappan Morris released a worm that halted one-tenth of the Internet and led to the founding of the first Computer Emergency Response Team (CERT).[5] First Time a Hacker Makes Most Wanted List In 1995, the FBI notifies the public that it really wanted to catch Kevin Mitnick for social engineering attacks and stealing sensitive government and personal financial data.[6]

2021 Cybercrime Reports

Current trends in cybercrime revolve around how the COVID-19 pandemic has shaped everyday work/home life and highlighted the importance of cyber networks in maintaining critical infrastructure.

  • INTERPOL’s ASEAN Desk identified the top cyber threats as:[7]
  1. Business Email Compromise, as a high-return investment with low cost and risk;
  2. Phishing, using COVID-19 jargon and misinformation to deceive unsuspecting victims;
  3. Ransomware, to target medical centers and public institutions, expecting a better success rate due to the pandemic;
  4. E-commerce Data Interception, undermining trust in online payment systems.
  5. Malware-as-a-Service, are reaching non-technical threat actors and requiring minimal investment;
  6. Cyberscams, because of the pandemic, more people are conducting transactions and working from home online; and
  7. Cryptojacking, as the value of cryptocurrencies increases.
  • Mandiant's M-Trends 2021 Report[8]
  1. 59% of the security incidents investigated by Mandiant last year were initially detected internally by the organizations themselves (12% better than in 2019).
  2. Ransomware has evolved and now employs various extortion tactics.
  3. FIN11, a financially motivated threat group, was responsible for widespread phishing campaigns and extortion operations.
  4. The median dwell time dropped as threat actors capitalized on pandemic-related shifts in work/home life.
  5. UNC2452, an uncategorized state-sponsored group, engaged in a broad espionage campaign after injecting a backdoor dynamic-link library (DLL) into the SolarWinds Orion process.
  6. 63% of attackers used techniques outlined in the MITRE ATT&CK framework, and 5% of intrusions used over 1/3 of MAF techniques.
  7. Threat actors exploited vulnerabilities in the infrastructure supporting work at home.

Organizations

FBI Focus Areas
Advance Fee Schemes
Business Email Compromise
Business Fraud
Charity and Disaster Fraud
Counterfeit Prescription Drugs
Credit Card Fraud
Elder Fraud
Election Crimes and Security
Fraudulent Cosmetics and “Anti-Aging” Products
Funeral and Cemetery Fraud
Health Care Fraud
Identity Theft
Illegal Sports Betting
Internet Auction Fraud
Internet Fraud
Investment Fraud
Letter of Credit Fraud
Market Manipulation (“Pump and Dump”) Fraud
Money Mules
Nigerian Letter or “419” Fraud
Online Vehicle Sale Fraud
Ponzi Schemes
Prime Bank Note Fraud
Pyramid Schemes
Ransomware
Redemption/Strawman/Bond Fraud
Reverse Mortgage Scams
Romance Scams
Sextortion

The following IGOs, NGOs, and U.S. government agencies are key opponents of global cybercrime.[9][10]

Organization Focus Areas
EC Action Against Cybercrime capacity buidling for compliance with Budapest Convention
INTERPOL transnational information sharing
ITU harmonization of technical standards
UNODC thematic reports on transnational crimes;
database of trans/national legislation and case law on cybercrime
APWG industry association combats phishing and Email Spoofing;
data standards and model response systems and protocols
Spamhaus provides real time, actionable threat intelligence to
network operators, corporations, and Cybersecurity vendors
eNASCO child safety online
INHOPE combating child pornography
IWF combating child sexual abuse
The Rand Corporation credible research
CCIPS prosecuting computer and IP crimes
ECTF investigating identify theft, network intrusions;
Business Email Compromise (BEC), and ransomware
C3 technical support for cross-border crime
IC3 cybercrime complaints




References