The range of illegal activities and opportunities on and through the Internet is vast, ranging from the proliferation of child pornography on the Internet to “phishing” of personal access, trade in weapons and narcotics, network intrusions and DDoS attacks, the spread of malware and fraud, All of this is done using Clearnet / Visible Web, the underground economy forums there, Deep Web and Darknet. In cybercrime, as in almost no other area of crime, there is a steadily rising level of crime
Definition and manifestations:
Cybercrime is the name of any improper act whose purpose is to destroy the integrity of a given information system or that is performed using a computational resource. This definition varies depending on the use of the computer medium. Either the computer medium is used by the offender as a tool for the execution of an offense or a crime (fraud, threat, etc.), or the computer is the target of the offender (theft, unauthorized use or destruction of data, etc.).
This type of attack used as a medium all forms of technology that are related to information and communication systems. In general, benefits from the good faith of the user to steal confidential information and to then be used for illegal purposes.
There are many types of conventional crime, and their number is constantly growing. The most common are:
- Financial enrichment
- Credit card fraud
- Various criminal threats of the type “retaliation.”
- Economic fraud
- Misuse of trust and various frauds
- Seduction of minors;
- Identity fraud.
These crimes are largely based on greed for money (attempting to enrich oneself financially or materially), or pathological, unhealthy or immoral behavior (such as child pornography, prostitution, racism, revisionism, etc.).
This type of attack has changed a lot since the early days; culprit mainly exploits vulnerabilities in computer equipment. The most common forms are:
- Installation of espionage programs,
- Installation of malware,
- various types of damage,
- Destruction of websites,
- Data theft,
- Denial-of-service attacks on websites
- Rebound from the victim’s computer systems, etc.
To spread malware, cybercriminals usually resort to one of the following options:
- THE CREATION OR ACQUISITION OF A MALICIOUS PROGRAM:
Such a malicious program gives the attacker complete control over an infected machine. For this reason, it is the major component of any opportunistic attack.
- SENDING SPAM OR RENTING SUCH A SERVICE
Only with a good distribution channel can you reach a large number of potential victims. Be it for a classic scam or the infection of computers; you have to reach a large audience. Sending e-mail or spam on social networks can be a very good method.
- THE CREATION OF MALICIOUS WEBSITES OR THE INFECTION OF EXISTING WEBSITES.
Being present on the internet is not only important for all legitimate organizations, but also for cybercriminals. Creation of phishing sites, advertising, fraud, malicious sites that infect visitors’ machines.
- Targeted attack
Targeted attacks can be very hard to ward off. It all depends on the energy and time the criminals invest. In general, targeted attacks are often successful when the attacker focuses exclusively on his victim.
A person found to be committing an internet can be considered to be guilty of class 5 felony or class 1 misdemeanor depending upon the nature of the crime.