Classification of Cybercrime attacks based on different stages of cybercrime

Hello everyone Welcome back to let’s see tech. Today I am going to share the Classification of Cybercrime attacks based on different stages of cybercrime. So, guys, let’s get started.

PHISHING ATTACK:

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. 

Classification of Cybercrime attacks based on different stages of cybercrime

Example 1:

Suppose the Attacker wants to take revenge or money from a person, so the attacker will send an E-mail to a person with a link and the email claims that the user’s password is about to expire and Click here to renew your password within 24 hours.

Read More: Compute the message Digest using SHA-1 Algorithm showing all intermediate steps with mathematical expressions

Once the user gets this mail, he/she will click that link, the user is redirecting to a fake clone website, where both new and existing passwords are requested. The attacker, monitoring the page, hijacks the original password to gain access to a personal account.

Classification of Cybercrime attacks based on different stages of cybercrime

People: People refer to criminals or attackers.

Motivation: This component refers to the various factors that “push” people to carry out cybercrime. So in this example motivation is basically revenge or Money.

Perpetration Technology: This component refers to all technologies used to carry out cybercrime. So from the above example, the attacker uses a phishing attack and uses email as a medium through which the attacker sent a link.

Security Barrier: This component is comprised of hardware and software technological defences (e.g. firewalls, anti-virus software, etc.).

Target: The last component of the model is the target. This refers to the people or organization that is being targeted or both. So from the above example target may be individual or maybe whole society. 

RANSOMWARE:

Ransomware is a form of malware that encrypts a victim’s files.

Example 2:

Suppose an attacker wants to take money from a user. so the attacker will send an E-mail to a person with attached a file (Invoice )  and the email claims that the user’s purchased some items. Once the user gets this mail, he/she will click that attached file, Once the user downloads and open that file, in the system background it will automatically download malicious executable files. The EXE would include the functions necessary to encrypt the data on the victim’s machine. Once the data is encrypted, the attacker then demands a ransom/money from the victim to restore access to the data upon payment. Users are shown instructions for how to pay a fee to get the decryption key. The costs can range from a few hundred dollars to thousands, payable to cybercriminals in Bitcoin.

 

Classification of Cybercrime attacks based on different stages of cybercrime

People: People refer to potential offenders or criminals or attackers.

Motivation: This component refers to the various factors that “push people to carry out cybercrime. So in this example motivation is basically revenge or Money.

Perpetration Technology: This component refers to all technologies used to carry out cybercrime. So from the above example attacker uses malware that is ransomware and uses email as a medium through which the attacker sent an attached file.

Security Barrier: This component is comprised of hardware and software technological defences (e.g. firewalls, anti-virus software, etc.).

Target: The last component of the model is the target. This refers to the people or organization that is being targeted or both. So from the above example target may be individual or maybe whole society. 

Classification of Cybercrime attacks based on different stages of cybercrime

Leave a Reply

Your email address will not be published. Required fields are marked *