How to Become a Cybersecurity Specialist
internet, cyber, network @ Pixabay

5 Interesting Cyber Crime Stories

Cybercrime is a fact of life in the Internet Era. While most of us may not have been victims of cybercrime, many others have, from individuals to businesses. After forensic investigators attempt to reverse the crime scene, and get the artifacts, these stories reach us so that we are all aware of the rising crimes.

This blog will share five stories about cybercrime to help you be aware of and stay safe online.

Story 1

An elderly British GP is being tried for the murder of his pension advisor. Prosecutors from the National Crime Agency (NCA), also charged him with malicious calls and SMS communications. The prosecutors also found digital evidence that was linked to the crime on the dark web. A website called Crime Bay by Chechen Mob had a listing for the murder of Mr. Bolden the pension advisor. According to the agency, a GP accessed the site using a specific browser and created an account. From there, he could choose the hitting options of Kill the bastard’. The hitman received $ 5000 in Bitcoin as payment. These documents provided evidence of his involvement in digital crime.

Story 2

Ashley Madison is the most famous victim of a data breach. The investigations were conducted by both the Australian and Canadian privacy commissioners. This hack led to the publication online of data from millions of users. Many government officials were also affected. Personal information, including credit card numbers and email addresses, was compromised. After the breach, investigations revealed that the hacker’s group Impact Team threatened to release personal information including credit card numbers and email addresses. Impact Team, a hacker group, threatened to release the data. They demanded that the site be disbanded.

Story 3

Wanna cry is the most notorious ransomware attack that has infected millions upon millions of users, government and private systems. The malware exploits the Windows SMB vulnerability first discovered by the NSA. This program was widely distributed across healthcare networks and other networks. It encrypts every hard drive and renders it useless if it is not paid $300 ransom. Microsoft has a patch that works on a smaller scale [3].

Story 4

A group of Iranian hackers carried out a massive hack on the US in March 2018. It affected 144 universities in the US, 176 universities from 21 other countries, 47 companies, and many others. The attackers used the spear- Phishing to hack university professors and gain access to their accounts. Hackers stole 31TB of data and $3B in Intellectual Property.

Story 5

Russia launched a hacking campaign that affected 500,000 routers. VPNFilter, a malware called, created a botnet of affected devices that could cause data and web activity to be tampered with through routers. This malware is capable of being used in targeted attacks and spam campaigns. The LEA has been working to quarantine routers, and analyze malware impacts.

Previous articleImportance of Cybersecurity in Military
Next articleStory About Cyber Crime
Evangeline Christina is a Cyber Security Enthusiast, Security Blogger, Technical Editor, Certified Ethical Hacker, Author at Cyberspecial.net. Previously, he worked as a security news reporter in a reputed news agency.