DNS Security Best Practices
web, domain, service @ Pixabay

5 Interesting Cyber Crime Stories

Cybercrime has become a reality as a result of living in the Internet Age. Although the majority of us have not been victims of this fresh and digital world crime, many people, from individuals to businesses, have been affected by it. These occurrences stories reach us after forensic investigators attempt to reverse the crime scene and recover the artifacts to raise awareness of the growing number of crimes around the world.

This blog intends to give you five intriguing cybercrime stories to assist you to become more aware of and safe while you are interacting with others in the internet world.

Story No. 1

In the United Kingdom, a retired general practitioner is on trial for the murder of his pension advisor. The National Crime Agency (NCA) has also charged him with making fraudulent phone calls and sending SMS messages, according to their findings. Furthermore, the prosecution went on a search of the dark web and discovered some digital evidence that was linked to the murder. On the dark web, a website called Crime Bay, operated by the Chechen Mob, listed an order to assassinate Mr. Bolden, a retirement counselor. According to the agency, GP used a specific browser to access the site, where he formed an account and selected the ‘Kill the bastard’ option from the list of available hits. The money for the hitman was made in Bitcoin, which was worth $ 5000 at the time of payment. These provided evidence of his alleged involvement in cybercrime on a large scale.

Story No. 2

Ashley Madison is a well-known example of a data leak. The Australian and Canadian privacy commissioners conducted the investigations that led to the findings. The hack led to the online publication of information of millions of site users as a result of the breach. This also contains a large number of government personnel. Personal information, such as email addresses and credit card details, was compromised as a result of the hack. As a result of the breach investigation, questions have been raised about how users’ data was handled and whether or not standard information security policies were followed. The hacker’s group Impact Team threatened to reveal the information and requested that the site be shut down completely.

Story No. 3

Wanna cry is one of the most deadly and well-known ransomware attacks in history, having infected millions of systems, including those of users, businesses, and government organizations. The National Security Agency (NSA) was the first to identify the Windows SMB vulnerability, which is now being exploited by sophisticated malware. This program was widely implemented across a variety of healthcare and other organizations. Once it has gained access to a system, it encrypts the entire hard disc and renders the system inoperable unless a $300 ransom is paid, although Microsoft released a patch earlier that had never been implemented on such a big scale anyplace [3].

Story No. 4

In March 2018, a group of Iranian hackers carried out a widespread hack in the United States that resulted in the compromise of 144 US institutions, 176 universities in 21 other countries, 47 commercial corporations, and other organizations, among others. The attackers were successful in tricking university academics into allowing them to hack their accounts and steal data by using spear-phishing. Hackers took 31 TB of data, resulting in a $3 billion loss of intellectual property.

Story No. 5

A fresh malware infection was released by a Russian hacking campaign that infected 500,000 routers. The software known as VPNFilter was responsible for the creation of a botnet from the compromised devices, which had the potential to interfere with web activity and data passing through the routers. This malware is capable of being used in spam operations as well as targeted attacks on specific targets. The LEA has been working on quarantining routers and analyzing the malware’s effects for quite some time.

Previous article15 Types of Malware
Next articleIdentity And Access Management Future Scope
Evangeline Christina is a Cyber Security Enthusiast, Security Blogger, Technical Editor, Certified Ethical Hacker, Author at Cyberspecial.net. Previously, he worked as a security news reporter in a reputed news agency.