Category: Asst. Prof. Nayna N Mistry (M.C.A, Net, Gset) Sutex Bank College of Computer Applications and Sciencepage 1
Category: Asst. Prof. Nayna N Mistry (M.C.A, Net, Gset) Sutex Bank College of Computer Applications and Sciencepage 1
Category: Asst. Prof. Nayna N Mistry (M.C.A, Net, Gset) Sutex Bank College of Computer Applications and Sciencepage 1
− Unauthorized access
− Cyber Fraud
− Cracking
− Hacking
− Cyber theft
− Cyber pornography
− Cyber terrorism
3.2 Technical Aspects of Cyber Crimes or Modes of Cyber Crimes
3.2.1 Unauthorized access & Hacking
− Knowingly or intentionally used or access without the permission or authority of the
owner, whole or any part of a computer. Computer system, computer network to
commit any cyber crime is unauthorized access.
− This is like criminal trespass (intrude) committed in to the real world.
Asst. Prof. Nayna N Mistry(M.C.A,NET,GSET)
Sutex bank college of computer applications and sciencePage 1
Unit 3: Introduction to Cyber Crimes
− Section 441 of IPC (Indian Panel code) defines criminal trespass: whoever enters into
or upon property in the possession of another with intent to commit an offence,
insult or annoy any person of that property or having lawfully entered into or upon
such property unlawfully remains there with intent to insult or offence or annoy any
such person of the property.
− The computer fraud and abuse act I 984 revised in I 994 amended in I 986 in United
states to prevent and control cyber crime.
− This act prohibits unauthorized access to the computer to commit crime.
− Section 65 of IT act 2000 in India prohibits tampering with computer source
documents and prescribes punishments.
− Hacking is a crime where hackers perform damage. Spy. Credit-card theft and fraud
after gaining unauthorized control of victim’s computers or when they are recruited
by criminals to advice and assist them.
− The computer misused act 1990 and in USA, the computer fraud and abused act
prohibits hacking. Section 65 & 66 of IT act 2000 in India prohibits hacking.
− S. Raymond in the year 1993 defines hackers in many ways:
− Ankit Fada and Dr. Nerukar India are ethical hackers. To test the security
system, ethical hackers use the same method as their principle counterpart.
but report problems instead of taking advantages of them.
− For e.g. a virus could attach itself to a document file. When this infected document is
transferred to another device, the virus also gets copies.
− Example: Melissa, love bytes, Italian viruses etc. In 1981, the first virus was exposed
to the world and was found on Apple II operating system
− Some program are virus disguise and when executed they load the virus in the
memory along with the program and perform predefined steps and infect the
system.
− They infect .exe, .sys, .com, .bin, .drv. Some viruses just replicate themselves while
other destroys the program being used at that time. So when these viruses are
removed the program are also need to be repaired E.g Sunday, cascade.
Multipartite viruses
− It is hybrid variety of file and boot virus.
Stealth viruses
− They are silent in nature and use various methods to hide themselves to avoid
detection.
− They sometime remove themselves from the memory temporarily and hide
themselves from virus scanners. Some can also redirect the disk head to read
another sector instead in which they resides.
− They may also increase the length of infected file.
− E.g. Whale virus adds 9216 bytes to an infected file and then the virus subtract the
same number of bytes from the size given in the directory.
Polymorphic virus
− They have ability to mutated means they can change the viral code known as
signature each time they spread.
− So the antiviruses which look for specific virus code are not able to detect such
viruses. E.g. in January I 986, Brain is considered to be first computer virus for PC.
Worm
− Like virus, even worms are malicious files that cause harm to the target device.
− The main difference between virus and worms is that, worms have their own
mechanism for transmission and infection purpose.
− E.g.a worm have ability to automatically transmit itself either through Bluetooth or
SMS Message.
− The worms become more dangerous as it explicitly do not depend on the user for
their propagation (spread).
− Cabir worm was the first worm with the ability to infect mobile phone devices.
− E.g. the most famous worm was the Internet worm. When the internet was in its
developing years. This worm has affected thousands of computers, almost brought
its development to a halt.
− It took a team of expert almost 3 days to get rid of the worm, so many of the
computers had to be disconnected from the network.
Trojan horse
− Trojans are malicious files that can be best described as worms which can be used for
carrying out harmful activities on the target computer.
− The main difference between Trojans and worms is that Trojans requires the user to
explicitly install them on the target device.
− Without user intervention Trojans cannot infect and become active on device.
− Example: keylogger
− They are used to log all the keystrokes a victim makes on the keyboard. If a key logger is
installed on a computer which is regularly used for online banking and other financial
transactions, the keys are recorded on that computer. They are commonly found on
public computers, such as those in cyber cafés, hotels etc.
− It is an email activity in which the sender address and other parts of the email header
are altered to appear as though the email originated from different source.
− As SMTP doesn’t provide any authentication, it is easy to pretend and forge emails.
− However, spoofing anyone is illegal in jurisdiction.
− Although, an SMTP service extension allows client to negotiate a security level with a
mail server, this precaution is not taken.
− If precaution is not taken, anyone with requisite knowledge can connect to the server
and use it to send messages.
− To send spoof emails, the sender inserts commands in the header that will alter
message information.
− It is possible to send a message that appears to be from anyone, anywhere, saying
whatever the sender wants it to say.
− This someone could send spoofed email that appears to be from you with a
message that you didn’t wrote.
− Although most spoofed emails require an action other than deletion, the more
malicious varieties can cause serious problems and security risks.
− e.g. spoofed email may be from someone in a position of authority, asking for sensitive
data such as passwords, credit card data or other personal information.
− Email spoofing may occur in different forms but all have a similar result.
− A user receives email that appears to have originated from one source when it actually
was sent from another source.
− Example of email spoofing that could affect the security of your site include:
− Email claiming from a system administrator requesting users to change their passwords
to a specified string and threatening to suspend their account if they do not do this.
− Email claiming to be from a person in authority, requesting users to send them a copy of
password file or other sensitive information.
− The name you set will be displayed in the recipient’s mail program as the person from
whom the mail was sent.
− Likewise, you can type anything you like in the field on the page that ask for the email
address.
− These fields are separate from the field where you enter your account name assign to
you by ISP.
− When this simplest method is used, you can tell from where the mail originated by
changing the actual mail header.
− Many email clients don’t show this by default.
− e.g. in outlook express, open the message and then click on view .> options to see the
header. Unfortunately, even the header doesn’t always tell you the truth about where
the message came from.
Email spamming
− Spam is flooding the internet with many copies of same message, in an attempt to force
the message on the people who has not chosen to receive it.
− Most spam is commercial advertisement of products. Spam cost the sender very little to
send, most of the cost are paid by the recipient or the carrier.
− Email spam targets individual users with direct mail message.
− A person who creates electronic spam is called spammer
− Email spam is also known as Unsolicited Bulk Email (UBE) or junk mail or
Unsolicited Commercial Email (UCE).
− So we can say, email spam is the practice of sending unwanted email messages,
frequently with commercial content, in large quantities to indiscriminate set of
recipients.
− Email spam is sent through Zombie network, a network of virus and worms infected
computers in home and offices around the globe.
− Many modern worms install a backdoor who allows the spammer to access the
computer and use it for malicious purposes.
− Spam is also a medium for fraudsters to scam users into entering personal
information on fake websites using emails that look like they are from banks or other
organization such as paypal, this is known as phishing.
− Targeted phishing, were known information about the recipient is used to create forged
email is known as spear phishing.
− Spam techniques
− Appending
− If a marketer has one database containing name, addresses and telephone number of
the customers, they can pay to have their database matched against an external database
containing email addresses.
− The company then have the means to send email to persons which have not requested
email.
− Image spam
− It is a method in which the text of a message is stored as .gif or .jpeg image and display
in the email.
− This prevents text based spam filters from detecting and blocking spam messages.
− It contains computer generated text which annoys the reader.
− However, new technologies in some programs try to read the images by attempting to
find text to those images.
− They are not accurate as some times it filters out images which are reliable.
− Some newer technique such as animated gif that does not contain clear text in its initial
frame is also used.
− Blank spam
It is a spam lacking an advertisement. The message body and subject line both are
missing.
− Blank spam can have been sent in a directory harvest attack, a form of directory attack
for gathering valid email addresses from an email service provider. Since the goal is to
use the bounces to separate invalid addresses.
− Backscatter
It is side effect of email spam, viruses and worm, were email servers receiving spam and
other mail send bounce messages to an innocent party.
This occurs because the original message sender is forged to contain the email address
of the victim.
− Theft of service
− Spammers frequently seek out and make use of vulnerable third party systems such as
open proxy servers.
− SMTP forwards mail from one server to another where the mail server requires some
form of authentication to ensure that the user is valid customer of ISP.
− However, some servers do not properly check who is using the mail server and passes
all mail to destination address.
− Spammer use networks of malware infected computers known as “Zombie network”.
− It is also known as BotNet (ROBOT).
− Anti-spam techniques
Some popular methods for filtering and refusing spam include email filtering based on
the content of the email, DNS based black hole list (DNS BL), grey listing, spam traps,
enhancing technical requirement of SMTP etc.
− Spam can also be hidden inside a fake “Undelivered mail notification” which looks like
failure notice sent by a mail transfer agent when it encounters an error.
− A number of online activities and business practices are considered by anti-spam
activists to connect to spamming.
− This are termed as spam support services:
business services, other than the actual sending of spam itself, which permits the
spammer to continue operating.
− It can include processing orders for goods advertised in spam, hosting websites etc.
− Some internet hosting firms advertise bulk- friendly or bullet proof hosting.
− This means that, unlike most ISP’s they will not terminate a customer for spamming.
− So few companies produce spamware or software design for spammers.
− It has ability to import thousands of addresses to generate random addresses to insert
fraudulent headers into messages; to use hundred’s of mail server simultaneously.
Email Bombing
− It refers to sending a large number of emails to the victim resulting in the victims email
account or a mail server crashing.
− It is a type of DoS attack.
− A DoS attack is one in which a flood of information request is sent to a server, bringing
the system down and making the server difficult to access.
− Methods
− Mass Mailing
− It consists of sending numerous duplicate mails to the same email address.
− This type of mail bombs are simple to design but their extreme simplicity means they
can be easily detected by spam filters.
− This technique is also commonly performed as DDoS attack by employing the use of
Zombie network.
− This type of attack is difficult to defend because of the multiple source addresses and
the possibility of each zombie computer sending a different message.
− List Linking
− It means signing a particular email address up to several email list subscriptions.
− The victim has to unsubscribe from this unwanted services manually.
− In order to prevent this type of bombing, most email subscription services send a
confirmation email to a person’s inbox when that email is used to register for a
subscription.
− Once an email bomb is activated, it is difficult to stop. This is why it is better to take
some precautionary measures that would help you email bombs.
One way to do this is by creating multiple email accounts.
− For e.g.You should have an email address that you would share only with your friends
and family members, another email account that you may use to transact for online
services and beside this you must also enable spam filter to block such emails.
− You can also use anti-spam software.
− A zip bomb is a variant of mail bombing.
− All the commercial mail servers began checking mail with anti-virus software and
filtering certain malicious file types such as .exe, .rar, .zip etc.
− Mail server software was configured to unpack archives and check their content and
data.
− So, the attackers then create a bomb consisting of an enormous text files containing, for
e.g. only the letter ‘Z’ repeating millions of times.
− This file is compressed into a relatively small archive, but unpacking it would use a
greater amount of processing. This may slow down the mail server.
− As soon as this oversized packet reaches the target network, it causes the target
system to hang. Reboot or crash.
e.g. ping —I 65550 hostname
(2) Teardrop
− This attack exploits the vulnerability in the reassembling of data packets.
− As we know that, before being send through the internet, data is broken down into
smaller data grams.
− These packets have an offset field in their TCP/IP header.
− This offset field specifies from which byte to which byte does that particular data
packet carries data.
− Now, in this attack, a series of data packets are send to the system with overlapping
offset field values.
− As a result, the target system is not able to reassemble the packets and is forced to
crash, hang or reboot.
− Typically a DoS attack consist of an attacks trying to force a remote target computer
to crash, reboot or hang.
− Moreover, if the attacker does not use source spoofing, there is a possibility to
identify him and trace it.
− Due to this short coming associated with regular DoS attack, many attackers came
up with Distributed DoS attack or D-DoS attack.
− In D-DoS attack, the attacker follows following steps
1. Instead of directly attacking, the target system, the attacker first identifies a less
secure network. The attacker chooses network in such a manner that it is not secure
and relatively contain large number of system.
2. The attacker then breaks into this less secure network and takes control of all its
system. Then the attacker install D-DoS attack tool on each system.
3. The attacker uses all systems in the network to carry out D-DoS attack on the
target system.The attacker is able to control all this system with a single command
line instruction.
− Advantages of D-DoS attacks
− It is difficult to trace the identity of the attacker.
− It is more effective, faster and more
dangerous.
− Since the attacker has complete control over the network, he can destroy all
evidence from the log file of the Operating System.
− There is no specific counter measure for D-Dos attack.
3.3 Various crimes:
3.3.1 IPR Violations (Software piracy, Copyright Infringement, Trademarks Violations,
Theft of Computer source code, Patent Violations)
Intellectual Property Rights (IPR) Violations
Software piracy
Patent violation
− A patent for an invention is the grant of a property right to the inventor, issued by
country’s patent and trademark office.
• The right conferred by the patent grant “The right to exclude others from making,
using, ordering for sale.
− Patent protection must be given in every country by the government.
− If a court finds that patent infringement has occurred, the judge will award damages
adequate to compensate for the infringement.
Copyright infringement
− A copyright is a form of protection provided to the authors of “original works of
authorship”, including literacy, dramatic, musical, artistic and certain other
intellectual works, both published and unpublished.
− The court may award monetary damages if copyright infringement is proved.
Theft of compute source code
− Computer source code is the most important asset of the software companies.
− The source code is compiled into executable files that are sold by software
development companies.
− Most source code theft take place in this companies for e.g. the suspect steal the
source code and sell it to the business rival.
(1) Typo Squatting a cyber squatter register domain name containing variant of
trademarks. Typo squatters relay on the fact that internet user will make
typographical error when entering domain names into their web browser. e.g. the
omission of dot (.) in the domain name (wwwexample.com).
(2) Renewal snatching — cyber squatters relay on the fact that trademark holder. Often
forgot to re-register their domain names, as domain registration is for fixed period
and if owner does not re-register the domain name prior to expiration, then the
domain name can be purchase by anybody. Here cyber squatters will snatch up a
domain name as it is available.
(4) Reverse domain hijacking — there are several company or individuals trying to take
generic domain name away from their owners by making false claim of trademark
violation.
− Money is the most common motive behind all crimes (cyber crime).
− Globally it is being observe that more and more cyber crimes are being committed
for financial motive rather than for revenge or for fun.
− With the tremendous increase in the use of internet and mobile banking, online
share trading. Dematerialization of shares and securities, cyber crimes are also
increased.
− Financial crime includes cyber cheating, credit card frauds, hacking into bank’s
server, accounting scams etc.
− In the corporate world, Internet hackers are continually looking for opportunities to
compromise a company’s security in order to gain access to confidential banking
and financial information.
− Use of stolen card information or fake credit/debit cards is also common.
− Example
− Bank employee inserts a program into a bank server that deducts a small amount of
money from the account of every customer and adds it to their own account.
− No account holder will probably notice this unauthorized debit, but the bank
employee will make sizable amount of money every time.
− This attack is called “Salami Attack”.
− This attack is used for committing financial crime.
− The important thing here is to make alteration so insignificant that in a single case it
would remain completely unnoticed.
− Credit card fraud is an inclusive term for fraud committed using a payment card,
such as a credit card or debit card.
− The purpose may be to obtain goods or services, or to make payment to another
account which is controlled by a criminal.
− The Payment Card Industry Data Security Standard (PCI DSS) is the data security
standard created to help businesses process card payments securely and reduce
card fraud.
− Credit card fraud can be authorised, where the genuine customer themselves
processes a payment to another account which is controlled by a criminal, or
unauthorised, where the account holder does not provide authorisation for the
payment to proceed and the transaction is carried out by a third party.
− There are two kinds of card fraud:
card-present fraud (not so common nowadays) physically
card-not-present fraud (more common). Not physically
− The compromise can occur in a number of ways and can usually occur without the
knowledge of the cardholder.
− The internet has made database security lapses particularly costly. In some cases,
millions of accounts have been compromised.
− When a credit card is lost or stolen, it may be used for illegal purchases until the
holder notifies the issuing bank and the bank puts a block on the account.
− Most banks have free 24-hour telephone numbers to encourage prompt reporting.
− Still, it is possible for a thief to make unauthorized purchases on a card before the
card is cancelled.