The term cybercrime can refer to any criminal activity that involves a computer, either as the tool of the crime or as its target. According to the Department of Justice, all cybercrime can be organized into three categories – crimes that use computers as a weapon (e.g. hacker attacks), crimes that target a computer or another device (e.g. to gain access to a network), and crimes where a computer is neither the main tool nor the main object but still plays an important part (e.g. storing of illegally downloaded files).
Although many law enforcement agencies around the world have started cracking down on cybercrime, the increasing trend is showing no signs of decline. To avoid being persecuted, some cybercriminals have moved to countries with weak cybercrime laws and switched from dollars to untraceable cryptocurrency.
Anyone can fall victim to cybercrime, and the fact that we are all virtually connected puts each of us at an even greater risk. Our International cybercrime investigators at ICIA are here to help.
Examples of Cybercrime Cases are:
Phishing Attack Investigation
This a technique of extracting confidential information such as credit card numbers and username password combos by masquerading as a legitimate enterprise Typically carried out by email spoofing or instant messaging it often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site. A very common form of cybercrime. ICIA’s team of cybercrime investigators will search for every clue to gain evidence against the criminal.
This is the process of determining the functionality, origin and potential impact of a given malware sample such as a virus, worm, trojan horse, rootkit, or backdoor. Malware or malicious software is any computer software intended to harm the host operating system or to steal sensitive data from users, organizations or companies. Malware may include software that gathers user information without permissio.
If an organization discovers or suspects that some malware may have gotten into its systems, our cybercrime response team may wish to perform malware analysis on any potential samples that are discovered during the investigation process to determine if they are malware and, if so, what impact that malware might have on the systems within the target organizations’ environment. Our cybercrime investigation team have the equipment and knowledge to advise our clients and investigate the matter within a safe environment.
Email Fraud Investigation
This type of cybercrime is highly common.
Email fraud is the intentional deception made for personal gain or to damage another individual through email. Almost as soon as email became widely used, it began to be used as a means to defraud people.
Too good to be true…Email solicitations to purchase goods or services may be instances of attempted fraud. The fraudulent offer typically features a popular item or service, at a drastically reduced price. At ICIA our cybercrime investigators have an array of solutions to tackle this ‘old’ but successful crime.
Business email compromise
BEC is a form of email fraud where employees with access to company finances are tricked into making money transfers by an email pretending to be from the CEO, or a trusted customer. This cybercrime can cause huge financial damage to a company.
Cyber stalking is a new form of internet crime in our society when a person is pursued or followed online.
Cyber stalking uses the internet or any other electronic means and is different from offline stalking, but is usually accompanied by it. Cyber stalkers harass their victims via email, chat rooms, web sites, discussion forums and open publishing web sites (e.g. blogs). This cybercrime can be extremely dangerous to the physical safety of the victim. Personal safety is paramount, so our ICIA cybercrime team will act swiftly to locate the criminal.
Identity Theft and Credit Card Fraud
Your data can be stolen online by hackers and sold on the dark web. This is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain credit. “Credit card fraud” can be attempted, where the criminal uses your credit card to fund his transactions. This cybercrime can create great financial loss to the victims. ICIA has a specialist cybercrime team to search for your data and provide protection.
Almost 17 million Americans were victims of this form of cybercrime in 2017, hackers net almost $17 billion in 2017 from this cybercrime.
A Denial-of-Service (DoS) attack is an explicit attempt by attackers to deny service to intended users of that service. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.
Cybercrime for large finacial gain, Denial-of-Service attacks typically target high profile web site servers belonging to banks and credit card payment gateways. Websites of companies such as Amazon, CNN, Yahoo, Twitter and eBay! are not spared either. ICIA provides solutions to individuals and large companies to protect against this cybercrime.
Email bombing and spamming
Email bombing is characterised by an abuser sending huge volumes of email to a target address resulting in victim’s email account or mail servers crashing. Our cybercrime team can examine the clues left behind and provide a more secure environment for our clients.
Ransomware is malicious software that locks the victim out of their computer or blocks access to the files stored on their hard drive. Since 2013 Ransomware has cost businesses and institutions billions of dollars in lost revenue. Criminals will demand bitcoin payments to unlock your computer system. ICIA have a team of Bitcoin & Cryptocurrency investigators to combat this cybercrime.
New examples of cybercrime
With the number of online criminal activities on the rise, new examples of cybercrime can be found in the tech news almost daily.