IN Banks: Cyber Crimes
IN Banks: Cyber Crimes
IN Banks: Cyber Crimes
CRIMES
IN
BANKS
.
Cyber crimes are any illegal activities committed using computer target of
the criminal activity can be either a computer, network operations. Cyber
crimes
are genus of crimes, which use computers and networks for criminal activities.
The difference between traditional crimes and cyber crimes is the cyber crimes
can be transnational in nature. Cyber crime is a crime that is committed online
in
many areas using e-commerce. A computer can be the target of an offence
when
unauthorized access of computer network occurs and on other hand it affects
ECOMMERCE.
Cyber crimes can be of various types such as
Telecommunications Piracy, Electronic Money Laundering and Tax Evasion,
Sales and Investment Fraud, Electronic Funds Transfer Fraud and so on…
The modern contemporary era has replaced these traditional monetary
instruments from a paper and metal based currency to “plastic money” in the
form of credit cards, debit cards, etc. This has resulted in the increasing use of
ATM all over the world. The use of ATM is not only safe but is also convenient.
This safety and convenience, unfortunately, has an evil side as well that do not
originate from the use of plastic money rather by the misuse of the same. This
evil side is reflected in the form of “ATM frauds” that is a global problem.
Internet commerce has grown exponentially during the past few years and
is still growing. But unfortunately the growth is not on the expected lines
because
the credit card fraud which has become common has retarded the e-commerce
growth. Credit card fraud has become regular on internet which not only
affects
card holders but also online merchants. Credit card fraud can be done by
taking
over the account, skimming or if the card is stolen. Certain preventive
measures
can be taken to becoming a credit card victim.
The term "Internet fraud" refers generally to any type of fraud scheme that
uses one or more components of the Internet - such as chat rooms, e-mail,
message boards, or Web sites - to present fraudulent solicitations to
prospective
victims, to conduct fraudulent transactions, or to transmit the proceeds of
fraud to
financial institutions or to other connected with the scheme.
Some form of internet frauds include:- spam’s , scams spy ware,
identity theft, phishing ,internet banking fraud.
CYBER CRIME
INTRODUCTION
The usage of internet services in India is growing rapidly. It has
given rise to new opportunities in every field we can think of – be it
entertainment, business, sports or education.
There are many pros and cons of some new types of technology
which are been invented or discovered. Similarly the new & profound
technology
i.e. using of INTERNET Service, has also got some pros & cons. These cons
are
named CYBER CRIME, the major disadvantages, illegal activity committed on
the internet by certain individuals because of certain loop-holes. The internet,
along with its advantages, has also exposed us to security risks that come
with
connecting to a large network. Computers today are being misused for illegal
activities like e- mail espionage, credit card fraud, spams, and software piracy
and so on, which invade our privacy and offend our senses. Criminal activities
in
the cyberspace are on the rise.
Computer crimes are criminal activities, which involve the use
of information technology to gain an illegal or an unauthorized access to a
computer system with intent of damaging, deleting or altering computer data.
Computer crimes also include the activities such as electronic frauds, misuse
of
devices, identity theft and data as well as system interference. Computer
crimes
may not necessarily involve damage to physical property. They rather include
the
manipulation of confidential data and critical information. Computer crimes
involve activities of software theft, wherein the privacy of the users is
hampered.
These criminal activities involve the breach of human and information privacy,
as
also the theft and illegal alteration of system critical information. The different
types of computer crimes have necessitated the introduction and use of newer
and more effective security measures.
In recent years, the growth and penetration of internet across
Asia Pacific has been phenomenal. Today, a large number of rural areas in
India
and a couple of other nations in the region have increasing access to the
internet
—particularly broadband. The challenges of information security have also
grown
manifold. This widespread nature of cyber crime is beginning to show negative
impact on the economic growth opportunities in each of the countries.
It is becoming imperative for organizations to take both
preventive and corrective actions if their systems are to be protected from any
kind of compromise by external malicious elements. According to the latest
statistics, more than a fifth of the malicious activities in the world originate
from
the Asia Pacific region. The malicious attacks included denial-of-service
attacks,
spam, and phishing and bot attacks. Overall, spam made up 69% of all
monitored e-mail traffic in the Asia Pacific region. As per the National Crime
Records Bureau statistics, there has been a 255% increase in cyber crime in
India alone. And mind you, these are just the reported cases. In view of this,
various governmental and non-governmental agencies are working towards
reducing cyber crime activities.
Computer crime, cybercrime, e-crime, hi-tech crime or
electronic crime generally refers to criminal activity where a computer or
network is the source, tool, target, or place of a crime. These categories are
not exclusive and many activities can be characterized as falling in one or
more
category. Additionally, although the terms computer crime and cybercrime are
more properly restricted to describing criminal activity in which the computer
or
network is a necessary part of the crime, these terms are also sometimes used
to
include traditional crimes, such as fraud, theft, blackmail, forgery, and
embezzlement, in which computers or networks are used. As the use of
computers has grown, computer crime has become more important.
Cyber Criminals
The cyber criminals constitute of various groups/ category. This division may be
justified on the basis of the object that they have in their mind. The following are
the category of cyber criminals-
1. Children and adolescents between the age group of 6 – 18 years
The simple reason for this type of delinquent behaviour pattern in children is
seen mostly due to the inquisitiveness to know and explore the things. Other
cognate reason may be to prove themselves to be outstanding amongst other
children in their group. Further the reasons may be psychological even. E.g. the
Bal Bharati (Delhi) case was the outcome of harassment of the delinquent by his
friends.
2. Organized hackers
These kinds of hackers are mostly organized together to fulfill certain objective.
The reason may be to fulfill their political bias, fundamentalism, etc. The
Pakistanis are said to be one of the best quality hackers in the world. They
mainly target the Indian government sites with the purpose to fulfill their political
objectives. Further the NASA as well as the Microsoft sites is always under
attack by the hackers
3. Professional hackers / crackers
Their work is motivated by the colour of money. These kinds of hackers are
mostly employed to hack the site of the rivals and get credible, reliable and
valuable information. Further they are ven employed to crack the system of the
employer basically as a measure to make it safer by detecting the loopholes.
4. Discontented employees
This group includes those people who have been either sacked by their employer
or are dissatisfied with their employer. To avenge they normally hack the system
of their employee.
Working of Cyber Criminals
Cyber crime has become a profession and the demographic of your
typical cyber criminal is changing rapidly, from bedroom-bound geek to the type
of organized gangster more traditionally associated with drug-trafficking, extortion
and money laundering.
It has become possible for people with comparatively low technical
skills to steal thousands of pounds a day without leaving their homes. In fact, to
make more money than can be made selling heroin (and with far less risk), the
only time the criminal need leave his PC is to collect his cash. Sometimes they
don't even need to do that.
In all industries, efficient business models depend upon horizontal
separation of production processes, professional services, sales channels etc.
(each requiring specialized skills and resources), as well as a good deal of trade
at prices set by the market forces of supply and demand. Cyber crime is no
different: it boasts a buoyant international market for skills, tools and finished
product. It even has its own currency.
The rise of cyber crime is inextricably linked to the ubiquity of credit
card transactions and online bank accounts. Get hold of this financial data and
not only can you steal silently, but also – through a process of virus-driven
automation – with ruthlessly efficient and hypothetically infinite frequency.
The question of how to obtain credit card/bank account data can be
answered by a selection of methods each involving their own relative
combinations of risk, expense and skill.
The most straightforward is to buy the ‘finished product’. In this case we’ll
use the example of an online bank account. The product takes the form of
information necessary to gain authorized control over a bank account with a sixfigure
balance. The cost to obtain this information is $400 (cyber criminals always
deal in dollars). It seems like a small figure, but for the work involved and the risk
incurred it’s very easy money for the criminal who can provide it. Also remember
that this is an international trade; many cyber-criminals of this ilk are from poor
countries in Eastern Europe, South America or South-East Asia.
The probable marketplace for this transaction will be a hidden IRC
(Internet Relay Chat) chatroom. The $400 fee will most likely be exchanged in
some form of virtual currency such as e-gold.
Not all cyber-criminals operate at the coalface, and certainly don’t
work exclusively of one another; different protagonists in the crime community
perform a range of important, specialized functions. These broadly encompass:
Coders – comparative veterans of the hacking community. With a few
years' experience at the art and a list of established contacts, ‘coders’ produce
ready-to-use tools (i.e. Trojans, mailers, custom bots) or services (such as
making a binary code undetectable to AV engines) to the cyber crime labour
force – the ‘kids’. Coders can make a few hundred dollars for every criminal
activity they engage in.
Kids – so-called because of their tender age: most are under 18. They
buy, trade and resell the elementary building blocks of effective cyber-scams
such as spam lists, php mailers, proxies, credit card numbers, hacked hosts,
scam pages etc. ‘Kids’ will make less than $100 a month, largely because of the
frequency of being ‘ripped off’ by one another.
Drops – the individuals who convert the ‘virtual money’ obtained in
cyber crime into real cash. Usually located in countries with lax e-crime laws
(Bolivia, Indonesia and Malaysia are currently very popular), they represent ‘safe’
addresses for goods purchased with stolen financial details to be sent, or else
‘safe’ legitimate bank accounts for money to be transferred into illegally, and paid
out of legitimately.
Mobs – professionally operating criminal organizations combining or
utilizing all of the functions covered by the above. Organized crime makes
particularly good use of safe ‘drops’, as well as recruiting accomplished ‘coders’
onto their payrolls.
Gaining control of a bank account is increasingly accomplished
through phishing. There are other cyber crime techniques, but space does not
allow their full explanation.
All of the following phishing tools can be acquired very cheaply: a
scam letter and scam page in your chosen language, a fresh spam list, a
selection of php mailers to spam-out 100,000 mails for six hours, a hacked
website for hosting the scam page for a few days, and finally a stolen but valid
credit card with which to register a domain name. With all this taken care of, the
total costs for sending out 100,000 phishing emails can be as little as $60. This
kind of ‘phishing trip’ will uncover at least 20 bank accounts of varying cash
balances, giving a ‘market value’ of $200 – $2,000 in e-gold if the details were
simply sold to another cybercriminal. The worst-case scenario is a 300% return
on the investment, but it could be ten times that.
Better returns can be accomplished by using ‘drops’ to cash the
money. The risks are high, though: drops may take as much as 50% of the value
of the account as commission, and instances of ‘ripping off’ or ‘grassing up’ to the
police are not uncommon. Cautious phishers often separate themselves from the
physical cashing of their spoils via a series of ‘drops’ that do not know one
another. However, even taking into account the 50% commission, and a 50%
‘rip-off’ rate, if we assume a single stolen balance of $10,000 – $100,000, then
the phisher is still looking at a return of between 40 and 400 times the meagre
outlay of his/her phishing trip.
In large operations, offshore accounts are invariably used to accumulate the
criminal spoils. This is more complicated and far more expensive, but ultimately
safer.
The alarming efficiency of cybercrime can be illustrated starkly by
comparing it to the illegal narcotics business. One is faster, less detectable, more
profitable (generating a return around 400 times higher than the outlay) and
primarily non-violent. The other takes months or years to set-up or realise an
investment, is cracked down upon by all almost all governments internationally,
fraught with expensive overheads, and extremely dangerous.
Add phishing to the other cyber-criminal activities driven by hacking
and virus technologies – such as carding, adware/spyware planting, online
extortion, industrial spying and mobile phone dialers – and you’ll find a healthy
community of cottage industries and international organizations working together
productively and trading for impressive profits. Of course these people are
threatening businesses and individuals with devastating loss, financial hardship
and troubling uncertainty – and must be stopped.
On top of viruses, worms, bots and Trojan attacks, organizations in
particular are contending with social engineering deception and traffic
masquerading as legitimate applications on the network. In a reactive approach
to this onslaught, companies have been layering their networks with stand alone
firewalls, intrusion prevention devices, anti-virus and anti-spyware solutions in a
desperate attempt to plug holes in the armoury. They're beginning to recognize
it's a failed strategy. After all, billions of pounds are being spent on security
technology, and yet security breaches continue to rise.
To fight cyber crime there needs to be a tightening of international
digital legislation and of cross-border law enforcement co-ordination. But there
also needs to be a more creative and inventive response from the organisations
under threat. Piecemeal, reactive security solutions are giving way to strategically
deployed multi-threat security systems. Instead of having to install, manage and
maintain disparate devices, organizations can consolidate their security
capabilities into a commonly managed appliance. These measures combined, in
addition to greater user education are the best safeguard against the
deviousness and pure innovation of cyber-criminal activities.