Cyber Crime Case Studies
Case 1: Sony
PlayStation Network Attack
By: Khadija tul Qubra
In 2011 Sony
PlayStation network was hacked by anonymous group of hacker called LulzSec.
Sony shut down their online services between April and May to secure the
breach. More than 70 million users’ data and personal information was put at
risk because of this attack. It was the largest identity theft on record
(Gaudiosi, 2014).
This attack was
successful because passwords were not in hash format. Hash format allows system
to check for the accuracy of password while maintaining the secrecy of the
passwords. Sony organizational structure is silos which was also responsible
for the attack. They need better sharing of security in their organization to
avoid security breaches (Gaudiosi, 2014).
Sony responded the
attack by shutting down the system to solve the issue. This attack cost Sony
171 million in legal cost, a welcome back campaign and various other costs
(Vanderbug, n.d). They worked with law enforcement and a recognized technology
security firm to conduct investigation (Seybold, 2011). The forensic team after
monitoring reveled that about nine or ten serves were compromised (Takahashi,
2011).
Case 2: Hacker hacks
into financial website
By: Shahad Maddah
Mumbai police have
captured a hacker by name Kalpesh for hacking into a money related site.
Despite the fact that the hacker couldn't break into the principle server of
the budgetary establishment, which was very much secured by the money related
organization. The charged individual could make some option to the landing page
of the budgetary site and has added a string of content to the news module of
the landing page of the site. Police had the capacity split the case by taking
after the follow left by the hacker on the web server of the money related
organization. The money related foundation has kept up a different server for
monetary online exchanges, for which the financial establishment has taken most
extreme security. The site was facilitated on an alternate server, which
similarly had lesser security.
The hacker Kalpesh
is a tenth Pass adolescent of 23 years of age. He has done PC courses like
CCNA, MCSE and so forth. Yet, he is a PC junkie. He sits before the PC for very
nearly 16 to 20 times every day. He has for the most part utilized the ready
made hacking apparatuses, to hack into any site. He goes to a specific site on
the web, which encourages him to see the whole index structure of that site. At
that point utilizing different procedures, for example, acquiring a secret word
document, he gets into the head's shoes and hacks the site. A body of evidence
has been enrolled against the hacker under area 67 of Data Innovation Act –
2000 and under different segments of Indian Correctional Cod.
Case 3: Conviction in
India
By: Shaima Albugami
In May 2002,
a boy named Arif Azim ordered a Sony Colour Television set and a cordless head
phone. He used a lady's credit card number to do the payment. A lady gave her
credit card number for payment and requested that the products be delivered to
Arif Azim in Noida. The transaction was processed and the payment was duly
cleared by the credit card agency. After checking everything, the company
delivered the items to Arif Azim.
At the time of
delivery, the company took digital photographs showing the delivery being
accepted by Arif Azim. No one notices anything at that time. However, after one
and a half months the real owner had denied having made the purchase.
Therefore, the credit card agency informed the company that this was an unauthorized
transaction.
The matter was
investigated into and Arif Azim was arrested. Investigations revealed that Arif
Azim, while working at a call centre in Noida gained access to the credit card
number of an American national, which he misused on the company’s site.The CBI
recovered the colour television and the cordless headphone. The accused
admitted his guilt and the court of Shri Gulshan Kumar Metropolitan Magistrate,
New Delhi, convicted Arif Azim under Section 418, 419 and 420 of the Indian
Penal Code — this being the first time that a cyber crime has been convicted.
The court, however,
felt that as the accused was a young boy of 24 years and a first-time convict,
a lenient view needed to be taken. The court therefore released the accused on
probation for one year.
Case4: Cyber criminals
target Skype, Facebook and Windows users
By: Wed Almarhabi
Cyber criminals
targeted users of Skype, Facebook and Windows using multiple Blackhole exploits
in October, according to the latest threat report from security firm GFI
Software. Researchers uncovered a large number of Blackhole exploits
disguised as Windows licenses. Facebook account verification emails, Skype
voicemail notifications and Spam messages.
Blackhole exploits
require victims to open links to compromised websites hosting a file that must
be downloaded and executed to complete the attack. This file contains a
JavaScript which scans for unpatched software and other vulnerabilities before
deploying the appropriate exploits and infecting a machine. The compromised
links can be customised to target customers of specific companies, members of
various social networking sites, or general internet users seeking information
on popular news stories and events.
Researchers found
that just days before the release of Microsoft’s Windows 8, some users
encountered spam emails offering a free “Microsoft Windows License”. Users who
clicked the malicious link and downloaded the accompanying file were hit with a
Blackhole exploit and infected with a Cridex Trojan.
Another spam email
campaign targeted Facebook users with a message claiming that their account was
locked and needed to be re-verified. The links led to Blackhole exploits and a
Zeus Trojan disguised as an Adobe Flash Player download.
Skype
users were also targeted by multiple campaigns. Some received spam emails
containing phony voicemail notifications. Users who clicked on the Blackhole
links were infected with a Zeus Trojan. Other users were confronted with spam
messages from their Skype contacts containing generic questions about their
profile picture and a link to a Trojan which infected their systems, deleted
itself and began making DNS requests to various malicious URLs.
While many of
these sites were quickly taken down, the spam campaign began hijacking victims’
PCs for click fraud and directing them to ransom-ware messages, demanding
payment of fines for illegal file-sharing.
Case 5: Cyber Crime attack on Ebay
By: Fiza Mirza
Last year in
2014, eBay faced a cyber-attack and their customer privacy was eradicated. The
attack was done to steal the sensitive information of the customers using the
eBay site. Approximately 145 customers were affected and their information was
stolen which made this attack as one of the biggest attacks till date.
The attack was done by injecting malicious content into
the eBay systems and common scripting languages were used which were not new to
the site. They infiltrated the website and used the employee login credentials
to get into the system. The database that was hacked included customers’ names,
encrypted passwords, email, physical addresses, phone numbers and date of
birth. The hacker could use these personal information for identity theft. The
hacked database however, did not contain financial information.
Another factor that lead to easy hack of the site was that
eBay was using easily cracked methods for protecting the passwords. Which was
more prone to hacking.
Initial attack started with the employee login information
being stolen, which made easy access to all the information stored about the
customers. The company responded by informing their customers about this breach
and asked them to change their passwords (since the customers use same
passwords for multiple websites), and also not to respond to any unknown emails.
The solution to such issue would be to secure the
passwords and username of the users more strictly. Another way is to apply
cryptography in the system to secure the communications. Firewall and
Verification software’s must be used and to have a highly professional security
staff to monitor the system and detect any threats.
Case 1:
1. Seybold,
P. (2011, April 27). Q&A #1 for PlayStation Network and Qriocity Services.
Retrieved August 29, 2015.
2. Gaudiosi,
J. (2014, December 24). Why Sony didn't learn from its 2011 hack. Retrieved
August 29, 2015, from
http://fortune.com/2014/12/24/why-sony-didnt-learn-from-its-2011-hack/
3. Vanderbug,
E. (n.d.). LulzSec Information Security Case Study Volume 3 – Sony. Retrieved
August 29, 2015, from
http://jurinnov.com/lulzsec-information-security-case-study-volume-3-sony/
4. Takahashi,
D. (2011, May). Chronology of the attack on Sony’s PlayStation Network.
Retrieved August 29, 2015, from http://venturebeat.com/2011/05/04/chronology-of-the-attack-on-sonys-playstation-network/
Case 3:
Dr. Uma Somayajula,
an eminent IT Security professional and DSCI member provided Cyber Crime case
Case 4:
Ashford, W. (Ed.). (2014, December 13). Cyber
criminals target Skype, Facebook and Windows users.
Case 5:
Prigg, M. (2014, May 23). EBay
admits it kept massive cyber-attack secret because it thought customer data was
safe - but will STILL not say how long it knew data of 145m users was
compromised. Retrieved from http://www.dailymail.co.uk/sciencetech/article-2637899/eBay-refused-admit-massive-cyber-attack-thought-customer-data-safe.html