A cybercrime is understood as a culpable unlawful act (an action or omission) committed by a subject in cyberspace using computer networks, which is prohibited by current legislation under the threat of punishment. The Russian scholar
I. M. Rassolov, in his works, points out the following characteristics of cybercrimes: • The use of computer networks and international information exchange, which constitutes the principal distinguishing feature of a crime in the sphere of high technologies. In this case, the computer and its networks act as the object of the crime, the instrument of the crime, or the means on which unlawful acts are prepared. • The transnational nature of the crimes under consideration (they are committed in the global information space) and the international character of the participants in the criminal community. • A stable tendency toward the "organized" nature of cybercrimes and their expansion beyond national boundaries. • The presence of a criminal pyramid consisting of at least three levels of interaction. Computer crime encompasses a broad range of activities, including computer fraud,
financial crimes, scams,
cybersex trafficking, and
ad-fraud. A proposed taxonomy classifies cybercrime into two top-level groups:
pure-technology cybercrime and
cyber-advanced crime. Pure-technology cybercrime "targets or victimizes the computer technology ecosystem" to "disrupt the confidentiality, integrity, or availability of a computer-technology ecosystem", while cyber-advanced crime "uses computer technology to target or victimize natural persons, governments, business entities, or property" in order to "deprive, disrupt or damage entities or assets."
Computer fraud Computer fraud is the act of using a computer to take or alter electronic data, or to gain unlawful access to a computer or system. Computer fraud that involves the use of the Internet is also called
internet fraud. The legal definition of computer fraud varies by jurisdiction, but typically involves accessing a computer without permission or authorization. Forms of computer fraud include
hacking into computers to alter information, distributing malicious code such as
computer worms or
viruses, installing
malware or
spyware to steal data,
phishing, and
advance-fee scams. Other forms of fraud may be committed using computer systems, including
bank fraud,
carding,
identity theft,
extortion, and
theft of classified information. These types of crimes often result in the loss of personal or financial information.
Digital arrest Digital arrest is a form of online fraud where perpetrators impersonate law enforcement officials to deceive victims. This scam typically involves contacting individuals via phone, falsely claiming they are implicated in criminal activity related to a parcel containing illegal goods, drugs, counterfeit documents, or other contraband. In some variations, scammers target the victim's relatives or friends, falsely stating the victim is in custody due to criminal involvement or an accident. Victims are then coerced into remaining on camera and isolating themselves, while the fraudsters extract personal and financial information under the guise of an official investigation, ultimately transferring the victim's assets to
money mule accounts.
Fraud factories A fraud factory is a collection of large fraud organizations, usually involving cyber fraud and
human trafficking operations.
Cyberterrorism The term
cyberterrorism refers to acts of
terrorism committed through the use of cyberspace or computer resources. Acts of disruption of
computer networks and personal computers through
viruses,
worms,
phishing,
malicious software, hardware, or programming scripts can all be forms of cyberterrorism. Government officials and
information technology (IT) security specialists have documented a significant increase in network problems and server scams since early 2001. In the United States there is an increasing concern from agencies such as the
Federal Bureau of Investigation (FBI) and the
Central Intelligence Agency (CIA).
Cyberextortion Cyberextortion occurs when a website, e-mail server, or computer system is subjected to or threatened with attacks by malicious hackers, often through
denial-of-service attacks. Cyber extortionists demand money in return for promising to stop the attacks and provide "protection". According to the FBI, cyber extortionists are increasingly attacking corporate websites and networks, crippling their ability to operate, and demanding payments to restore their service. More than 20 cases are reported each month to the FBI, and many go unreported in order to keep the victim's name out of the public domain. Perpetrators often use a
distributed denial-of-service attack. However, other cyberextortion techniques exist, such as
doxing and
bug poaching. An example of cyberextortion was
the Sony Hack of 2014.
Ransomware Ransomware is a type of malware used in cyberextortion to restrict access to files, sometimes threatening permanent data erasure unless a ransom is paid. Ransomware is a global issue with 153 countries affected by this type of attack in 2024.The number of attacks is constantly growing, with 5,263 attacks in 2024. And this is the number of large and successful attacks with serious consequences, the total number of attempted attacks, including in automatic mode in 2021, amounted to more than 300 million attacks worldwide. Nearly a third of the major attacks (1,424) in 2024 targeted industrial enterprises (up 15% by 2023), affecting critical infrastructure and services, causing severe losses. In 2024 an attack on UK pathology provider Synnovis resulted in thousands of surgeries and appointments being canceled. Ransom amounts in attacks are also continuously and significantly increasing. According to the 2022 Unit 42 Ransomware Threat Report, in 2021, the average ransom demand in Norton cases was $2.2 million (up 144%), and the number of victims whose personal data ended up in the dark web's information dumps increased by 85%. Losses in 2021 and 2022 are nearly $400 million. In 2024, the average ransom amount is $5.2 million, with the two largest ransoms demanded from healthcare organizations - $100 million from India's Regional Cancer Center (RCC) and $50 million from Synnovis. Victims are abducted, threatened, or deceived and transferred to "cybersex dens". The dens can be in any location where the cybersex traffickers have a computer, tablet, or phone with an internet connection. and other platforms. They use
online payment systems and
cryptocurrencies to hide their identities. Millions of reports of cybersex incidents are sent to authorities annually. New legislation and police procedures are needed to combat this type of cybercrime. There are an estimated 6.3 million victims of cybersex trafficking, according to a recent report by the International Labour Organization. This number includes about 1.7 million
child victims. An example of cybersex trafficking is the 2018–2020
Nth room case in
South Korea.
Cyberwarfare According to the U.S.
Department of Defense, cyberspace has emerged as an arena for national-security threats through several recent events of geostrategic importance, including the attack on
Estonia's infrastructure in 2007, allegedly by Russian hackers. In August 2008, Russia again allegedly conducted cyberattacks against
Georgia. Fearing that such attacks may become a normal part of future warfare among nation-states, military commanders see a need to develop cyberspace operations.
Computers as a tool When an individual is the target of cybercrime, the computer is often the tool rather than the target. These crimes, which typically exploit human weaknesses, usually do not require much technical expertise. These are the types of crimes which have existed for centuries in the offline world. Criminals have simply been given a tool that increases their pool of potential victims and makes them all the harder to trace and apprehend. Crimes that use computer networks or devices to advance other ends include: • Fraud and identity theft (although this increasingly uses malware, hacking or phishing, making it an example of "computer as target" as well as "computer as tool") • Information warfare • Phishing scams •
Spam • Propagation of illegal, obscene, or
offensive content, including harassment and threats The unsolicited sending of bulk
email for commercial purposes (spam) is unlawful
in some jurisdictions. Phishing is mostly propagated via email. Phishing emails may contain links to other websites that are affected by malware. Or they may contain links to fake online banking or other websites used to steal private account information.
Obscene or offensive content The content of websites and other electronic communications may be distasteful,
obscene, or offensive for a variety of reasons. In some instances, it may be illegal. What content is unlawful varies greatly between countries, and even within nations. It is a sensitive area in which the courts can become involved in arbitrating between groups with strong beliefs. One area of
internet pornography that has been the target of the strongest efforts at curtailment is
child pornography, which is illegal in most jurisdictions in the world.
Ad-fraud Ad-frauds are particularly popular among cybercriminals, as such frauds are lucrative and unlikely to be prosecuted. Jean-Loup Richet, a professor at the
Sorbonne Business School, classified the large variety of ad-frauds committed by cybercriminals into three categories: identity fraud, attribution fraud, and ad-fraud services. Several countries besides the US have also created laws to combat online harassment. In China, a country with over 20 percent of the world's internet users, in response to the
Human Flesh Search Engine bullying incident, the Legislative Affairs Office of the State Council passed a strict law against cyberbullying. The United Kingdom passed the
Malicious Communications Act, which states that sending messages or letters electronically that the government deems "indecent or grossly offensive" and/or language intended to cause "distress and anxiety" can lead to a prison sentence of six months and a potentially large fine. Australia, while not directly addressing the issue of harassment, includes most forms of online harassment under the Criminal Code Act of 1995. Using telecommunication to send threats, harass, or cause offense is a direct violation of this act. Although
freedom of speech is protected by law in most democratic societies, it does not include all types of speech. Spoken or written threats can be criminalized because they harm or intimidate. This applies to online or network-related threats. Cyberbullying has increased drastically with the growing popularity of online social networking. As of January 2020, 44 percent of adult internet users in the United States had "personally experienced online harassment". Online harassment of children often has negative and even life-threatening effects. According to a 2021 survey, 41 percent of children develop social anxiety, 37 percent develop depression, and 26 percent have suicidal thoughts. The
United Arab Emirates was found to have purchased the
NSO Group's mobile spyware
Pegasus for
mass surveillance and a campaign of harassment of prominent activists and journalists, including
Ahmed Mansoor,
Princess Latifa,
Princess Haya, and others.
Ghada Owais was one of the many high-profile female journalists and activists who were targeted. She filed a lawsuit against UAE ruler
Mohamed bin Zayed Al Nahyan along with other defendants, accusing them of sharing her photos online.
Drug trafficking Darknet markets are used to buy and sell
controlled substances online. Some
drug traffickers use
encrypted messaging tools to communicate with drug mules or potential customers. The dark web site
Silk Road, which started operations in 2011, was the first major online marketplace for drugs. It was permanently shut down in October 2013 by the FBI and Europol. After Silk Road 2.0 went down, Silk Road 3 Reloaded emerged. However, it was just an older marketplace named
Diabolus Market that used the Silk Road name in order to get more exposure from the Silk Road brand's earlier success. Darknet markets have had a rise in traffic in recent years for many reasons, such as the anonymous purchases and often a system of reviews by other buyers. There are many ways in which darknet markets can financially drain individuals. Vendors and customers alike go to great lengths to keep their identities a secret while online. Commonly used tools for hiding their online presence include
virtual private networks (VPNs),
Tails, and the
Tor Browser. Darknet markets entice customers by making them feel comfortable. Although people can easily gain access to a Tor browser, actually gaining access to an illicit market is not as simple as typing it in on a search engine, as one would with Google. Darknet markets have special links that change frequently, ending in
.onion as opposed to the typical
.com, .net, and
.org domain extensions. To add to privacy, the most prevalent currencies on these markets are
Bitcoin and
Monero, which allows transactions to be anonymous. A problem that marketplace users sometimes face is
exit scamming. In cases of individual vendors, a vendor with a high rating acts as if they are selling on the market and has users pay for products they never receive. The vendor then closes their account after receiving money from multiple buyers and never sending what was paid for. Any vendor on a darknet market, all of which are involved in illegal activities, has no reason not to engage in exit scamming when they no longer want to be a vendor. In 2019, an entire market known as Wall Street Market allegedly exit scammed, stealing $30 million in bitcoin. The FBI has cracked down on these markets. In July 2017, the FBI seized one of the biggest markets, commonly called
Alphabay, which re-opened in August 2021 under the control of DeSnake, one of the original administrators. Investigators pose as buyers and order products from darknet vendors in the hope that the vendors leave a trail the investigators can follow. In one case an investigator posed as a firearms seller, and for six months people purchased from them and provided home addresses. The FBI was able to make over a dozen arrests during this six-month investigation. Another crackdown targeted vendors selling
fentanyl and
opiates. With thousands of people dying each year due to drug overdose, investigators have made internet drug sales a priority. Many vendors do not realize the extra criminal charges that go along with selling drugs online, such as money laundering and illegal use of the mail. In 2019, a vendor was sentenced to 10 years in prison after selling cocaine and methamphetamine under the name JetSetLife. But despite the large amount of time investigators spend tracking down people, in 2018 only 65 suspects who bought and sold illegal goods on some of the biggest markets were identified. Meanwhile, thousands of transactions take place daily on these markets. ==Notable incidents==