MOST CREEPY CYBER CRIMES:
I am write this article for your educational purpose only. I HOPE YOU LIKE THIS ARTICLE AND YOU SHARE THIS ARTICLE TO KNOW HOW THE HACKERS. DO BAD KIND OF WORK AGAINST THE WHOLE WORLD. YOU WATCH THIS AND COMMENT ME IF YOU WANT ADDITIONAL THINGS IN IT.
HERE FIRST WE STARTED FROM INFORMATION ABOUT CYBER CRIMES.
Computer as a tool. … Crimes that use computer networks or devices to advance other ends include. Fraud and identity theft (although this increasingly uses malware. Hacking and/or phishing, making it an example of both “computer as target” and “computer as tool” crime) Information warfare.
IT WAS MOST SERIOUS CRIME AS THE HACKER DO FOR THEIR WORK EITHER GOOD OR BAD.
The most nefarious and crafty criminals are the ones who operate completely under the radar. In the computing world security breaches happen all the time. And in the best cases the offenders. Get tracked down by the FBI. Or some other law enforcement agency.
But it’s the ones who go uncaught and unidentified (those who we didn’t highlight in our Cyber Crime Hall Fame that are actually the best. Attempting to cover your tracks is Law-Breaking 101; being able to effectively do so, that’s another story altogether.
When a major cyber crime remains unsolved, though, it probably also means that those of us outside the world of tech crime solving may never even know the crime occurred.
YOU GET MORE INFORMATION ON http://WWW.GOOGLE.COM
1) Ministry of Defense Satellite Hacked (February 1999):(CYBER CRIMES)
A small group of hackers traced to southern England gained control of a MoD Skynet military satellite and signaled a security intrusion characterized by officials as “information warfare,” in which an enemy attacks by disrupting military communications. In the end, the hackers managed to reprogram. The control system before being discovered. Though Scotland Yard’s Computer Crimes Unit and the U.S. Air Force worked together to investigate the case, no arrests have been made.
Before going through the details of this act as the nature of hacking, Its obvious that when someone access to your personal information or special programs in the computer. Its unauthorized act and punishment will be the least thing that would make the owner of that program or computer. Feel fair because of many reasons. And most important reason is the damages that would happen. In the changes that had been made because of that hacking.
YOU MAY ALSO LIKE:
2)Military Source Code Stolen (December 2000):(CYBER CRIMES)
If there’s one thing you don’t want in the wrong hands, it’s the source code that can control missile-guidance systems. In winter of 2000, a hacker broke into government-contracted Exigent Software Technology and nabbed two-thirds of the code for Exigent’s OS/COMET software, which is responsible for both missile and satellite guidance, from the Naval Research Lab in Washington, D.C. Officials were able to follow the trail of the intruder “Leaf” to the University of Kaiserslautern in Germany, but that’s where the trail appears to end.
Defense contractor Exigent International Inc. last week disclosed that an unknown number of hackers broke into a U.S. Navy computer system and made off with source code that controls dozens of military and commercial satellite systems.
The Melbourne, Fla.-based company said in a statement issued Friday that the incident, which occurred Dec. 24, may have compromised a small portion of an older version of its OS/COMET software. That was stored on a computer. At the Naval Research Laboratory in Washington. OS/COMET is commercial software that allows ground station operators to monitor satellite systems and communicate commands to those systems.
3)The 26,000 Site Hack Attack (Winter 2008):(CYBER CRIMES)
Websense has been tracking the exploit since February and discovered the MSNBC intrusion in one of their standard Web scans, says Stephan Chenette, manager of Websense Security Labs. Other major sites affected include TV.com, News.com and History.com.
“I’m labeling this attack as a search engine input optimization attack.”
He says use of search engine optimization techniques by these Web sites makes them vulnerable to and eventually victims of an input validation attack.
4) The WANK Worm (October 1989):(CYBER CRIMES)
Possibly the first “hacktivist” (hacking activist) attack, the WANK worm hit NASA offices in Greenbelt, Maryland. WANK (Worms Against Nuclear Killers) ran a banner (pictured) across system computers as part of a protest to stop the launch of the plutonium-fueled, Jupiter-bound Galileo probe. Cleaning up after the crack has been said to have cost NASA up to a half of a million dollars in time and resources. To this day, no one is quite sure where the attack originated, though many fingers have pointed to Melbourne, Australia-based hackers.
It is also important to understand that someone in the future could launch. This worm on any DECnet based network. Many copies of the virus have been mailed around. Anyone running a DECnet network should be warned.
R. Kevin Oberman from Lawrence Livermore National Labs reports: “This is a mean bug to kill and could have done a lot of damage. Since it notifies (by mail) someone of each successful penetration and leaves a trapdoor (the FIELD account), just killing the bug is not adequate. You must go in an make sure all accounts have passwords and that the passwords are not the same as the account name.”
The CERT/CC also suggests checking every .com file on the system. The worm appends code to .com files which will reopen a security hole everytime the program is executed.
5) CD Universe Credit Card Breach (January 2000):(CYBER CRIMES)
A blackmail scheme gone wrong, the posting of over 300,000 credit card numbers by hacker Maxim on a Web site entitled “The Maxus Credit Card Pipeline” has remained unsolved since early 2000. Maxim stole the credit card information by breaching CDUniverse.com; he or she then demanded $100,000 from the Web site in exchange for destroying the data. While Maxim is believed to be from Eastern Europe, the case remains as of yet unsolved.
Though the FBI indicates the theft and subsequent extortion attempt remain under investigation, a source familiar with the case said the failure to preserve the electronic evidence had virtually eliminated the possibility of a prosecution.
“The chain of custody was not established properly,” said the source, who spoke on condition of anonymity.
A second source, also speaking on condition of anonymity, confirmed the account.
“This is a case that is not going to get solved,” said the second source. “It’s like the O.J. Simpson case, the evidence is tainted. Even if you find whomever, how do you prosecute it?”
“Chain of custody” refers to the process by which computer forensics specialists preserve the crime scene – i.e., the computer logs on hard drive of the network server – so that an intruder’s actions can be traced. Each step in the process must be carefully documented so that, if the case gets to court, prosecutors can show that the electronic records were not altered as the investigation progressed.