CSS Module 2
CSS Module 2
Challenges
August 3, 2025
Contents
1 How Criminals Plan the Attacks 4
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 Passive Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.4 Active Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.5 Relation Between the Three . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2 Social Engineering 5
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Common Social Engineering Techniques . . . . . . . . . . . . . . . . . . 5
2.3 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.4 Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3 Cyber Stalking 6
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.2 Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.3 Methods Used by Cyber Stalkers . . . . . . . . . . . . . . . . . . . . . . 6
3.4 Real-World Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.5 Legal Provisions in India . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.6 Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1
5 Botnets 8
5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
5.2 How Botnets Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
5.3 Uses of Botnets in Cybercrime . . . . . . . . . . . . . . . . . . . . . . . . 9
5.4 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
5.5 Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
5.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
6 Attack Vector 9
6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
6.2 Common Types of Attack Vectors . . . . . . . . . . . . . . . . . . . . . . 9
6.3 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
6.4 Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
6.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
10 Trends in Mobility 14
10.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
10.2 Key Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
10.3 Security Implications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
10.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
11 Vishing Attack 14
11.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
11.2 How It Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
11.3 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
11.4 Protection Against Vishing . . . . . . . . . . . . . . . . . . . . . . . . . . 15
11.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2
12.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
12.2 Common Types of Mobile Attacks . . . . . . . . . . . . . . . . . . . . . . 16
12.3 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
12.4 Prevention Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
12.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
17 Salami Attack 24
17.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
17.2 How It Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
17.3 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
17.4 Real-World Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
17.5 Prevention Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
17.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3
1 How Criminals Plan the Attacks
1.1 Introduction
Before launching a cyberattack, criminals rarely act randomly. They follow a planned
and structured approach to maximize success and avoid detection. The planning phase
often begins with information gathering (reconnaissance), followed by choosing the attack
type either passive (silent observation) or active (direct exploitation). Understanding
these stages helps cybersecurity professionals detect and prevent attacks early.
1.2 Reconnaissance
Definition: Initial stage where attackers collect as much information as possible about
the target.
Purpose: Identify potential weaknesses to exploit later.
Methods:
• Footprinting: Gathering publicly available data (domain names, IP addresses).
4
• Data modification: Changing sensitive files.
• Malware injection: Installing viruses, ransomware.
• Session hijacking: Taking over a live session.
Characteristics:
• Usually detected quickly because of visible system issues.
• Can cause financial, reputational, and operational loss.
1.6 Conclusion
Every major cyberattack usually starts with careful planning. Criminals first study the
target (reconnaissance), may then observe silently (passive attack), and finally strike
actively to achieve their goals. Awareness of these steps allows security teams to spot
threats early and take preventive action.
2 Social Engineering
2.1 Introduction
Social Engineering is a non-technical hacking technique that relies on manipulating hu-
man psychology rather than exploiting computer vulnerabilities. Attackers trick indi-
viduals into divulging confidential information or performing actions that compromise
security. It is often the first step before technical attacks.
2.3 Example
An attacker sends an email pretending to be from the bank, asking the victim to "verify
account details" by clicking a fake link. The victim unknowingly enters login credentials,
which go to the attacker.
5
2.4 Prevention
• Train employees on security awareness.
2.5 Conclusion
Social Engineering exploits trust and curiosity rather than technical flaws. Strong aware-
ness and verification habits are the best defense.
3 Cyber Stalking
3.1 Introduction
Cyber stalking is the use of the internet, email, social media, or other digital technologies
to harass, intimidate, or threaten an individual repeatedly. Unlike one-time harassment,
cyber stalking is persistent and intentional.
3.2 Characteristics
• Repeated unwanted contact (emails, messages, posts).
6
3.5 Legal Provisions in India
• Section 354D of IPC: Covers stalking (including cyber stalking).
• Sections 66A, 66E of ITA 2000: Punish sending offensive messages and privacy
violations.
3.6 Prevention
• Restrict privacy settings on social media.
• Block and report suspicious accounts.
• Keep digital evidence for legal action.
• Avoid sharing sensitive personal details online.
3.7 Conclusion
Cyber stalking is a serious digital harassment crime that can cause emotional, psycholog-
ical, and physical distress. Awareness, digital hygiene, and strong legal action are crucial
to prevent and combat it.
7
4.4 Legal Provisions
Indian IT (Guidelines for Cyber Café) Rules, 2011 under ITA 2000:
4.5 Prevention
• Use strong authentication before allowing access.
4.6 Conclusion
Cyber cafés can be breeding grounds for cybercrime if not properly monitored. Strict
implementation of IT rules and proper logging can help reduce misuse.
5 Botnets
5.1 Introduction
A botnet is a network of compromised computers (bots or zombies) controlled remotely
by a cybercriminal (called a botmaster) without the owners knowledge. Botnets are used
for large-scale cyberattacks.
• Control: The infected devices connect to the attackers Command and Control
(C&C) server.
8
5.3 Uses of Botnets in Cybercrime
• Distributed Denial of Service (DDoS): Overloading servers to crash websites.
5.4 Examples
• Mirai Botnet (2016): Infected IoT devices, causing massive internet outages.
5.5 Prevention
• Keep operating system and software updated.
5.6 Conclusion
Botnets are one of the most dangerous tools in cybercrime because of their scale, automa-
tion, and anonymity. Preventing infections and monitoring network activity are essential
to stop botnet attacks.
6 Attack Vector
6.1 Introduction
An attack vector is the path or method used by a cybercriminal to gain unauthorized
access to a system or network. It represents how an attack is delivered and is a critical
concept in understanding and preventing cybercrimes.
9
• Password attacks: Brute force, dictionary attacks, credential stuffing.
6.3 Example
A hacker sends a phishing email pretending to be from a bank. Victim clicks the link →
enters login info on a fake site → hacker gains access to the account.
6.4 Prevention
• Use multi-factor authentication (MFA).
6.5 Conclusion
Attack vectors are the entry doors for cybercriminals. Identifying and securing these
paths is the first step in preventing cyberattacks.
10
7.3 Examples
• Capital One breach (2019): Cloud misconfiguration led to theft of personal data
of 100M+ customers.
7.4 Prevention
• Strong authentication for cloud accounts (MFA).
7.5 Conclusion
Cloud computing has transformed IT, but its shared and online nature creates new op-
portunities for cybercrime. Organizations must adopt strong cloud security policies to
protect against these threats.
11
8.2 Key Differences
Aspect Cybercrimes Terrestrial Crimes
Location Committed in cyberspace, Require physical presence
can be done remotely from at the crime scene.
anywhere in the world.
Jurisdiction Crosses national and state Jurisdiction is usually clear
boundaries; difficult to de- within a physical location.
termine legal authority.
Speed of Crime Happens in seconds or min- Usually takes longer to plan
utes (e.g., hacking, data and execute.
theft).
Evidence Digital evidence logs, IP Physical evidence finger-
addresses, metadata; can be prints, CCTV footage, ob-
altered easily. jects.
Victim Aware- Victims may not know im- Victims usually notice the
ness mediately theyve been at- crime quickly (e.g., rob-
tacked. bery).
Scale of Impact Can affect millions instantly Usually affects a limited
(e.g., malware spreading area or number of people.
globally).
Cost to Commit Often low-cost (just a com- Often requires tools, vehi-
puter & internet connec- cles, manpower.
tion).
Anonymity Criminal can hide identity Harder to hide identity;
using VPNs, TOR, spoof- physical appearance or wit-
ing. nesses can expose them.
Law Enforce- Requires specialized cyber Investigated with tradi-
ment Challenges forensics and international tional policing methods.
cooperation.
8.3 Example
• Cybercrime: A hacker in another country steals banking credentials of thousands
of people via phishing in minutes.
• Terrestrial crime: A burglar breaks into a single house to steal valuables requires
physical entry and more time.
8.4 Conclusion
Cybercrimes are borderless, fast, and scalable, making them harder to detect and control
compared to most terrestrial crimes. Effective prevention requires advanced technology,
international cooperation, and strong cyber laws.
12
9 Proliferation of Mobile and Wireless Devices
9.1 Introduction
The proliferation of mobile and wireless devices refers to the rapid growth and widespread
adoption of smartphones, tablets, laptops, and other wireless-enabled devices globally.
Advancements in wireless technologies (Wi-Fi, 4G/5G, Bluetooth, NFC) and affordable
hardware have made mobile devices an essential part of daily life for both personal and
professional use.
9.3 Impact
Positive:
Negative:
9.5 Conclusion
While mobile and wireless devices have transformed modern life, they also expand op-
portunities for cybercriminals. Security awareness, encryption, and strong authentication
are essential for safe usage.
13
10 Trends in Mobility
10.1 Introduction
Trends in mobility describe how mobile technology usage, features, and applications are
evolving over time. Driven by innovations in wireless communication, hardware minia-
turization, and cloud computing, mobility trends impact both personal lifestyles and
enterprise strategies.
10.4 Conclusion
Mobility trends are moving towards greater integration, personalization, and connectiv-
ity. However, increased mobility also means increased responsibility to secure devices,
networks, and user data.
11 Vishing Attack
11.1 Introduction
Vishing (Voice Phishing) is a social engineering attack where criminals use phone calls or
VoIP (Voice over Internet Protocol) to trick people into revealing confidential information
such as banking details, passwords, or personal data. It combines voice communication
with phishing techniques.
14
11.2 How It Works
• Preparation: Attacker gathers basic information about the victim (name, phone
number, bank details) through data leaks, social media, or previous scams.
• Spoofing Caller ID: Attacker uses VoIP technology to make the call appear from
a legitimate source (e.g., bank, government agency).
11.3 Example
A scammer calls claiming to be from a banks fraud department, saying there was a
suspicious withdrawal. They ask the victim to confirm account details and OTP which
are then used to steal money.
• Verify the caller by calling the official number from the banks website.
• Register for DND (Do Not Disturb) services to reduce spam calls.
11.5 Conclusion
Vishing attacks exploit trust and urgency rather than technology flaws. Awareness, caller
verification, and refusal to share sensitive details over the phone are the best defenses.
15
12 Mobile/Cell Phone Attacks
12.1 Introduction
Mobile phones are no longer just communication devices; they store personal, financial,
and business data and are connected to the internet 24/7. Because of this, they have
become a prime target for cybercriminals. Mobile attacks exploit hardware, software, or
user behavior to steal data, commit fraud, or disrupt services.
16
12.3 Examples
• Pegasus Spyware Case: Used to monitor journalists and activists via mobile
phones.
• Bank OTP Fraud: Criminals swapping SIMs to steal OTPs for online banking.
12.5 Conclusion
Mobile/cell phone attacks target personal data, finances, and privacy. With growing mo-
bile usage, strong digital hygiene, secure configurations, and user awareness are essential
to protect against these threats.
• Secure Storage: Keep devices in locked drawers or cabinets when not in use.
17
13.3 Device & Data Protection
• Strong Passwords / Passcodes: Use complex, unique passwords.
• Antivirus & Anti-Malware: Use reliable security software with real-time pro-
tection.
• Disable Unused Services: Turn off Bluetooth, NFC, and file sharing when not
needed.
• Employee Training: Teach safe handling, phishing awareness, and reporting pro-
cedures.
13.7 Conclusion
Laptops and wireless devices require both physical and digital security measures. A
combination of strong authentication, encryption, regular updates, and user awareness
ensures safety against theft, hacking, and data breaches.
18
14 Security Challenges Posed by Mobile Devices
14.1 Introduction
Mobile devices such as smartphones, tablets, and laptops are powerful computing tools
that store sensitive personal, financial, and organizational data. Their portability, con-
stant internet connectivity, and diverse applications make them a primary target for
cybercriminals. Security challenges arise from technical vulnerabilities, user behavior,
and network exposure.
19
7. Bluetooth and NFC Exploits
14.3 Conclusion
Mobile devices face multi-layered security challenges from theft and malware to network
and cloud risks. A combination of technical controls (encryption, updates, antivirus) and
user awareness is essential to safeguard against these threats.
20
• Attacker intercepts payment details during online purchases.
• Fraudsters copy card data using skimmers attached to ATMs or POS machines.
• Data is later used for mobile-based transactions.
6. Data Breaches
• Fake SMS links leading to phishing sites tricking users into revealing OTPs.
For Organizations:
15.5 Conclusion
In the mobile and wireless computing era, credit card fraud has become faster, harder
to trace, and more sophisticated. Strong digital hygiene, secure payment practices, and
user awareness are the best defenses against these crimes.
21
16 Steps Involved in Planning of Cyberattacks by
Criminals
16.1 Introduction
Cyberattacks are rarely random events most are well-planned operations designed to
steal data, disrupt systems, or cause financial loss. Criminals follow a systematic, step-
by-step approach to maximize the chances of success while minimizing the risk of being
caught. Understanding these steps helps in predicting, detecting, and preventing such
attacks.
2. Target Selection
3. Vulnerability Assessment
22
– Phishing / Spear-phishing.
– Malware / Ransomware.
– SQL Injection.
– Man-in-the-Middle over public Wi-Fi.
• Example: Attacker selects phishing emails with malicious links.
5. Exploitation
7. Covering Tracks
23
16.3 Example Flow
Imagine a phishing attack on a bank employee:
• Finds staff email format & old breach data (Vulnerability Assessment).
16.4 Conclusion
Cyberattacks are methodical and organized. From reconnaissance to monetization, each
step is designed to maximize gain and minimize detection. By understanding this cycle,
security teams can intervene early and break the chain before serious damage occurs.
17 Salami Attack
17.1 Introduction
A Salami Attack is a type of cybercrime or financial fraud in which criminals make many
small, often unnoticeable changes or steal small amounts of money/data over time. The
changes are so minor that they go undetected individually, but together they result in
significant loss. The term comes from the idea of slicing a salami into thin, unnoticed
pieces.
• Accumulation: The criminal collects the small amounts over many transactions.
24
17.3 Example
In a bank system, interest on savings accounts is calculated monthly. Attacker manipu-
lates the program to truncate fractions of a cent and deposit them into their own account.
Each transaction loss is negligible, but across millions of accounts, it becomes a large sum.
17.6 Conclusion
Salami attacks are dangerous because they avoid detection by being small and gradual.
Strong auditing, monitoring, and transaction verification are essential to prevent such
frauds.
• Online Defamation
25
– Example: Creating fake social media accounts to spread lies.
– Using spyware, GPS tracking, or hacking accounts to follow the victims activ-
ities.
– Example: Installing a keylogger on the victims laptop.
• Doxxing
• Spoofing: Sending messages appearing to come from someone the victim trusts.
26
18.6 Conclusion
Cyberstalking and harassment are serious online crimes that can cause psychological,
social, and financial harm to victims. Awareness, digital security practices, and timely
legal action are essential to protect individuals from such threats.
27