Cyber Crime

Pick a news article about a cybercrime event (easily found on the internet) and create a summary that addresses each of the following:

What happened (e.g., case details)
What type of cybercrime was it (cyberbullying, hacking, phishing, etc.)?
How could it have been prevented, handled better, or at least mitigated?
What criminological theory, in your opinion, could help explain this cyber behavior (and why)?

Full Answer Section

     

Type of Cybercrime:

This cybercrime involved a combination of techniques:

  • Supply Chain Attack: Hackers targeted a trusted vendor (SolarWinds) to gain access to a large number of downstream targets.
  • Malware: The malicious code inserted into the software update functioned as malware, enabling remote access for the attackers.

Prevention, Mitigation, and Handling:

Several measures could have potentially prevented or mitigated this attack:

  • Software Vendor Security: More rigorous security practices by SolarWinds, including code audits and vulnerability testing, could have identified the malicious code before distribution.
  • Multi-Factor Authentication (MFA): Implementing MFA would have added an extra layer of security, making it harder for attackers to access compromised systems even with stolen credentials.
  • Improved Detection and Response: Organizations using SolarWinds software could have benefited from more robust security monitoring systems to detect the suspicious activity sooner.

Possible Criminological Theory:

This cybercrime can be explained by Rational Choice Theory. This theory suggests that criminals weigh the potential risks and rewards before committing a crime. In this case, the attackers likely saw a significant potential reward (access to sensitive data from numerous high-profile targets) with a relatively low perceived risk (targeting a software vendor seemed less conspicuous than directly attacking individual organizations). Additionally, the attackers likely possessed advanced technical skills, increasing their confidence in their ability to evade detection.

This is just one possible theory, and other criminological theories like Social Disorganization Theory (lack of social control) or Techniques of Neutralization (justifying criminal acts) could also be explored to understand the motivations behind such complex cybercrimes.

 

Sample Answer

     

Cybercrime Summary: SolarWinds Supply Chain Attack (2020)

What Happened:

In late 2020, a sophisticated cyberattack infiltrated the systems of SolarWinds, a software company that provides network management tools to a vast number of organizations, including government agencies and Fortune 500 companies. Hackers inserted malicious code into a legitimate SolarWinds software update, allowing them to gain access to the systems of numerous downstream users once the update was installed. The attackers remained undetected for months, potentially exfiltrating sensitive data and disrupting critical operations.