Cyber-attacks detection and prevention
4. Manifestations of cybercrime
Cybercrime is typically manifested through cyberattacks, but purely non-technical aspects must be used to successfully carry out a number of attacks.
Certain illegal conduct in cyberspace or cybercrime-related conduct can be classified under the relevant provisions of the current Criminal Code, but there are certain types of conduct that may be significantly more complicated, or even impossible, to criminalise (in many cases it is rather immoral).
Very often cybercrime is considered a new type of crime. However, a significant part of cybercrime uses or transfers notorious types of illegal conduct (such as fraud, copyright infringement, theft, bullying, etc.) to the digital environment, where they can be committed “better, faster and more effectively” than in the real world. Among the purely cyberattacks, the following, for example, could be included hacking, DoS and DDoS attacks, botnets, etc.
It is characteristic of the virtual world that most users have an incomprehensible, almost limitless trust in it. At the same time, it must be stated that the virtual world is becoming more and more important for us. Personally, I feel that when using the services provided on the Internet, many people stop thinking about possible risks or threats. They are primarily captivated by the seemingly endless possibilities of “new technologies”; how else is it possible to explain the absence of basic defence principles and mechanisms in the virtual world, when in the real world we would behave completely differently. Sometimes, the behaviour of users in cyberspace remind me of the “Strange Case of Dr. Jekyll and Mr. Hyde” by Robert Louise Stevenson (1886). Seemingly decent people in the real world act without any legal or moral restraints in the “pseudo-anonymous” environment of cyberspace. So, for example, it is possible to come across a case of a judge downloading “child pornography”[1], users who have never stolen anything in the real world but have no problem stealing in the virtual world[2], or violating other rights protected by the law of a country.
A number of leading experts have commented on the predictions of the development of cybercrime in the past, of which I would like to quote Schneier in particular, who predicted in 2002 that the next major security trend on the Internet would be crime. “Not cases of viruses, Trojans and DDoS attacks for fun or the opportunity to show off your skills. It will be a real crime. On the Internet. Criminals tend to lag behind technology development by five or ten years, but eventually realise their potential. Just as Willie Sutton began robbing banks “because there was money,” so modern criminals will begin to attack via computer networks. More and more values (funds) are online than in real money.”[3]
In 2007, the FBI introduced statistics that compared a common “bank robbery” with conduct that is a phishing attack.[4]
Parameter |
Average armed robbery |
Average cyberattack |
Risk |
The offender risks being injured or killed. |
No risk of physical harm |
Profit |
On average, USD 3–5 thousand. |
On average, USD 50–500 thousand. |
Probability of catching |
50–60% of attackers caught. |
About 10% of attackers caught. |
Probability of conviction |
95% of caught attackers convicted. |
Of the caught attackers, only 15% of the attackers will go to trial and only 50% will be convicted. |
Punishment |
On average 5–6 years, if the offender did not injure anyone during the robbery. |
On average 2–4 years. |
In 2012, in relation to information and communication technologies, Goodman stated that “an individual's ability to influence masses, due to these technologies, is growing exponentially. It is growing exponentially for both good and bad purposes". He clearly presents this growth in the development of the crime of robbery, for which a knife or pistol was originally enough in the past, and robbery essentially meant an act between individuals or small groups. "A major 'innovation' took place at the time of a robbery of an entire train carrying 200 people.” The Internet allows for an even greater scale of an attack by one person. The robbery of a large number of users is clearly demonstrated by the case of the Sony Playstation with approximately 100 million injured people."When in the history of mankind could an individual rob 100 million people? But it's not just about thefts…"[5]
In the same year, Robert S. Mueller, FBI Director, gave a speech in the RSA Cyber Security Conference (San Francisco, CA), where he stated, inter alia: “I believe there are only two types of companies: those that have been hacked and those that will be hacked. And even they are converging into one category: companies that have been hacked and will be hacked again.”[6]
Currently, there is an increasing and massive interconnection of various computer systems into cyberspace, which practically generates a direct relationship consisting of the following statement: "the more devices connected, the greater their vulnerability and the greater the number of attacks." One of the graphical representations of the ongoing attacks can be found at: http://map.norsecorp.com/#/; https://cybermap.kaspersky.com/; https://map.lookingglasscyber.com/ etc.
We believe that there is no doubt that cybercrime is on the rise, and it is a global problem. Various statistics show partially different damages caused by cybercrime, but this does not change the fact that they all include primary damages (e.g. malfunction of a computer system, its parts, services offered, infrastructure failure, etc.) and secondary damage (e.g. system recovery, data recovery, reconnection of end users, etc.). Europol reports in its 2014 report[7] that cybercrime costs the global economy around USD 300 billion a year. The community of attackers has changed considerably since the mass expansion of the Internet. Primarily, it means that there are no longer individuals who have committed offences for fun or circumventing barriers. At present, these are usually professionals who do their job in order to profit and are often involved in organised groups.
This shift is understandable and inextricably linked to three aspects:
1) Dependence of the society on the Internet (or offered services, technologies, etc.),
2) Cybercrime has become a lucrative global business [the first cyber attacks have already shown the potential for profit, either directly (by drawing funds) or indirectly (e.g. by paying for damage to another person's service)].
3) Minimum literacy of users who use information and communication technologies (the user is a typical example of the weakest link in the chain).
With the development of all kinds of services based on the principle of as-a-service[8], a number of platforms (typically underground, darknet forums) have emerged in the cybercrime environment, where services are offered that can be described as crime-as-a-service (cybercrime- as-a-service). Thus, a “malware or underground economy” emerges that provides almost any user with the means to commit cybercrime. The following services are offered as standard within the service collectively referred to as crime-as-a-service:
- Research-as-a-service,[9]
- Crimeware-as-a-service,[10]
- Infrastructure-as-a-service,[11]
- Hacking-as-a-service,[12]
- Data-as-a-service,[13]
- Spam-as-a-service,[14]
- Ransomware-as-a-service etc.
The list of individual services is not exhaustive, and it can be stated that crime-as-a-service includes the possibility to order any conceivable service or commodity that can be used or obtained in cyberspace. The rise of these negative activities is directly linked to the phenomenon of the Internet of Things (IoT), which connects devices (computer systems) with the Internet, and thus poses another significant threat, which lies primarily in disregarding one of the basic principles of security.
Many manufacturers or distributors of computer systems that can be classified as IoT do not address the issue of security (their goal being to bring to market and sell as many devices that can be described as a computer system as possible), which attackers use.
The costs associated with security developments are usually the most costly part of development, but this is an area that needs to be addressed in view of the threats already known. These include, for example: an unsecured communication channel of a pacemaker[15]; a remote- controlled car or aircraft[16]; smart household or its components (refrigerator, boiler, security system, television, etc.), which can be controlled remotely[17], etc.
“How will the world turn out when we are already using 6.4 billion IoT devices this year? Over the next four years, it should be 20.8 billion devices. In addition, many of these devices will have a significantly longer lifespan than the normal life cycle of mobile phones, tablets or laptops. How will a car manufacturer be able to protect the security of the 2020 model ten years later? Or a refrigerator that can stand at your home for fifteen years or more? How long did it take Microsoft to learn how to update its own operating system?”[18]
Schneier states that when it comes to data, attackers can do essentially three basic things with them: steal them (violating the principle of Confidentiality), alter them (violating the principle of Integrity) or prevent owners from accessing them (violating the principle of Availability). Schneier states that with the advent of IoT, the last two types of attacks will become extremely effective.[19]
In the following section, I will introduce some of the attacks that occur in the cyberspace environment. It is not possible to define all attacks, either because of the scope of this publication or because of the impossibility of describing all possible alternative acts subsumable under the term cybercrime. If possible, the specific criminal law qualification of such conduct will be stated for a specific manifestation of cybercrime.
[1]Judge, 69, who downloaded child porn facing 'catastrophic humiliation'. [online]. [cit.1.9.2009]. Availablefrom: http://news.sciencemag.org/social-sciences/2015/02/facebook-will-soon-be-able-id-you-any-photo
[2] HILL, Kashmir. These two Diablo III players stole virtual armor and gold — and got prosecuted IRL. [online]. [cit.10.8.2015]. Available from:
[3]For more details see SCHNEIER, Bruce. Crime: The Internet's Next Big Thing. [online]. [cit.6.11.2007]. Available from: https://www.schneier.com/crypto-gram/archives/2002/1215.html
[4] JIROVSKÝ, Václav. Kybernetická kriminalita nejen o hackingu, crackingu, virech a trojských koních bez tajemství.Prague: Grada, 2007, p. 30
[5] For more details see GOODMAN, Marc. A vision of crimes in the future.[online]. [cit.13.11.2014]. Availablefrom: https://www.ted.com/talks/marc_goodman_a_vision_of_crimes_in_the_future#t-456071
[6] MUELLER, Robert. [online]. [cit.3.4.2013]. Availablefrom:
[7] See The Internet Organised Crime Threat Assessment (iOCTA) 2014. [online]. [cit.10.8.2015]. Available from: https://www.europol.europa.eu/content/internet-organised-crime-threat-assesment-iocta
[8]It is the provision of services typically associated with a cloud solution. Examples are: infrastructure-as-a-service; platform-as-a-service; Service-as-a-service; Security-as-a-service etc.
[9] Under this service, it is possible to imagine activities that consist in detecting various, as yet unknown vulnerabilities of the target computer system or software. (These vulnerabilities are known as zero-day vulnerabilities.)
The actual activity within research-as-a-service does not necessarily have to be in its nature a criminal or illegal act. Vulnerability and error detection is performed by a number of IT security experts (e.g. penetration testing, etc.). Typically, these services are provided on the basis of contractual terms between the testee and the tester, or using some of the circumstances precluding illegality.
[10] The crimeware-as-a-service offers a wide range of activities from the simple sale of malware, through its “customisation”, as well as the delivery of exploits (vulnerabilities), etc.
[11] Infrastructure-as-a-service then offers the offer of physical or virtual computer systems (botnets, hosting services, network leases, etc.).
[12] This service can include a simple breaking of access data to e-mail, social network account, etc., up to professional and sophisticated attacks on a selected victim. This area can then include, for example, the execution of DoS and DDoS attacks.
[13] The data-as-a-service offers the most sought-after commodity, which is data. Specifically, these are, for example: access data (name and password) to various accounts, credit cards, bank accounts, stolen credit cards, but also information about persons (residence, date of birth, telephone numbers, e-mails, etc.).
[14] The name implies that it is possible to order and pay for a spam campaign.
[15] Cf. TAYLOR, Harriet. How the “Internet of Things” could be fatal. [online]. [cit.17.6.2016]. Available from: http://www.cnbc.com/2016/03/04/how-the-internet-of-things-could-be-fatal.html
[16] For more details see REENBERG, Andy. Hackers remotely kill a Jeep on the highway – with me in it. [online]. [cit.4.5.2016]. Available from: https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
In the Czech version available, for example, from: http://auto.idnes.cz/hackeri-unesli-jeep-dalkove-ovladani-auta-f1l-/automoto.aspx?c=A150723_135910_automoto_fdv
For more details see ZETTER, Kim. Is It Possible for Passengers to Hack Commercial Aircraft? [online]. [cit.5.5.2016]. Available from: https://www.wired.com/2015/05/possible-passengers-hack-commercial-aircraft/
[17] It is thus possible, for example, to circumvent household security; increase the temperature with the remote-controlled thermostat and cause damage to another person; order a meaningless amount of food through a “smart” refrigerator, etc.
[18] DOČEKAL, Daniel. Bruce Schneier: Internet věcí přinese útoky, které si neumíme představit.[online]. [cit.10.8.2016]. Availablefrom: http://www.lupa.cz/clanky/bruce-schneier-internet-veci-prinese-utoky-ktere-si-neumime-predstavit/
[19] SCHNEIER, Bruce. The Internet of Things Will Turn Large-Scale Hacks into a Real World Disasters. [online]. [cit.10.8.2016]. Available from: https://motherboard.vice.com/read/the-internet-of-things-will-cause-the-first-ever-large-scale-internet-disaster