0% found this document useful (0 votes)
29 views2 pages

Request

The document discusses several types of cybercrimes including credential theft, phishing, malware, remote access trojans (RATs), browser hijackers, and info stealers. Credential theft involves stealing identity proof to gain account access. Phishing deceives victims into sharing passwords and credit card numbers. Malware disrupts systems or leaks private data. RATs allow covert surveillance and unauthorized access. Hijackers modify browser settings without consent. Info stealers gather data like credentials to send to attackers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views2 pages

Request

The document discusses several types of cybercrimes including credential theft, phishing, malware, remote access trojans (RATs), browser hijackers, and info stealers. Credential theft involves stealing identity proof to gain account access. Phishing deceives victims into sharing passwords and credit card numbers. Malware disrupts systems or leaks private data. RATs allow covert surveillance and unauthorized access. Hijackers modify browser settings without consent. Info stealers gather data like credentials to send to attackers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Credential theft

Credential theft is a type of cybercrime that involves stealing a victim's proof of identity. Once
credential theft has been successful, the attacker will have the same account privileges as the
victim. Stealing credentials is the first stage in a credential-based attack.
https://youtu.be/Ak0D6QHAEZU

PHISING
What is phishing? What is phishing? Phishing is the crime of deceiving people into sharing
sensitive information like passwords and credit card numbers. As with real fishing, there's more
than one way to reel in a victim, but one phishing tactic is the most common.
https://youtu.be/Y7zNlEMDmI4

MALEWARE
Malware (a portmanteau for malicious software) is any software intentionally designed to cause
disruption to a computer, server, client, or computer network, leak private information, gain
unauthorized access to information or systems, deprive users access to information or which
unknowingly interferes with the user's computer security and privacy
https://youtu.be/n8mbzU0X2nQ

RAT
Remote Access Trojans are programs that provide the capability to allow covert surveillance or
the ability to gain unauthorized access to a victim PC. Remote Access Trojans often mimic similar
behaviors of keylogger applications by allowing the automated collection of keystrokes,
usernames, passwords, screenshots, browser history, emails, chat lots, etc. Remote Access
Trojans differ from keyloggers in that they provide the capability for an attacker to gain
unauthorized remote access to the victim machine via specially configured communication
protocols which are set up upon initial infection of the victim computer. This backdoor into the
victim machine can allow an attacker unfettered access, including the ability to monitor user
behavior, change computer settings, browse and copy files, utilize the bandwidth (Internet
connection) for possible criminal activity, access connected systems, and more.
https://youtu.be/ib8Phu54VYc
Browser hijacker
Browser hijackers, or simply hijackers, are a type of malware created for the purpose of
modifying Internet browser settings without the user’s knowledge or consent. Typically,
hijackers change the homepage and default search settings. However, some are known to inject
advertisements—thus, they are qualified to be called adware, automatically redirecting users to
potentially malicious destinations when they visit certain sites, and sometimes making drastic
changes to the affected system. Some hijackers also contain keyloggers, which are capable of
recording user keystrokes to gather potentially valuable information they enter into websites,
such as account credentials.
https://youtu.be/mFQesz7wNns

Info stealers
The term info stealer is self-explanatory. This type of malware resides in an infected computer
and gathers data in order to send it to the attacker. Typical targets are credentials used in online
banking services, social media sites, emails, or FTP accounts.
https://youtu.be/EpBc707aans

You might also like