This article has been written by Yatharth Chauhan pursuing the Diploma in Cyber Law, FinTech Regulations and Technology Contracts from LawSikho. This article has been edited by Smriti Katiyar (Associate, Lawsikho).
Table of Contents
Introduction
With advancement in technology, comes increased human dependence on technology. The internet has provided man with quick access to anything from a single location. It is used in practically every aspect of life. As the internet and its associated advantages have gained currency, so did cybercrime. Millions of users’ personal details have been stolen as a result of cybercrime in recent years, posing a serious hazard to web users. Cybercriminals are very adept and difficult to locate on the public and dark web as well. There is no specific definition of “cybercrime” in any legislation or guideline. The term “cyber” refers to computers, information technology, the internet, basically the digital world and all aspects of it. Cybercrime is a crime that requires the application of a computer, mobile or any other gadget. Computer crime is another term for cybercrime. Computer could be used either as an object to attack another device such as Hacking, SQL Injection, Distributed Denial-of-service attack, etc. or as a tool to further real-world-based crime such as infringement of Intellectual Property Rights, Child pornography, financial frauds, etc. Cybercrime can be perpetrated by individuals or organizations with modest technical understanding, as well as highly organized global criminal networks which include competent coders.
Cybercrime investigation is tracking down the perpetrators of the digital crime and learning about their true objectives by investigating, assessing, and retrieving important forensic digital evidence from the attacked network, which might be the Internet or a local area network. Computer science specialists that are conversant with not just software, file systems, and operating systems, but also networks and hardware, are required for cybercrime investigations. They must be competent to figure out how these components interact in order to acquire a complete view of what happened, why it occurred, when it occurred, who committed it, and how people can safeguard themselves from future cyber attacks.
Categories of cybercrime
Individual, property, and government are the three major categories in which cybercrime may be classified.
- Property– This is analogous to an actual scenario in which a criminal gains unauthorised access to a person’s bank or credit card information. The hacker takes the user’s bank account information in order to obtain access to cash, make online transactions, or launch phishing schemes to trick individuals into giving over their confidential information. They might even employ malicious programs to get access to a website containing sensitive data. There are several offences that have an impact on a person’s property such as cyber squatting, cyber vandalism, disseminating virus, infringement of Intellectual Property Rights, etc.
- Government- Cyber terrorism is a crime committed against the government. It includes cyber warfare, cyber terrorism, pirated software, etc.
- Individual- This kind of cybercrime targets and impacts individuals. This includes cyber-stalking, cracking, defamation, e-mail and SMS spoofing, child pornography, hacking, etc.
Methods for investigating cybercrime
The majority of digital crimes are amenable to several standard investigating approaches. Some of these are as follows:
- Assessing the background- When dealing with cybercrime complaints, creating and establishing the crime’s backdrop using known facts can assist investigators establish a basic framework for determining what they’re up against and how much data they have.
- Getting Information as much as possible- Obtaining information as much as possible about the event is one of the crucial tasks on the part of the cybersecurity investigator. Was it a computer-assisted assault or a human-targeted assault? What is the extent and magnitude of the problem? What kind of cybercrime was perpetrated? What proof is there, and where can it be discovered?
Ethical hackers use a variety of methods and technologies to gather vital information that can be used to set the foundation for further investigation. . The following are some of the most popular strategies for acquiring information:
- Social Engineering: This refers to taking advantage of human weaknesses so as to obtain permission to the confidential information and network. The inherent absence of a cybersecurity environment contributes to social engineering assaults being one of the deadliest forms of cybercrimes. Major social Engineering includes phishing, whaling, vishing, Baiting, spear phishing, pretexting, etc. Hackers commonly use phishing emails and other identical strategies to target businesses, therefore, staff must be reinforced. Employees can access the system and networks of the company, and therefore they play a significant role in guaranteeing the company’s strength in the face of attacks. When it comes to cybersecurity, the company’s security management is heavily influenced by working culture. To develop a cybersecurity environment in the organization, it takes more than setting boundaries with no rationale and reminding employees to change their passwords regularly. Employees do not endanger the company intentionally. They require directions and instructions in order to prevent exposing their employer to cyber threats. That is why businesses must endeavour to improve their data security. This entails addressing and raising awareness among employees about cyberattacks and their repercussions and developing and implementing strong cybersecurity rules that are simple to integrate into their everyday work routines.
- Social Networking– when approaching specific people, Twitter, LinkedIn, and other social media sites are valuable platforms to get information for constructing a profile.
- Names of the Domain– These are basically enrolled by Institutions, governments, public and commercial entities, as well as individuals. Domain names can be used to find confidential information, connected domains, services, and innovations.
- Search Engines- Web Crawlers may be used to gather data on any subject. For cybersecurity experts, Google Dorking, often known as Google hacking, is a great tool. Google is a search engine used by the common person to locate information, photos, movies, etc. In the field of information security, however, Google is a powerful hacking device. Although Google cannot actively hack websites, it does have web-crawling skills. Google Dorking is a technique of leveraging Google’s inherent search engine abilities to locate insecure web applications. Cache, Allintext, Allintitle, Allinurl, Inurl,Intitle, etc. are the well known dorks.
- Locating the Author– To locate the perpetrators behind the cyber assault, private and public organisations collaborate with ISPs and networking firms to obtain vital log data about their linkages, as well as historical service and websites accessed during the period they were linked.
- Digital Forensic- It entails examining the primary data, hard discs, file systems, caching systems, RAM memory, and other sources. The investigator, when a forensic examination commences, will search for fingerprints in file system, network, emails, internet history, and other areas.
Forensic tools for cybercrime investigation
Based on the methods you’re employing and the stage you’re at, cybercrime investigation tools might offer a wide range of features. Some of the major forensic tools are as follows:
- SIFT Workstation- SIFT is a suite of forensic tools designed to assist emergency teams and forensic investigators in analysing digital forensic material across many platforms. FAT 12/16/32, NTFS, HFS+, EXT2/3/4, UFS1/2v, vmdk, swap, RAM dta, and RAW data are among the file systems it handles.
- Sleuth Kit- The Sleuth Kit is a set of forensic tools for Unix and Windows that aids investigators in examining disk images and retrieving files from them.
- X-ways forensics- For Windows-oriented operating systems, it is one of the most comprehensive forensic tools available. It’s convenient and allows you to operate it on a memory card and transfer it effortlessly across computers.
- CAINE- It is a whole Linux distro for digital forensic investigation, not only a cybercrime investigation programme. It can retrieve information from a multitude of operating systems, including Linux, Unix, and Windows.
- ProDiscover Forensic- It is equipped to undertake any forensic investigation. It assists researchers in swiftly locating files, gathering, processing, preserving, and scrutinizing data, as well as generating the statement of evidence.
- Oxygen Forensic Detective- It is one of the greatest multi-platform forensic tools for cybersecurity experts and forensic specialists to access all important information in one location. One can swiftly extract data from a variety of smartphones, drones, and computer operating systems using Oxygen Forensic Detective.
- Bulk Extractor-It is a popular tool for obtaining the vital data from digital evidence. It is not only used to retrieve the information, but also to analyse and gather it. One of its biggest features is that it works flawlessly with practically every OS platform, like Linux, Unix, Mac, and Windows.
- Exif– It can read, write, and alter metadata from a wide range of media assets, such as images and movies. It permits you to save the findings in text or simple Html form.
- Surface Browser– It is the ideal tool for discovering a firm’s whole online infrastructure and extracting useful intelligence information from DNS records, domains, information, and much more.
Conclusion
Cybercriminals have gained control over the network in the present technological world. The majority of users are totally unconcerned about the possibility of being attacked, and they seldom change their passwords. As a result, a large number of individuals are vulnerable to cybercrime, thus it is critical to educate oneself. In today’s environment, we must be alert and vigilant since victimhood does not come with a warning.
Cybercrime investigation is a difficult science to master. To enter the cybercrime scene efficiently and profitably, you’ll need the correct information paired with a variety of approaches and instruments. After you’ve gathered all of this information, you’ll be able to correctly examine the information, research the underlying reason, and discover the perpetrators of various sorts of cybercrime. Therefore, we must ensure that our systems are as safe as possible.
References
- https://securitytrails.com/blog/cyber-crime-investigation
- https://www.infosecawareness.in/cyber-laws-of-india
- https://www.pandasecurity.com/en/mediacenter/panda-security/types-of-cybercrime/
- https://cybersecurityguide.org/careers/cyber-crime-investigator/
- https://www.business-standard.com/article/technology/the-face-of-indian-cyber-law-in-2013-113123000441_1.html.
Students of Lawsikho courses regularly produce writing assignments and work on practical exercises as a part of their coursework and develop themselves in real-life practical skills.
LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:https://t.me/joinchat/J_0YrBa4IBSHdpuTfQO_sA
Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.