SlideShare a Scribd company logo
1 of 22
CYBERCRIME
Covid - 19
Whoami?
❖ Kharim Mchatta
❖ CEO of HACK IT CONSULTANCY
❖ Cybersecurity professional (Pen tester & Digital Forensics expert)
❖ Founder of H4K-IT (Cybersec community inTZ)
❖ CTF player
❖ Blogger
❖ Author at eForensics and Pentets Magazine
❖ DW Swahili Subject matter expert (cybersecurity)
Before Diving in today's topic,we need to understand the
following terminologies
1.What is cybersecurity?
2.What is cybercrime?
What is cybersecurity?
Hacker
Virus/worms
PC Database Applications
Anti-virus
Firewall
Organization
Security
Thief
PROTECTING
From unauthorized access
From Malicious program
From unauthorized access
What is cybercrime?
These are crimes that involve
Networks Computers
Hacking
What crimes are these?
Phishing Ransomware Viruses Website Spoofing Online Fraud
PII –Theft (e.g National ID, Passport number,bank account number etc)
Cybercrime in Covid 19
In December 2019WHO reported the first outbreak of Covid 19
China
On 30th Jan 2020, the virus was announced as a global pandemic and part of counter measures
On stopping the virus lockdown started worldwide.
Cybercrime in Covid 19
Due to the pandemic, there was a huge change in the way the world operated, and this was due
to the lock down and social distancing.This led to
1. Companies introducing remote working (work from home)
2. E learning
3. People working from home
This led to various implication’s and some of them being
➢ A huge increase of number of internet users
➢ A huge increase in cybercrime
Cybercrime Trends in Covid 19 Era
During lockdown online activities have tremendously increased where people engage in different
Activities like
❖ Online shopping
❖ Streaming (movies, gaming etc)
❖ Chatting on social media
❖ Online meetings (zoom, skype etc)
❖ Online conference’s
❖ Remote working
❖ E-schooling
and many other more which has led to an increase of attack surface and vulnerabilities
Interpol have reported that in a period of 4 months (Jan to April 2020) there had been
➢ 907,000 spam messages (737 incidents related to malware and 48,000 malicious URLs )
and all were related to COVID 19
Cybercrime Trends in Covid 19 Era
Companies are rapidly deploying remote systems so that they can assist their employees in working
from home and criminals are taking advantage of this.
Interpol Secretary General Mr Jurgen Stock said
“Cybercriminals are developing and boosting their attacks at an alarming pace, exploiting
the fear and uncertainty caused by the unstable social and economic situation created by COVID-19.”
Cybercrimes accelerated by COVID 19
PHISHING andVHISHING
This attack vector makes use of a technique called social engineering where the attacker tries to
manipulate human emotions like
1. Empathy
2. Sense of urgency
3. Sense importance
4. Excitement
5. Economical problems
Phishing - Is a technique used by attackers where they try to get sensitive information like a user login
Credentials by sending emails pretending to be a trusted party or individual.
Cybercrimes accelerated by COVID 19
Cybercrimes accelerated by COVID 19
PHISHING Cont …….
Hacker Internet Employee MaliciousWebsite
Credentials sent to
Inserts Credentials
Malicious Email
Gains access to Gets Redirected to
Vhishing - this is a voice elicitation technique used by attackers where they try to get sensitive
information like a user login credentials using the phone.
Cybercrimes accelerated by COVID 19
Cybercrimes accelerated by COVID 19
Cybercrimes accelerated by COVID 19
Malicious programs
Ransomware - Is a malicious program that infects your systems and lock all documents in the system
and requests for payment in order to unlock them.
In 2021 a rough estimation of 1097 organizations were hit by ransomware attack and an estimation
Recovery cost from a ransomware attack is $1.85 million
Online Harassment - Is whereby an individual sends threatening messages, offensive name calling
Purposeful embarrassment, stalking or cyberbullying
Online Harassment
Due to the increase of online users the number of harassment has also increased drastically, online
harassment can be found in
➢ Social Media
➢ Comments of a website
➢ Online gaming
➢ Personal email
➢ Discussion site
➢ Dating site or app
Online Scam/Fraud
Online Scam/Fraud - Is whereby an attacker tries to get information or steal money from a victim
This can be either be done through
❖ Phone
❖ Email
❖ SMS
Cyberstalking
Cyberstalking - Is the use of the internet to stalk or harass an individual group of people or organization.
This may include
❖ False accusations
❖ Monitoring
❖ Threats
❖ Identity theft
Cybercrimes accelerated by COVID 19
❖ Trust but verify
❖ Report offensive posts
❖ Don’t be part of the bullies game
❖ Always browse on website that have https
❖ Don’t click on links Don’t open pop ups
❖ Use anti spam software
❖ Awareness training
❖ Keep your browser up to date
❖ Run anti virus scan before downloading any program
❖ Don’t re-use passwords
❖ Read privacy policy
❖ Turn on browser pop up blocker
❖ Keep your system up to date (patch)
Counter Measure
THAT’S ALL FOLKS
Author:Kharim Mchatta
Contacts
Kharimhmchatta@gmail.com
+255 735 212 145
kharim.h mchatta
KMchatta

More Related Content

Similar to Cybercrime's accelerated by covid 19 | 2021

Similar to Cybercrime's accelerated by covid 19 | 2021 (20)

Cyber security
Cyber securityCyber security
Cyber security
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
cybercreme.pptx
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
 
CYBER2000.pptx
CYBER2000.pptxCYBER2000.pptx
CYBER2000.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Cyber crime (mis305)
Cyber crime (mis305)Cyber crime (mis305)
Cyber crime (mis305)
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

More from KharimMchatta

Cyber threat in Africa | 2023
Cyber threat in Africa | 2023Cyber threat in Africa | 2023
Cyber threat in Africa | 2023KharimMchatta
 
Threat Modelling | 2023
Threat Modelling | 2023Threat Modelling | 2023
Threat Modelling | 2023KharimMchatta
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023KharimMchatta
 
Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021KharimMchatta
 
Web app security essentials | 2022
Web app security essentials | 2022Web app security essentials | 2022
Web app security essentials | 2022KharimMchatta
 
Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023KharimMchatta
 
Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022KharimMchatta
 
Commonwealth of Learning cybersecurity training for teachers | 2022
Commonwealth of Learning  cybersecurity training for teachers | 2022Commonwealth of Learning  cybersecurity training for teachers | 2022
Commonwealth of Learning cybersecurity training for teachers | 2022KharimMchatta
 
Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022KharimMchatta
 
Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022KharimMchatta
 
Application penetration testing | 2021
Application penetration testing | 2021Application penetration testing | 2021
Application penetration testing | 2021KharimMchatta
 
Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021KharimMchatta
 
Threat Modelling in Penetration Testing | 2021
Threat Modelling in Penetration Testing  | 2021Threat Modelling in Penetration Testing  | 2021
Threat Modelling in Penetration Testing | 2021KharimMchatta
 
Careers in cybersecurity | 2021
Careers in cybersecurity | 2021Careers in cybersecurity | 2021
Careers in cybersecurity | 2021KharimMchatta
 

More from KharimMchatta (14)

Cyber threat in Africa | 2023
Cyber threat in Africa | 2023Cyber threat in Africa | 2023
Cyber threat in Africa | 2023
 
Threat Modelling | 2023
Threat Modelling | 2023Threat Modelling | 2023
Threat Modelling | 2023
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023
 
Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021Cybersecurity for Beginners | 2021
Cybersecurity for Beginners | 2021
 
Web app security essentials | 2022
Web app security essentials | 2022Web app security essentials | 2022
Web app security essentials | 2022
 
Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023
 
Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022Cybersecurity in the blue economy | 2022
Cybersecurity in the blue economy | 2022
 
Commonwealth of Learning cybersecurity training for teachers | 2022
Commonwealth of Learning  cybersecurity training for teachers | 2022Commonwealth of Learning  cybersecurity training for teachers | 2022
Commonwealth of Learning cybersecurity training for teachers | 2022
 
Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022Landing a job in cybersecurity | 2022
Landing a job in cybersecurity | 2022
 
Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022Cybersecurity and Digital Forensics | 2022
Cybersecurity and Digital Forensics | 2022
 
Application penetration testing | 2021
Application penetration testing | 2021Application penetration testing | 2021
Application penetration testing | 2021
 
Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021Enhancing Cyber threat hunting for your team | 2021
Enhancing Cyber threat hunting for your team | 2021
 
Threat Modelling in Penetration Testing | 2021
Threat Modelling in Penetration Testing  | 2021Threat Modelling in Penetration Testing  | 2021
Threat Modelling in Penetration Testing | 2021
 
Careers in cybersecurity | 2021
Careers in cybersecurity | 2021Careers in cybersecurity | 2021
Careers in cybersecurity | 2021
 

Recently uploaded

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Cybercrime's accelerated by covid 19 | 2021

  • 2. Whoami? ❖ Kharim Mchatta ❖ CEO of HACK IT CONSULTANCY ❖ Cybersecurity professional (Pen tester & Digital Forensics expert) ❖ Founder of H4K-IT (Cybersec community inTZ) ❖ CTF player ❖ Blogger ❖ Author at eForensics and Pentets Magazine ❖ DW Swahili Subject matter expert (cybersecurity)
  • 3. Before Diving in today's topic,we need to understand the following terminologies 1.What is cybersecurity? 2.What is cybercrime?
  • 4. What is cybersecurity? Hacker Virus/worms PC Database Applications Anti-virus Firewall Organization Security Thief PROTECTING From unauthorized access From Malicious program From unauthorized access
  • 5. What is cybercrime? These are crimes that involve Networks Computers Hacking What crimes are these? Phishing Ransomware Viruses Website Spoofing Online Fraud PII –Theft (e.g National ID, Passport number,bank account number etc)
  • 6. Cybercrime in Covid 19 In December 2019WHO reported the first outbreak of Covid 19 China On 30th Jan 2020, the virus was announced as a global pandemic and part of counter measures On stopping the virus lockdown started worldwide.
  • 7. Cybercrime in Covid 19 Due to the pandemic, there was a huge change in the way the world operated, and this was due to the lock down and social distancing.This led to 1. Companies introducing remote working (work from home) 2. E learning 3. People working from home This led to various implication’s and some of them being ➢ A huge increase of number of internet users ➢ A huge increase in cybercrime
  • 8. Cybercrime Trends in Covid 19 Era During lockdown online activities have tremendously increased where people engage in different Activities like ❖ Online shopping ❖ Streaming (movies, gaming etc) ❖ Chatting on social media ❖ Online meetings (zoom, skype etc) ❖ Online conference’s ❖ Remote working ❖ E-schooling and many other more which has led to an increase of attack surface and vulnerabilities Interpol have reported that in a period of 4 months (Jan to April 2020) there had been ➢ 907,000 spam messages (737 incidents related to malware and 48,000 malicious URLs ) and all were related to COVID 19
  • 9. Cybercrime Trends in Covid 19 Era Companies are rapidly deploying remote systems so that they can assist their employees in working from home and criminals are taking advantage of this. Interpol Secretary General Mr Jurgen Stock said “Cybercriminals are developing and boosting their attacks at an alarming pace, exploiting the fear and uncertainty caused by the unstable social and economic situation created by COVID-19.”
  • 10.
  • 11. Cybercrimes accelerated by COVID 19 PHISHING andVHISHING This attack vector makes use of a technique called social engineering where the attacker tries to manipulate human emotions like 1. Empathy 2. Sense of urgency 3. Sense importance 4. Excitement 5. Economical problems Phishing - Is a technique used by attackers where they try to get sensitive information like a user login Credentials by sending emails pretending to be a trusted party or individual.
  • 13. Cybercrimes accelerated by COVID 19 PHISHING Cont ……. Hacker Internet Employee MaliciousWebsite Credentials sent to Inserts Credentials Malicious Email Gains access to Gets Redirected to
  • 14.
  • 15.
  • 16. Vhishing - this is a voice elicitation technique used by attackers where they try to get sensitive information like a user login credentials using the phone. Cybercrimes accelerated by COVID 19
  • 18. Cybercrimes accelerated by COVID 19 Malicious programs Ransomware - Is a malicious program that infects your systems and lock all documents in the system and requests for payment in order to unlock them. In 2021 a rough estimation of 1097 organizations were hit by ransomware attack and an estimation Recovery cost from a ransomware attack is $1.85 million Online Harassment - Is whereby an individual sends threatening messages, offensive name calling Purposeful embarrassment, stalking or cyberbullying Online Harassment Due to the increase of online users the number of harassment has also increased drastically, online harassment can be found in ➢ Social Media ➢ Comments of a website ➢ Online gaming ➢ Personal email ➢ Discussion site ➢ Dating site or app
  • 19. Online Scam/Fraud Online Scam/Fraud - Is whereby an attacker tries to get information or steal money from a victim This can be either be done through ❖ Phone ❖ Email ❖ SMS Cyberstalking Cyberstalking - Is the use of the internet to stalk or harass an individual group of people or organization. This may include ❖ False accusations ❖ Monitoring ❖ Threats ❖ Identity theft Cybercrimes accelerated by COVID 19
  • 20. ❖ Trust but verify ❖ Report offensive posts ❖ Don’t be part of the bullies game ❖ Always browse on website that have https ❖ Don’t click on links Don’t open pop ups ❖ Use anti spam software ❖ Awareness training ❖ Keep your browser up to date ❖ Run anti virus scan before downloading any program ❖ Don’t re-use passwords ❖ Read privacy policy ❖ Turn on browser pop up blocker ❖ Keep your system up to date (patch) Counter Measure