A cybercrime event

Pick a news article about a cybercrime event (easily found on the internet) and create a summary that addresses each of the following: What happened (e.g., case details) What type of cybercrime was it (cyberbullying, hacking, phishing, etc.)? How could it have been prevented, handled better, or at least mitigated? What criminological theory, in your opinion, could help explain this cyber behavior (and why)? This assignment should be at least 1.5 pages, double-spaced, and 12 pt Times New Roman Font. Be sure to include a reference page (APA format) to the end of your paper.  

Sample Solution

       

Cybercrime Summary: SolarWinds Supply Chain Attack (2020)

What Happened

In late 2020, a sophisticated cyberattack campaign compromised the SolarWinds Orion IT monitoring software. Hackers infiltrated SolarWinds' systems and injected malicious code into software updates distributed to thousands of customers worldwide. This code allowed the attackers remote access to the IT networks of these customers, including government agencies, critical infrastructure providers, and private companies. The attackers then spent months undetected, exfiltrating sensitive data and potentially disrupting critical operations.

The full scope of the attack is still being investigated, but it is considered one of the most significant cyber security breaches in history.

Type of Cybercrime

This cybercrime involved multiple elements:

  • Supply Chain Attack: Hackers infiltrated a trusted vendor (SolarWinds) to gain access to their customers' systems.
  • Malware: Malicious code was embedded in software updates, granting unauthorized access.
  • Espionage: The attackers' primary goal was likely to steal sensitive data.

Prevention, Improved Handling, and Mitigation

Several measures could have prevented or mitigated the damage from this attack:

  • Software Security: SolarWinds could have implemented stricter code signing practices and vulnerability scanning to detect the malicious code.
  • Multi-Factor Authentication: Customers could have used multi-factor authentication to make it more difficult for attackers to gain access to their systems, even with stolen credentials.
  • Network Segmentation: Segmenting networks can limit the damage caused by a breach by preventing attackers from easily moving laterally within a system.
  • Improved Detection and Response: Organizations should have robust security monitoring systems in place to detect suspicious activity and respond quickly to potential breaches.

While the attack couldn't have been entirely prevented, a more proactive security posture from both SolarWinds and its customers could have significantly reduced the impact.

Full Answer Section

       

Criminological Theory:

Several criminological theories could explain the cyber behavior behind the SolarWinds attack. Here, two prominent theories are explored:

  • Rational Choice Theory: This theory suggests that criminals weigh the risks and rewards of their actions before committing a crime. In the SolarWinds attack, the attackers likely saw a significant potential reward in the form of valuable data, weighed against the perceived low risk of detection. The complex nature of the attack suggests a high degree of planning and a calculated approach, aligning with rational choice principles.
  • Social Disorganization Theory: This theory posits that crime is more likely to occur in areas with weak social bonds and a lack of community cohesion. While not directly applicable to the cyber realm, it can be adapted to consider the online environment. In this case, the lack of robust cybersecurity measures and the reliance on a single vendor (SolarWinds) created a situation where a successful attack could have a widespread impact.

Both theories offer valuable insights into the motivations and opportunities that contribute to cybercrime. Understanding these factors is crucial for developing effective prevention strategies.

Reference

The New York Times. (2020, December 13). SolarWinds Hack: What We Know About the Cybersecurity Attack.

https://www.nytimes.com/2021/02/23/opinion/solarwinds-hack.html

IS IT YOUR FIRST TIME HERE? WELCOME

USE COUPON "11OFF" AND GET 11% OFF YOUR ORDERS