April 28, 2025

Case study of the famous WannaCry Ransomware

About WannaCry:- WannaCry attack is one of the remarkable strike in the history of the cybercrime that shook the digital world to the core. It was the major security incident that affected the organisations all over the globe. When happened:- On the May 12, 2017, the outbreak of this ransomware worms take hold of more…

Read more

POSTED BY

shripali

April 28, 2025

The SONY.SAMBANDH.com scam: Nation’s first ever cyber convicted case

When it took place? This case took place about a decade ago, back in 2013. It was the time when India faced its first ever cyber conviction. Case filed by:- It all begins when Sony India filed a complaint against Arif Azim. Arif was a resident of Noida, U.P. Company’s Profile:- Sony.Sambandh was a newly…

Read more

POSTED BY

shripali

April 25, 2025

The in-depth analysis of knocking down of Hive ransomware

When the news was broken The Justice Department revealed in January 2023 that it has carried out a months-long operation to disrupt the Hive ransomware group, which has attacked over 1,500 victims across more than 80 countries, including hospitals, school systems, financial institutions, and vital infrastructure. The initiation of the mission:- Since then, the FBI…

Read more

POSTED BY

shripali

April 12, 2025

Darkode:- The one stop shopping for cybercriminals

What is Darkode Popularly known as a one-stop, high-volume shopping destination for some of the most active cybercriminals worldwide. This underground, password-protected online forum, known as Darkode, served as a marketplace for people looking to purchase, sell, and trade malware, botnets, credit card information, personally identifiable information, hacked server credentials, and other software and data…

Read more

POSTED BY

shripali

April 12, 2025

Melissa Virus- A wake up call for public

How does it started A programmer by the name of David Lee Smith took over an America Online (AOL) account in late March 1999 and used it to upload a file with an adult domain to Internet newsgroup. Dozens of free passwords to adult-content websites that charge fees were promised in the post. A virus…

Read more

POSTED BY

shripali

April 11, 2025

The termination of botnet operation via discontinuation of Core-flood virus

Role of botnet:- Botnets are basically networks of virus-infected computers that an attacker can manage remotely. They can be used to steal money, take over identities, and perform other crimes. In this case, botnets are potent core-flood virus that allows cyber criminals to filch the valuable personal and financial information of users by recording the user’s unsuspecting every keystroke. When it came into limelight:- In an unprecedented action in the fight against cybercrime, the FBI halted an international cyberfraud…

Read more

POSTED BY

shripali

April 11, 2025

$10 Million Hack:- First robbery in the history of cyber crime

Introduction This case is the giant wheel in the history of cyber crime and a start of the bank robbery without involvement of internet. How does it started? A young computer programmer in St. Petersburg, Russia, headed a group of ambitious crooks from several continents who broke into the electronic systems of a large U.S.…

Read more

POSTED BY

shripali