Cyber Investigation Guide

This is a simple guide about cyber investigation methods and their limits.

If you need any help you can contact me.

What is a cyber crime

The internet has been one of the most groundbreaking developments of the modern era, revolutionizing communication, business, and entertainment. However, as with any powerful tool, it has also given rise to its share of dangers. Just as we encounter criminals in the physical world, we also face malicious actors in the digital space. These cybercriminals engage in a variety of illicit activities, from hacking and fraud to identity theft and cyberbullying.

In this article, I will break down these activities into key categories and explore how cyber investigations are carried out to track, analyze, and combat cybercrime.

Types of cyber crimes

1. Hacking remains one of the most prevalent and damaging cybercrimes online. The primary motive behind hacking is usually financial gain. Cybercriminals target websites, networks, or systems to steal sensitive information, such as user credentials, personal details, or credit card information. Once obtained, this data can be sold on the dark web or used for identity theft and fraud. In cases where no valuable data is available, hackers might resort to redirecting compromised website visitors to malicious websites designed to steal money. These sites could trick users into providing personal information or even prompt them to download malware that can further exploit their devices.

Hackers can generally be categorized into two groups, which we'll refer to as Group A and Group B.

Group A hackers are typically highly skilled individuals or organized groups. These hackers are proficient at building their own tools and exploiting vulnerabilities. Due to their expertise, they often leave little to no trace of their activities, making it difficult to track them down. Many Group A hackers work with advanced tactics, using sophisticated techniques like zero-day exploits and encryption to hide their identity and actions. In some cases, Group A hackers may even be state-sponsored. For example, there have been numerous reports linking North Korean hacker groups, such as Lazarus, to state-sponsored cyber-espionage and financial theft. These groups often target not just individuals but entire industries, government organizations, or other nations.

Group B hackers are typically less skilled in programming and network manipulation. Rather than developing their own custom tools, these hackers rely on publicly available software or pre-existing hacking tools. As a result, they often leave identifiable traces of their activities, making it easier for law enforcement or cybersecurity experts to track them down. For Group B hackers, the motivation is usually more about thrill-seeking or ego rather than financial gain or political objectives. The victims of Group B hackers are typically everyday individuals rather than large corporations or state entities. These hackers often target personal websites, social media accounts, or gaming profiles.

2. Fraud and identity theft have become more common, especially with the rise of social media, where people freely share personal information. Fraudsters exploit this openness to gain financial profit. The shift from traditional shopping malls to online marketplaces has opened new doors for scammers. Sellers may offer goods or services without delivering them, while buyers may falsely claim package loss to receive a refund. These scams thrive in digital markets, where anonymity aids fraudsters.

Common identity theft methods include SIM swapping, where attackers take control of a victim's phone number, or fraudsters pretending to be you to gain access to your accounts or make unauthorized transactions. Stolen or leaked information, often obtained after data breaches, can include phone numbers, IDs, and other personal data can help fraudsters. Some details, like maiden names or addresses, can also be found online, making it easier for fraudsters to impersonate victims and commit crimes.

3. Cyber harassment or stalking is often overlooked and considered a low-risk crime by law enforcement. This offense is quite broad, encompassing behaviors such as sending unwanted emails, text messages, or communications via social media platforms and messaging apps like WhatsApp. these cases are often dismissed as "low priority" by the police, although responses may vary depending on the station.

The typical victims are often individuals with a significant online presence or those who frequently engage in online debates and attract attention. Additionally, it’s not uncommon for this type of harassment to occur in personal relationships, where partners may stalk one another. Also common for people with mental issues to fear of being stalked or hacked. People with mental health concerns may also experience heightened anxiety, fearing they are being stalked or hacked, even without concrete evidence.

In most cases, the likelihood of a person encountering a random stalker or harasser is quite low. Simply blocking and ignoring the individual is often the most effective course of action. Moving on without engaging can help minimize the impact of such harassment.