Posts

Cybersecurity search engines

Image
CyberSecurity search engines: 1. Dehashed—View leaked credentials. 2. SecurityTrails—Extensive DNS data. 3. DorkSearch—Really fast Google dorking. 4. ExploitDB—Archive of various exploits. 5. ZoomEye—Gather information about targets. 6. Pulsedive—Search for threat intelligence. 7. GrayHatWarefare—Search public S3 buckets. 8. PolySwarm—Scan files and URLs for threats. 9. Fofa—Search for various threat intelligence. 10. LeakIX—Search publicly indexed information. 11. DNSDumpster—Search for DNS records quickly. 12. ONYPHE—Collects cyber-threat intelligence data. 13. FullHunt—Search and discovery attack surfaces. 14. AlienVault—Extensive threat intelligence feed. 15. Grep App—Search across a half million git repos. 16. URL Scan—Free service to scan and analyse websites. 17. Vulners—Search vulnerabilities in a large database. 18. WayBackMachine—View content from deleted websites. 19. Wigle—Database of wireless networks, with statistics. 20. Netlas—Search and monitor internet connected asset

When can Police Arrest you in Cyber crime: Explanation with Case Laws

Image
Arrest by Police in cyber crime cases By Adv (Dr.) Prashant Mali Cyber crime is a reality but personal liberty is a fundamental human right and a cornerstone of the social structure.  Arrest brings humiliation, curtails freedom and cast scars forever. Its deprivation is a matter of grave concern.  The law of arrest is one of balancing individual rights, liberties and privileges,on the one hand, and individual duties, obligations and responsibilities on the other. The police officer can , without an order/warrant from a Magistrate, arrest a person in respect of a cognizable offence punishable with imprisonment exceeding 7 years without mentioning any ' special reasons '. The problem arises when it comes to arrest of a person who is accused of an offence which is punishable up to 7 years. The Hon’ble Apex Court in Arnesh Kumar v. State of Bihar, (2014) 8 SCC 273 held; Our endeavour in this judgment is to ensure that the police officers do not arrest the accused unnecessarily and

Cybercrime - Ransomeware as a Service

Image
The cybercriminal economy is a continuously evolving connected ecosystem of many players with different techniques, goals, and skillsets. Ransomware as a service (RaaS) is a subscription-based model that enables affiliates to use already-developed ransomware tools to execute ransomware attacks. Affiliates earn a percentage of each successful ransom payment. Ransomware as a Service (RaaS) is an adoption of the Software as a Service (SaaS) business model.  RaaS users don't need to be skilled or even experienced, to proficiently use the tool. RaaS solutions, therefore, empower even the most novel hackers to execute highly sophisticated  cyberattacks .  RaaS solutions pay their affiliates very high dividends. The  average ransom demand increased  by 33% since Q3 2019 to $111,605, with  some affiliates earning up to 80%  of each ransom payment. The low technical barrier of entry, and prodigious affiliate earning potential, makes RaaS solutions specifically engineered for victim prolifer

Best Cyber and Privacy Lawyer 2022 awarded to Adv Prashant Mali

Image
Prashant Mali receiving award from Actor Makrand Deshpande  Advocate Prashant Mali Got Best Cyber and Privacy lawyer of the year by the hands of Makrand Deshpande , other awardees include Mumbai Mayor Kishori Pednekar, ex Mumbai Police Commissioner Hemant Nagrale , VC of University of Mumbai, Hon. Sharad Pawar  n others . Lop Devendra Phadnavis and MP Sanjay Raut were chief guests  Earlier Lt. Balasaheb Thakre and Lt. Lata Mangeshkar we’re also recipients of the same award.  #award #cybercrime #privacy #lawyer #law #follow #media #mumbai #cybersecurity #publicpolicy #IamChevening #IVLP #media #news

How A Student Hacked Teachers WhatsApp

Image
How A Student Hacked into Teachers WHATSAPP Account? A teacher from Kerala noticed that her WhatsApp account was logged out soon after an online class. Knowing this, she lodged a complaint with cyberpolice. Police cracked the case and found out that the culprit was her student, studying in high school, who logged into the teacher’s account. The technique used by the student was simple. The teacher was using a screen-share app in her phone during the class . So the students were able to see the screen and also the pop-up notification alerts coming into the phone. The ‘culprit’ student then tried to login WhatsApp with teacher’s number in his phone. And the OTP for verification came as pop-up alert in the teacher’s phone which was visible for all the students. Thus the student easily logged in to the account. The teacher did not have two-step verification on the phone and did not have a password. The account in teacher’s phone got logged out as WhatsApp does not allow simultaneous use on

Why Cybercrime is increased ? Due to Low Cost I feel

Image
  Why Cybercrime is increased ? Due to Low Cost I feel You can buy ransomware for  as little as $66 , or hire a threat actor for $250. And if you look hard enough, you can even get a phishing kit for free on underground forums. Although these illicit methods may not be expensive, the damage they inflict can be substantial. Phishing has become more popular than ever. Bhagwat Karad, the minister of state for finance reported to Indian parliament, that more than 50,000 (50,242) cases of cyber frauds, banking frauds using internet banking, ATM-Debit and Credit Cards were registered in the first nine months of the current fiscal year, citing RBI data (April-December 2021 period). During the nine-month period, the victims of these frauds lost a total of nearly Rs 167 crore. According to the FBI’s Internet Crime Complaint Center, the number of  phishing complaints more than doubled in 2020  to 241,342 cases compared to the prior year. From there, attacks doubled again as phishing reached a mo

The criminal use of cryptocurrency

Image
The criminal use of cryptocurrencies Cryptocurrencies have been adopted as part of money laundering schemes and are particularly associated with several predicate offences including fraud and drug trafficking. They are also widely used as a means of payment for illegal goods and services offered online and offline. Money laundering is the main criminal activity associated with the illicit use of cryptocurrencies. The growing popularity and adoption of cryptocurrencies have led to their increasing use in money laundering schemes. Other criminal activities that show an intensive use of cryptocurrencies are related to the use of cryptocurrencies as a payment method for illicit goods and services, fraudulent cryptocurrency investments and cybercrime. In all instances, criminals want to obfuscate the source of the illicit assets with cryptocurrencies. A number of indicators show how criminals involved in frauds strongly rely on the use of cryptocurrencies. Cryptocurrencies are also the mean