Module 2 Cybercrime
Module 2 Cybercrime
Cyber crime and Cyber law: Classification of cyber crimes, Common cyber crimes- cyber
crime targeting computers and mobiles, cyber crime against women and children,
financial frauds, social engineering attacks, malware and ransomware attacks, zero day
and zero click attacks, Cybercriminals modus-operandi, Reporting of cyber crimes,
Remedial and mitigation measures, Legal perspective of cyber crime, IT Act 2000 and
its amendments, Cyber crime and offences, Organizations dealing with Cybercrime and
Cyber security in India, Case studies.
MODULE-II: CYBERCRIME AND CYBER LAW
Cybercrimes have become an ever-present threat in our digital world. Criminals employ various
techniques to exploit vulnerabilities in computer systems, networks, and devices. Understanding
the classification of cybercrimes is vital for individuals and organizations to protect themselves
from potential threats. In this section, we will delve into the major categories of cybercrimes and
provide examples to illustrate their nature.
Types of Cybercrimes
1. Hacking
2. Phishing
Phishing is a deceptive technique where cybercriminals impersonate trusted entities, such as banks
or reputable organizations, to trick users into revealing sensitive information. An example of
phishing is when someone receives an email that appears to be from their bank, requesting account
details. In reality, it's a scam aimed at stealing personal information.
DoS and DDoS attacks are designed to overwhelm a system with excessive traffic, rendering it
inaccessible. These attacks disrupt websites, online services, or networks. A common example is a
flood of traffic targeting a website, causing it to crash, resulting in financial losses and
inconvenience.
4. Malware
Malware, short for malicious software, includes viruses, worms, Trojans, and other harmful
software designed to infiltrate and damage computer systems. An example of malware is a virus
that infects a computer, corrupting or deleting files.
5. Ransomware
Ransomware is a form of malware that encrypts a victim's data and demands a ransom for
decryption. For example, the infamous WannaCry ransomware encrypted files on infected
computers and demanded bitcoin payments for their release.
Classification of cyber crimes
Cybercrimes can be classified into various categories based on the nature of the offense and the
specific activities involved. Here is a classification of cybercrimes:
1. Cybercrimes Against Individuals:
Cyberbullying: Harassment or intimidation using electronic communication.
Online Harassment: Repeated online threats, abuse, or stalking.
Cyberstalking: Online pursuit or tracking of a person, causing fear or distress.
Online Defamation: Spreading false information about an individual online.
2.Financial Cybercrimes:
Phishing: Deceptive attempts to acquire sensitive information, such as login credentials or
financial details.
Credit Card Fraud: Unauthorized use of credit card information for financial gain.
Online Banking Fraud: Illegally accessing online bank accounts to siphon funds.
Investment Scams: Deceptive investment opportunities to defraud individuals.
Cybercrimes targeting computers and mobile devices encompass a wide range of illegal activities
aimed at compromising the security, privacy, or functionality of these devices. Here are some
common cybercrimes specific to computers and mobiles:
1. Malware Infections:
Viruses: Malicious software that attaches itself to legitimate programs and spreads when these
programs are executed.
Trojans: Deceptive software that appears harmless but carries hidden malicious functions.
Worms: Self replicating malware that spreads across networks and devices.
2. Ransomware Attacks:
Encryption Ransomware: Encrypts the victim's data and demands a ransom for decryption.
Screenlocking Ransomware: Locks the victim out of their device or computer until a ransom is
paid.
3. Phishing Attacks:
Spear Phishing: Customized phishing attacks targeting specific individuals or organizations.
Smishing: Phishing attacks conducted through SMS or text messages on mobile devices.
Credential Stuffing: Using stolen login credentials from one site to access accounts on other
websites where users have reused passwords.
5. Spyware and Adware:
Spyware: Malicious software that secretly monitors and records user activities, such as keystrokes
or browsing habits.
Adware: Software that displays unwanted advertisements and may collect user data
6. Mobile Device Theft or Loss:
Unauthorized Access to Stolen Devices: Criminals may attempt to access data on stolen mobile
devices.
Remote Data Wiping: In cases of device theft, users can remotely erase their data to prevent
unauthorized access.
9. SIM Card Cloning: Criminals may clone SIM cards to gain unauthorized access to a victim's
mobile phone account.
10. Mobile Banking and Payment App Fraud: Unauthorized access to mobile banking or
payment apps to conduct fraudulent transactions.
Cybercrimes targeting computers and mobile devices can lead to data breaches, financial losses,
privacy violations, and significant disruptions. To protect against these threats, it is essential to
implement strong security practices, use reputable security software, keep devices and software
updated, and be cautious of unsolicited messages and suspicious downloads. Additionally, mobile
device encryption, secure passwords, and twofactor authentication can help mitigate risks.
1. Cyber bullying and Online Harassment: Women may experience online harassment,
including abusive messages, threats, or the dissemination of private information or explicit
content without consent.
2. Doxxing: Doxxing involves the malicious sharing of personal information, such as email
address, often with the intent of harassment or harm.
4. Online Defamation: Spreading false and damaging information about women online can harm
their reputation and wellbeing.
5. Phishing and Identity Theft: Women may be targeted in phishing attacks aimed at stealing
personal information, including financial and identity data.
6. Online Grooming: Perpetrators, often pretending to be someone they are not, target
children or adolescents online for sexual exploitation.
2. Online Grooming: Perpetrators use the internet to build relationships with children and
prepare them for sexual exploitation.
3. Cyber bullying: Children may be subjected to online bullying, which can have severe
emotional and psychological effects.
4. Cyber stalking: Similar to adults, children may be cyber stalked, causing fear and distress.
Education: Teach children about online safety, responsible internet use, and the potential dangers
they may encounter.
Parental Controls: Use parental control software and tools to monitor and limit children's internet
activity.
Secure Online Behavior: Encourage safe online practices, including not sharing personal
information or engaging with strangers.
Legal Support: Seek legal assistance and report incidents of cybercrimes against women and
children to the relevant authorities for investigation and action.
Financial Frauds
Financial frauds are deceptive or dishonest activities that result in financial losses for individuals,
organizations, or governments. These frauds often involve manipulation, misrepresentation, or the
abuse of trust for personal gain. Here are some common types of financial frauds:
1. Identity Theft: Criminals steal personal information, such as Social Security numbers, bank
account details, or credit card information, to impersonate victims for financial gain.
2. Credit Card Fraud: Unauthorized use of stolen credit card information for making
fraudulent purchases or withdrawing cash.
3. Banking Fraud: A wide range of fraudulent activities related to banking, including check
fraud, account takeover, and unauthorized fund transfers.
4. Investment Scams: Scammers offer fraudulent investment opportunities that promise high
returns but divert funds for personal gain.
5. Ponzi Schemes: Fraudsters promise high returns to investors but use new investments to pay
returns to earlier investors, creating a cycle that eventually collapses.
6. Pyramid Schemes: Participants are encouraged to recruit new members, and their profits are
derived from the recruitment fees rather than the sale of actual products or services.
7. Insurance Fraud: Individuals or organizations submit false or inflated insurance claims to
obtain payouts they are not entitled to.
9. Tax Evasion: Illegally avoiding or underreporting income and assets to reduce tax liability.
11. Advance Fee Fraud:Scammers promise significant rewards or financial gains but require an
upfront fee to access the supposed opportunity, which often doesn't exist.
13. Counterfeit Currency:The creation or distribution of counterfeit money that can be used to
defraud individuals or businesses.
14. Online Auction and Sales Fraud:Deceptive practices in online marketplaces, such as
nondelivery of purchased goods or fraudulent listings.
15. Online Payment Fraud: Fraudulent use of online payment platforms, including
PayPal or cryptocurrency, to steal funds.
16. Charity Fraud: Scammers pose as charities to solicit donations for fake or unauthorized causes.
Financial frauds can lead to substantial economic losses, damage to individuals' or organizations'
reputations, and legal consequences for perpetrators. To protect against financial fraud,
individuals and organizations should employ security measures, conduct due diligence, and
remain vigilant in financial transactions. Reporting suspected fraud to law enforcement or
regulatory authorities is also crucial for preventing further victimization and apprehending
fraudsters.
Social Engineering Attacks
Social engineering attacks are manipulative techniques used by cybercriminals to exploit human
psychology and trick individuals into revealing sensitive information, performing specific actions,
or compromising their security. These attacks rely on psychological manipulation rather than
technical exploits. Common social engineering attacks include:
1. Phishing: Attackers send deceptive emails, messages, or websites that impersonate trusted
entities, such as banks or government agencies. They often ask recipients to provide personal
information, login credentials, or click on malicious links.
2. Spear Phishing: A targeted form of phishing that tailors messages to specific
individuals or organizations, making them more convincing and harder to detect.
6. Baiting: Cybercriminals offer something enticing, such as free software or media downloads,
to lure victims into downloading malware or providing sensitive information.
7. Tailgating: The attacker physically follows a legitimate employee into a secure area,
taking advantage of the employee's trust and access privileges.
8. Quid Pro Quo: Attackers promise a service or benefit in exchange for sensitive
information, like offering technical support or free software installation in return for login
credentials.
10. Impersonation: Attackers pose as someone else, whether in person, through emails, or on
social media, to deceive individuals into taking certain actions.
11. Reverse Social Engineering: Attackers manipulate their target into thinking they need
assistance, prompting the target to initiate contact and unwittingly revealing sensitive
information.
12. Human Hacking: Attackers observe and exploit human behavior, such as eavesdropping
on conversations, dumpster diving for discarded sensitive documents, or taking advantage of
human errors.
13. Elicitation: Attackers gather information by engaging in seemingly innocent conversations to
piece together sensitive data.
Social engineering attacks often rely on exploiting trust, fear, curiosity, or the desire to help others.
Mitigating these attacks requires:
Awareness and Education: Training individuals to recognize and respond to social engineering
attempts is critical.
Data Protection: Limit the amount of personal or sensitive information available online or in public
spaces.
Vigilance: Be cautious and skeptical of unsolicited communications, especially when they request
sensitive information or actions.
By understanding the techniques used in social engineering attacks and maintaining a security
conscious mindset, individuals and organizations can better protect themselves from these deceptive
tactics.
Malware And Ransomware Attacks
Malware and ransomware attacks are two prevalent forms of cyber threats that can cause significant
harm to individuals and organizations. Here's an overview of these attacks:
Malware Attacks: Malware, short for "malicious software," is a broad category of software designed
to damage, disrupt, or gain unauthorized access to computer systems and networks. Different types
of malware include:
1. Viruses: These malicious programs attach themselves to legitimate files and replicate
when the infected file is executed. Viruses can damage data and systems.
2. Trojans: Named after the Trojan Horse, these deceptive programs appear harmless but
contain hidden malicious code. Trojans often provide unauthorized access to cybercriminals.
3. Worms: Worms are selfreplicating malware that can spread quickly across networks and
devices, often causing system slowdowns or outages.
4. Spyware: Spyware secretly monitors and collects information about a user's activities and
transmits it to a third party. It can be used for tracking, identity theft, or advertising purposes.
5. Adware: Adware displays unwanted advertisements, often in a way that disrupts the user's
browsing experience. Some adware can also collect and transmit user data.
6. Rootkits: Rootkits are designed to hide malicious processes and activities on a system.
They are often difficult to detect and remove.
Ransomware Attacks: Ransomware is a specific type of malware that encrypts a victim's data and
demands a ransom for the decryption key. Ransomware attacks typically follow these steps:
2. Encryption: Once on a victim's system, the ransomware encrypts files, making them
inaccessible to the victim.
3. Ransom Demand: The attacker presents a ransom demand, typically in cryptocurrency, in
exchange for the decryption key.
4. Payment: If the victim pays the ransom, the attacker may provide the decryption key.
However, there's no guarantee the attacker will uphold their end of the deal.
5. Impact: Ransomware attacks can lead to data loss, business disruption, and significant
financial costs.
Protecting against malware and ransomware attacks involves the following measures:
1. Security Software: Install and regularly update reputable antivirus and antimalware
software to detect and remove malware.
3. Email and Web Filters: Use email and web filtering tools to block malicious content and
phishing attempts.
4. User Education: Train users to recognize and avoid suspicious emails, downloads, and links.
5. Data Backups: Regularly back up critical data to offline or cloud storage to ensure data
recovery in case of ransomware attacks.
6. Access Control: Limit user privileges to prevent unauthorized access and execution of
malicious software.
7. Cyber Hygiene: Follow good cybersecurity practices, such as using strong passwords,
implementing multifactor authentication, and securing WiFi networks.
8. Incident Response Plan: Develop a clear incident response plan to minimize the impact of an
attack and ensure a swift recovery.
Both malware and ransomware attacks underscore the importance of proactive cybersecurity
measures, as well as regular data backups and employee training to mitigate the risks associated
with these threats.
1. Definition: Zeroday attacks target vulnerabilities in software or hardware that are unknown to
the vendor or the public, meaning there are "zero days" of protection available.
2. Exploitation: Cybercriminals discover these vulnerabilities and develop exploit code that can
take advantage of them. They use these exploits to gain unauthorized access to systems, install
malware, steal data, or conduct other malicious activities.
3. Significance: Zeroday vulnerabilities are highly valuable in the cybercriminal world because
they can be exploited before developers have a chance to create patches or security updates to
address the issue.
4. Targets: Zeroday attacks can target various software, including operating systems, web
browsers, email clients, and even mobile applications.
5. Mitigation: To mitigate zeroday threats, organizations should regularly update and patch their
software and employ advanced security measures like intrusion detection systems and behavioral
analysis tools to detect unusual or suspicious activities.
ZeroClick Attacks:
1. Definition: Zeroclick attacks are a subcategory of zeroday attacks in which no user interaction
is required for the exploit to work. In other words, the attack takes place without the victim clicking
on a link, downloading a file, or performing any other action.
2. Exploitation: Zeroclick exploits often involve the delivery of malware through methods like
malicious text messages (SMS), emails, or other means that can activate the exploit upon receipt.
The victim doesn't need to open the message or click on any links for the attack to occur.
3. Targets: Zeroclick attacks can target various devices and applications, including smartphones,
laptops, and software with known or unknown vulnerabilities.
4. Significance: Zeroclick attacks are particularly dangerous because they can compromise a device
or system without any user interaction or awareness, making them challenging to defend against.
To protect against both zeroday and zeroclick attacks, individuals and organizations should stay
vigilant, keep software up to date, and employ advanced cybersecurity tools and practices.
Additionally, working with cybersecurity experts to monitor and assess the evolving threat
landscape is crucial in identifying and mitigating these advanced threats.
Cybercriminals' Modus Operandi
Understanding how cybercriminals operate is crucial in the fight against cybercrimes. In this
section, we will explore the tactics and strategies employed by cybercriminals to carry out
their illicit activities. Recognizing this modus operandi can help individuals and
organizations enhance their cybersecurity defence.
1. Identity Concealment
Cybercriminals often go to great lengths to conceal their identities. They use techniques such
as masking their IP addresses, creating fake online personas, and operating on the dark web.
By staying anonymous, they can avoid detection and accountability.
Example: A hacker uses a virtual private network (VPN) to hide their true location and
identity while conducting cyberattacks.
2. Data Theft
Data theft is a common objective of cybercriminals. They aim to steal sensitive information,
such as personal data, financial records, and trade secrets. Once they have this data, they can
use it for illegal purposes, including identity theft or extortion.
3. Money Extortion
Many cybercriminals are motivated by financial gain. They employ tactics like ransomware
attacks, where they encrypt a victim's data and demand a ransom for its release. Extortion
can be highly profitable for cybercriminals and often leads to victims paying to regain access
to their data.
Example: A victim's computer is infected with ransomware, and the attacker demands a
Bitcoin ransom in exchange for the decryption key.
Cybercriminals often monetize stolen data by selling it on the black market. This
underground economy deals in a variety of illicit goods, including stolen credit card
information, login credentials, and personal details. The buyers may use this information for
various criminal activities.
Example: A cybercriminal sells a database of stolen credit card numbers to other criminals
on the dark web.
Reporting of Cybercrimes
In the face of an ever-evolving digital threat landscape, reporting cybercrimes is crucial for
individuals and organizations. This section highlights the significance of reporting
cybercrimes, the steps involved, and the role of various authorities in responding to these
incidents.
1. Timely Action: Reporting allows for swift action to mitigate damage and prevent further
attacks.
2. Data Protection: Reporting helps safeguard personal and sensitive data, preventing it
from falling into the wrong hands.
3. Justice and Accountability: Reporting ensures that perpetrators are held accountable
for their actions and face legal consequences.
1. Document the Incident: Record all relevant details about the incident, including the
nature of the attack, any suspicious emails or messages, and any financial transactions.
2. Contact Local Law Enforcement: Reach out to your local police or cybercrime unit to
report the incident. They may assist in the investigation or direct you to the appropriate
authorities.
3. Inform Online Service Providers: If the incident occurred on a specific online platform,
contact the service provider (e.g., social media sites, email providers) and report the issue.
They may be able to take action against the perpetrator.
4. Report to CERT-In: In India, the Computer Emergency Response Team (CERT-In) plays
a crucial role in responding to and mitigating cybersecurity incidents. They can be
contacted to report cybercrimes, especially those with a national impact.
5. Preserve Evidence: Maintain copies of any evidence related to the cybercrime, such as
emails, messages, or files. This evidence can be essential for the investigation.
6. Anonymous Reporting: For individuals who are concerned about their privacy or safety,
many countries, including India, offer ways to report cybercrimes anonymously. This
option allows individuals to share vital information without revealing their identity.
In the battle against cybercrimes, it's crucial to not only understand the threats but also to
be well-prepared with remedial and mitigation measures. This section outlines practical
steps individuals and organizations can take to protect themselves from cyberattacks and
minimize potential damage.
Utilizing reliable antivirus software is the first line of defense against various cyber threats,
including viruses, malware, and ransomware. Regularly update this software to ensure it can
detect the latest threats.
Example: Installing antivirus software on your computer and keeping it up to date can
prevent malware from infiltrating your system.
Creating strong, unique passwords for different online accounts can significantly enhance
security. Passwords should combine upper and lower-case letters, numbers, and special
characters, making them harder for attackers to guess.
Example: Instead of using "password123" as a password, opt for a complex combination like
"P@ssw0rd$ecur3."
Frequent data backups ensure that even if you fall victim to a cyberattack, you won't lose
critical information. Back up your data to external drives or secure cloud storage.
Example: If a ransomware attack encrypts your files, you can restore them from a recent
backup.
4. Email and Web Browsing Caution
Cybercriminals often use phishing emails or malicious websites to deliver malware or steal
information. Be cautious when opening email attachments, clicking on links, or downloading
files from unknown sources.
Firewalls and intrusion detection systems act as barriers against unauthorized access to
your network. They can help identify and prevent cyber threats.
Example: A firewall can block incoming malicious network traffic, keeping your network
secure.
Educate yourself and your organization about cybersecurity best practices. This includes
recognizing the signs of phishing emails, being cautious with social engineering attacks, and
understanding the risks associated with various online activities.
Example: Training employees to spot phishing attempts can prevent them from falling
victim to scams.
Mobile devices are increasingly targeted by cybercriminals. Ensure that your smartphones
and tablets are also protected with security measures, including screen locks and encryption.
Example: Enabling a PIN or fingerprint lock on your mobile device adds an extra layer of
security.
8. Secure Networks
Use secure, encrypted Wi-Fi networks, and avoid using public Wi-Fi for sensitive activities
like online banking.
Example: Using a VPN (Virtual Private Network) on public Wi-Fi can encrypt your data and
protect your privacy.
The legal framework surrounding cybercrime is essential to maintain order and security in
the digital world. In this section, we'll delve into the legal aspects of cybercrime, exploring
the laws, regulations, and penalties that govern these activities.
The Information Technology Act, 2000
In India, the Information Technology Act, 2000, often referred to as the IT Act, serves as the
primary legislation governing cybercrimes. This act provides the legal framework for
electronic transactions, cybersecurity, and digital signatures. It defines various offenses
related to cybercrimes and outlines the penalties for these offenses.
1. Digital Signatures: The IT Act recognizes digital signatures as legally valid and provides
a framework for their use in electronic transactions.
2. Electronic Records: It gives electronic records the same legal status as physical records,
making them admissible as evidence in courts.
4. Cyber Tribunals: The Act established Cyber Appellate Tribunals to handle disputes and
appeals related to cybercrimes and electronic transactions.
2. Damage to Computer Source Code (Section 65): This section deals with intentionally
causing damage to computer programs or source code.
5. Identity Theft and Cheating by Personation (Section 66C and 66D): Impersonating
someone else to deceive or harm is illegal.
6. Data Theft (Section 43): Stealing, copying, or downloading data without permission is
considered a cybercrime.
1. IT Amendment Act, 2008: This amendment addressed various issues, including data
protection, the offense of sending offensive messages through communication services, and
provisions for the appointment of a Controller of Certifying Authorities.
2. IT Amendment Act, 2011: This amendment introduced several significant changes, such
as stricter penalties for cybercrimes, expanded the definition of "intermediary," and included
provisions for the protection of sensitive personal data.
3. IT Amendment Act, 2019: The 2019 amendment introduced provisions for the
protection of children from sexual offenses and expanded the scope of the Act to include new
types of cybercrimes and technology developments.
4. Data Localization and Privacy Bills: While not amendments to the IT Act per se, India
has been considering legislation related to data localization and privacy, such as the Personal
Data Protection Bill, which aims to establish comprehensive data protection and privacy
regulations.
The amendments to the IT Act reflect the evolving nature of cyberspace and the need to
address new challenges related to technology, cybersecurity, and digital privacy. These
amendments have helped enhance the legal framework for electronic transactions and the
protection of individuals and organizations in the digital age.
The IT Act prescribes various penalties, including fines and imprisonment, for those found
guilty of committing cybercrimes. The severity of the penalties depends on the nature and
gravity of the offense.
Example: Under Section 66 of the IT Act, hacking can lead to imprisonment for up to three
years and/or a fine.
Enforcing cybercrime laws and jurisdiction can be complex, given the borderless nature of
the internet. Cybercrimes can often involve actors from different geographic locations.
International cooperation and legal agreements are vital for tracking and prosecuting
cybercriminals.
Organizations Dealing with Cybercrime and Cybersecurity in India
India, like many other countries, recognizes the importance of addressing cybercrime and
enhancing cybersecurity. Several organizations and agencies are dedicated to managing and
preventing cyber threats. In this section, we will explore key entities in India that play crucial
roles in dealing with cybercrime and promoting cybersecurity.
Role: CERT-In is the national nodal agency for cybersecurity and incident response in India.
It plays a central role in protecting the country's cyberspace and responding to cybersecurity
incidents.
Role: Various state police departments in India have specialized units dedicated to handling
cybercrimes. These units investigate and prosecute cybercriminals and provide support to
victims.
Functions: Cybercrime cells conduct investigations, gather digital evidence, and assist in the
prosecution of cybercriminals.
Role: NASSCOM is a trade association of the Indian information technology (IT) and business
process outsourcing (BPO) industry. It is actively involved in promoting cybersecurity
initiatives and best practices.
Role: Several private cybersecurity companies in India provide specialized services and
solutions to protect organizations from cyber threats.
5. International Collaboration
Role: India collaborates with international organizations and law enforcement agencies to
combat cybercrime, as many cybercrimes have transnational aspects.
Role: Indian universities and research institutions actively contribute to the field of
cybersecurity by conducting research, providing education, and fostering innovation.
Case Studies
Studying real-world cases of cybercrimes provides valuable insights into the tactics,
consequences, and responses to these incidents. In this section, we will explore a few case
studies that highlight the impact of cybercrimes and the measures taken to address them.
Background: In 2013, the retail giant Target suffered a massive data breach. Cybercriminals
gained access to the company's point-of-sale (PoS) system, compromising the credit and
debit card information of over 40 million customers.
Impact: The breach resulted in significant financial losses for Target, damage to its
reputation, and the need to improve its cybersecurity measures.
Response: Target cooperated with law enforcement agencies and cybersecurity firms to
investigate the breach. The company implemented enhanced security measures, including
adopting EMV chip technology for card transactions.
Background: The Mirai botnet, a network of compromised Internet of Things (IoT) devices,
launched massive distributed denial of service (DDoS) attacks in 2016, targeting various
online services and websites.
Impact: The attacks disrupted popular websites and services, causing financial losses and
raising concerns about the security of IoT devices.
Response: The source code of the Mirai botnet was published online, leading to a
collaborative effort by cybersecurity researchers, law enforcement agencies, and tech
companies to identify and mitigate the threat. Device manufacturers also improved security
features in their products.
Background: The WhatsApp Pegasus spyware attack in 2019 targeted the smartphones of
journalists, activists, and government officials by exploiting a vulnerability in the WhatsApp
messaging app.
Impact: The attack raised concerns about the use of spyware for surveillance and threats to
user privacy.
Response: WhatsApp quickly patched the vulnerability and took legal action against the
company behind the spyware. The incident highlighted the importance of timely software
updates and encryption for user security.