Organized cybercrime groups (OCGs) are a significant threat to the security of European critical infrastructure, but little is understood about the impact of conflict on their operations. With the...Show moreOrganized cybercrime groups (OCGs) are a significant threat to the security of European critical infrastructure, but little is understood about the impact of conflict on their operations. With the onset of the Russia-Ukraine war, this can result in unpredictable situations, weakening defensive capabilities. Not much has yet been written on the influence of war on these groups, but the dominant view is that OCGs will invariably act towards monetary gain, coming from studies of ‘traditional’ organized crime. Data is used from cyber threat reports and interviews with industry-leading experts to explore the influence of the war on the operations of OCGs towards critical infrastructure, and to find explanations for a change in behaviour. Using qualitative thematic analysis, configurated using Rational Choice Theory (RCT) by Mandelcorn et al. (2016), the findings are analysed to get an academic and generalizable understanding of the phenomenon. In line what has often been assumed with ‘traditional’ organized crime, OCGs continued acting with financial profit as their goal, which can be explained using Rational Choice Theory. Contrarily, some groups politically aligned themselves with Russia or Ukraine, which is more difficult to justify using RCT. Therefore, this thesis proposes a contribution to the theory by incorporating political ideology specifically.Show less
This thesis deals with the concept of cybercrime prevention protocols against ransomware attacks within Dutch municipalities. It starts with a description of the development of cybercrime attacks,...Show moreThis thesis deals with the concept of cybercrime prevention protocols against ransomware attacks within Dutch municipalities. It starts with a description of the development of cybercrime attacks, and ransomware in particular, aimed at Dutch municipalities. Then it follows up with the routine activity theory and current ransomware prevention methods and measurements. The practical part analyses input from employers of municipalities and IT-experts. They provide access to questions asked for the purpose of this investigation. The response is based on experience and successful attacks by hackers on municipalities. After the input has been analysed, a set of recommendations will also be made. These recommendations will be used to improve cybercrime prevention. Conclusively, the consequences of cybercrime prevention protocols on ransomware attacks will also be discussed both in terms of image and financial effect of such protocols.Show less
Artificial Intelligence is a sophisticated emerging technology that cybercriminals have increasingly been using maliciously to facilitate their attacks. As the private and public sector are key...Show moreArtificial Intelligence is a sophisticated emerging technology that cybercriminals have increasingly been using maliciously to facilitate their attacks. As the private and public sector are key targets of these attacks, collaboration is called for. This study dissects the divergent perceptions of cybercrime in both sectors which have inhibited cooperation in the past during the growth of the Internet, then aligns these scattered views to build common ground to establish a cooperation for this up-and-coming threat. The societal aim is to avoid repeating previous mistakes encountered at the birth of cybercrime. This thesis asks the following question: To what extent does the perception of risk of malicious use of AI by cybercriminals differ within the public and private sector? After conducting a qualitative analysis of nine semi-structured interviews, the thesis finds that distinct perceptions about cybercrime between sectors is what is at the heart of the stagnation. But neither public or private organisations can solve the issue of the upcoming AI cybercriminal threat and reach desired goals without each other as each sector lacks some elements complemented by the other. The differences found in this research can shape the basis of a cooperation against AI-Cybercrimes between the public and private sector.Show less
In recent years, cybercrime has risen substantially. New media are used as platforms for the trading of ready-to-use cybercrime products and as virtual locations for offenders to converge. This...Show moreIn recent years, cybercrime has risen substantially. New media are used as platforms for the trading of ready-to-use cybercrime products and as virtual locations for offenders to converge. This study illustrates how Telegram is utilized for the trading of phishing tools and methods, by offenders to find co-offenders and to co-offend. The study employs a netnographic research framework consisting of a combined method including an observational study and quantitative data analysis. The results describe a variety of phishing-related products that are advertised on Telegram in addition to the range of activities and behaviours occurring in relation to these markets. The value of this research is two-fold, namely (i) describing and mapping a part of the cybercriminal ecosystem and thereby improving our knowledge and situational awareness and (ii) developing and applying a blended method of netnography and data analysis, providing numbers with the qualitative observations.Show less