CJ 308 Module 6 Assignment

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

308

Subject

Business

Date

Jun 27, 2024

Type

docx

Pages

5

Uploaded by DrPowerLyrebird26

Cybercrime Search Warrant Simmons 1 Chelsea Simmons Southern New Hampshire University CJ-308-10928-M01 Thomas Payne June 14, 2024
Cybercrime Search Warrant Simmons 2 Cybercrime Module 6 Assignment Overview of Investigation: The Wellness Health Group cyberattack demonstrates how an employee was utilized to get access to the system during the attack. After more research, it was found that the worker was utilizing Bitcoin currency to sell drugs online while at work. After employing backup software to regain some functionality, the IT department was able to identify the cyberattack as coming from a Russian cybergang. By the afternoon of the attack, the employee was under investigation, and it was decided that a search warrant was required to carry out the inquiry. According to the concluding assessment, the employee's involvement with the Russian cyber gang was linked to the cyberattack. Statutory Violations: Phishing scams- One kind of cyberattack that uses deception to deceive a person into giving sensitive personal information is phishing schemes. The majority of phishing attempts impersonate well-known businesses, including USPS or Amazon. Because these websites are so genuine, the victim is led to believe that they are accessing the secure official website. It is simpler to deceive the victim into divulging personal information by offering discounts since they feel "safe". Identify Theft- Identity theft, as used in cybercrime, is any instance in which a hacker obtains unauthorized access to a victim's personal information to defraud that person by utilizing their credit card numbers, bank account information, or Social Security number (SSN). Once fraudsters get this information, they use it to execute fraudulent wire transfers or make unlawful transactions using the victim's credit card to steal their money.
Cybercrime Search Warrant Simmons 3 Ransomware- This kind of malicious software encrypts the victim's files and requests payment to unlock the stolen information. Ransomware comes in a variety of forms, such as Crypto Ransomware, Lockers, Doxware, Scareware, and Fileless Attacks (Baker, 2022). The victim will have to pay for the decryption key by following detailed instructions, depending on the demands of the malware. Bitcoin is the cryptocurrency that cybercriminals most frequently accept as payment. Data Breach- When private and sensitive data is accessed or deleted from a system without the consent of the individual or organization, it is referred to as a data breach. All firms are susceptible to breach, regardless of their size. If stolen, data such as credit card numbers, client lists, private addresses, or sensitive information may be compromised. A victim of a data breach may suffer from diminished trust in the compromised organization, among other consequences (TrendMicro, 2023). Statement of Probable Cause: The employee is connected to the crime by numerous pieces of evidence. According to the original report, the worker had been working for the Russian cybergang. Malware was given to the employee, who utilized it to sell narcotics online for Bitcoin. The administrative account allowed the Russian gang complete access to the computer system used by The Wellness Health Groups. They had access to emails and private information. The Wellness Health Group faced financial losses and a loss of community trust due to this employee (McNicholas & Angle, 2023). Research: Finding probable cause that there was a crime and that there is evidence connected to the crime are prerequisites for the execution of a search warrant (Silvia &Charles, n.d.). This will
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help