419 fraud see Nigerian Prince scheme
account identity fraud 103
affinity fraud 81
AI (artificial intelligence) 54, 64, 88, 134
Ashley Madison data breach 147, 149
backups 118, 125, 126, 136, 137
BeenVerified 34
Bitcoin 5, 74, 60, 82, 83, 99, 101, 121, 123, 127, 128, 129, 131, 138, 145, 150
business email compromise (BEC) 10, 26–31, 37, 39
catfishing 34
content in context 63
criminal identity fraud 102
cryptocurrency 65, 74, 79, 81, 82, 83, 84, 86
cybercrime 1, 10, 31, 49, 66, 85, 87, 99, 156, 158
definition 3
impact of 5
personal impact of 38, 59–64, 87, 110–11
cyber-dependent crime 3
cyber-enabled crime 3
cyber extortion 3, 7, 118–38, 143, 145, 155, 158
dark web, the 5, 99, 100, 101, 102, 103, 104, 111, 112, 114, 126, 130, 131, 146
data breaches 5, 93, 94, 98–102, 103, 111, 112, 114, 126, 135, 146, 147, 149, 158
distributed denial-of-service (DDoS) 122–3, 130, 131, 135, 136, 137, 138
double extortion 126
drive-by attack 124
due diligence 45, 46, 51, 72, 89
email ransom campaigns 121
email spoofing 28
emotional decision making 49–51, 158
employee payroll redirection 33
extortion 3, 7, 35, 90, 118–38, 143, 145, 147, 155, 158
Facebook 1, 25, 27, 29, 51, 56, 64, 78–80, 84, 104, 108–9, 124, 148, 152, 153
fake celebrity endorsements 79–81
fake prizes 56
fake websites 56–8, 74–6, 77, 79, 85–6
fraud
419 fraud see Nigerian Prince scheme
account identity 103
affinity 81
criminal identity 102
lender loan 58
Spanish Prisoner 48
tax identity 103
tech support 33
fraudulent advertisements 77–9
General Data Protection Regulation (GDPR) 101
Google 1, 12, 25, 27, 28, 57, 64, 77, 78, 112, 121, 135, 137, 149, 150
identity theft settlement 55
Internet of Things (IoT) 133, 134, 135
invoice redirection fraud 31–2
lender loan fraud 58
lessons from history
Letters of Jerusalem fraud 47–8, 53
‘love bombing’ 36
machine learning 39
malware 1, 18, 32, 105, 107, 112, 123, 124, 132, 134, 136, 137, 145, 146, 149–50
message attacks 56
methods 2, 3, 10, 66, 88, 112, 138, 158
online investment fraud 69, 74–82
persuasion 15, 18, 50, 83, 87, 112, 128
social engineering 41
National Cyber Security Centre (NCSC) 79, 80, 98, 148
Nigerian Prince scheme 49, 52–5
‘No More Ransom’ 132
obedience 16
Omegle 148
online advance-fee fraud 45–66, 83
online smear campaigns 121–2, 135
passwords 18, 99, 104, 105, 111, 112, 113, 132, 136, 146, 149
personal data 5, 93, 94, 97, 100, 104
personal impact
impersonation fraud 38
investment fraud 87
personally identifiable information (PII) 97, 98, 99, 102, 103, 105, 111, 114
persuasion 14–18, 27, 28, 29, 36, 37, 41, 49–51, 63, 64, 79, 81, 83, 87, 106, 107, 128, 129, 132, 151, 158
phishing 18–26, 28, 31, 35, 51, 55, 105–7, 124, 128, 132
pop-ups 124
preventative measures
advance-fee fraud 65
identity theft 112
impersonation fraud 40
principle of authority 15, 16–18
principles of persuasion 15, 16
pump and dump schemes 82
quiz attacks 110
RaaS (ransomware as a service) 130–1
ransomware 4–7, 28, 118, 123–32, 133, 136, 137, 138, 158
removable media 125
reputation 27, 73, 85, 111, 119, 121, 123, 126, 146, 147, 148, 149, 153, 156
Shodan 135
SIM port hacking 97
social engineering 10, 11, 14–25, 27, 31, 32, 39, 41, 88, 109, 145
cyber extortion 121, 125, 136, 137
cyber identity theft 105–10, 112
cyber sextortion 147, 148, 151, 153–5
impersonation cyber frauds 11, 18, 21, 25, 34, 35, 39, 41
online advance-fee threats 48, 57, 63, 66
software updates 125
Spanish Prisoner fraud 48
‘suckers lists’ 54, 66, 69, 70, 79, 123
support for victims 41, 66, 88, 89–90, 113, 136–7, 155
synthetic identity fraud 103–4, 113
tax identity fraud 103
tech support fraud 33
threatening calls/messages 122, 145–7
Truth-Default Theory (TDT) 61–2
virtual private network (VPN) 6, 112
warning signs
advance-fee fraud 65
extortion 136
online investment fraud 89
sextortion 155
webcam attacks 135, 147–8, 154