Types of Cybercrime

types of cybercrime

There are several different types of cybercrime; most cybercrimes are carried out with the anticipation of financial gain by cyber attackers, though the ways cybercriminals aim to get paid can vary. Some specific types of cybercrime include the following:

Identity theft:

An attack arises when an individual accesses a computer to collect a user’s personal information, which they then use to steal that person’s identity or access their valuable accounts, such as banking and credit cards. Cybercriminals buy and sell identity information on darknet markets, offering financial accounts, as well as other types of accounts, like video streaming services, webmail, video, and audio streaming, online auctions, and more. Personal health information is another frequent target for identity thieves.


A crime involving an attack or threat of an attack on someone with a demand for money to stop the attack. One form of cyberextortion is the ransomware attack. Here, the attacker gains access to an organization’s systems and encrypts its documents and files, anything of potential value, making the data unapproachable until a ransom is paid. Usually, this is in some form of cryptocurrency, such as bitcoin.


An attack that uses scripts to mine cryptocurrencies within browsers without the user’s consent. Cryptojacking attacks may involve loading cryptocurrency mining software to the victim’s system. However, many attacks depend on JavaScript code that does in-browser mining if the user’s browser has a tab or window open on the malicious site. No malware needs to be installed as loading the affected page executes the in-browser mining code.

Credit Card fraud:

An attack arises when hackers penetrate retailers’ systems to get the credit card and/or banking information of their customers. Stolen payment cards can be subscribed and sold in bulk on darknet markets, where hacking groups that have stolen mass quantities of credit cards profit by selling to lower-level cybercriminals who profit through credit card fraud against individual accounts.


A crime connecting a cybercriminal who hacks into systems or networks to gain access to confidential information held by a government or other organization. Attacks may be motivated by profit or by dogma. Cyberespionage activities can include every type of cyberattack to gather, modify or destroy data, as well as using network-connected devices, like webcams or CCTV cameras. Cyberespionage detective on a targeted individual or groups and observing communications, including emails, text messages, and instant messages.

Software piracy:

An attack involves the unlawful copying, distribution, and use of software programs with the intention of commercial or personal use. Trademark violations, copyright infringements, and patent abuses are often associated with this type of cybercrime.

Exit scam:

The dark web has given rise to the digital version of an old crime known as the exit scam. In today’s form, dark web administrators divert virtual currency held in marketplace escrow accounts to their own accounts, essentially, criminals stealing from other criminals.

DDoS Attacks:

Some of the more frequently saw cybercrime attacks comprise DDoS attacks, which are often used to shut down systems and networks. This type of attack uses a network’s own communications protocol against it by overpowering its ability to respond to connection requests. DDoS attacks are sometimes carried out simply for malicious reasons or as part of a cyberextortion scheme.  They may also be used to distract the victim organization from some other attack or exploit carried out at the same time.

Phishing Attack:

Phishing campaigns are used to permeate corporate networks. This can be by sending fraudulent emails to users in an organization, tempting them to download attachments or click on links that then spread viruses or malware to their systems and through their systems to their company’s networks.

Credentials Attack:

A credentials attack is when a cybercriminal aims to steal or guess user IDs and passwords for the victim’s systems or personal accounts. They can be carried out through the use of brute-force attacks by installing keylogger software or by exploiting vulnerabilities in software or hardware that can expose the victim’s credentials.

Website Hijack:

Cybercriminals may also try to hijack a website to change or delete content or to access or modify databases without authorization. For example, an attacker may use a SQL injection exploit to insert malicious code into a website, which can then be used to exploit weaknesses in the website’s database, enabling a hacker to access and tamper with records or gain unauthorized access to sensitive information and data, such as customer credit card numbers, passwords, personally identifiable information (PII), trade secrets and IP.

Further, common examples of cybercrime include illegal gaming, the sale of illegal items, like weapons, drugs or counterfeit goods, and the solicitation, production, possession, or distribution of child pornography.

More Info

For help in cybercrime

Scroll to Top