Here are another 9 types of cybercrimes:

1. Cyber Bullying

It is also known as online or internet bullying. It includes sending or sharing harmful and humiliating content about someone else which causes embarrassment and can be a reason for the occurrence of psychological problems. It became very common lately, especially among teenagers.

2. Cyber Stalking

Cyberstalking can be defined as unwanted persistent content from someone targeting other individuals online with the aim of controlling and intimidating like unwanted continued calls and messages.

3. Software Piracy

Software piracy is the illegal use or copy of paid software with violation of copyrights or license restrictions.

An example of software piracy is when you download a fresh non-activated copy of windows and use what is known as “Cracks” to obtain a valid license for windows activation. This is considered software piracy. 

Not only software can be pirated but also music, movies, or pictures.

4. Social Media Frauds

The use of social media fake accounts to perform any kind of harmful activities like impersonating other users or sending intimidating or threatening messages. And one of the easiest and most common social media frauds is Email spam.

5. Online Drug Trafficking

With the big rise of cryptocurrency technology, it became easy to transfer money in a secured private way and complete drug deals without drawing the attention of law enforcement. This led to a rise in drug marketing on the internet.

Illegal drugs such as cocaine, heroin, or marijuana are commonly sold and traded online, especially on what is known as the “Dark Web”.

6. Electronic Money Laundering

Also known as transaction laundering. It is based on unknown companies or online business that makes approvable payment methods and credit card transactions but with incomplete or inconsistent payment information for buying unknown products.

It is by far one of the most common and easy money laundering methods.

8. Cyber Extortion

Cyber extortion is the demand for money by cybercriminals to give back some important data they’ve stolen or stop doing malicious activities such as denial of service attacks.

9. Intellectual-property Infringements

It is the violation or breach of any protected intellectual-property rights such as copyrights and industrial design.

9. Online Recruitment Fraud

One of the less common cybercrimes that are also growing to become more popular is the fake job opportunities released by fake companies for the purpose of obtaining a financial benefit from applicants or even making use of their personal data.

Cyber Crimes Examples

– REvil and Kaseya Ransomware

REvil is a Russian or Russian-speaking hacking group and it is known as a ransomware-as-a-service operation. The Kaseya incident took place in July – 2021. 

The incident happened when one of the Kaseya’s company’s products was deploying the famous SODINOKIBI REvil ransomware to endpoints of Kaseya’s customer network that attack surface was over 1000 Kaseya’s customers worldwide.

A few hours later REvil took credit for the attack by posting on their Happy Blog website on the dark web and demanded a $70 million ransom to release a public decryptor that they claim can decrypt all the damaged devices.

The attack was so impactful that the United States government offered $10 million bounties to anyone that can give any information for arresting REvil members.


Yaroslav Vasinskyi, a 22 years Ukrainian, was charged with conducting the attack and unleashing the ransomware against Kaseya and other companies.

– Stuxnet

The Stuxnet incident is a famous incident that happened in 2010. Stuxnet is the name of a computer worm (type of malware) that targets SCADA (supervisory control and data acquisition) systems.

Stuxnet malware left devastating damage to Iran’s nuclear power program. It was spreading through USB drives and affected mainly Microsoft Windows operating systems.

The malware functionality was to search for machines that are working as PLCs (programmable logic controllers) and if it was found the malware updates its code over the internet through the attackers.

– Marriott Hotels

In November 2018, Marriott hotels group suffered from a massive data breach that affected more than 500 million customers. 

The compromise happened for the guest reservation database by an unknown party. The information that was leaked contained payment information, mailing addresses, passport numbers, and phone numbers for customers.

Marriott Group has immediately conducted incident investigations with a group of security experts plus setting up a website and a call center. 

They also sent emails to the affected customers and gave them free access to monitoring tools that monitor the internet and give an alert if any evidence of sharing personal information is found.

– RockYou Data Breach

RockYou is a company that works in the game field and was founded in 2005 by Lance Tokuda and Jia Shen. The company was working well until December 2009 when what is called “the biggest data breach of all time” happened.

The data breach exposed and leaked more than 32 million user account information from RockYou database.

The company was storing passwords in an unencrypted plain text format which made it easier for the hacker to have access to all passwords stored. The hacker used a very old and popular SQL vulnerability to leak all data from the database.

After this major breach, the total set of passwords that were leaked became a very helpful resource in penetration testing as hackers use this wordlist of passwords to test the security and password strength of accounts and products.