Cyber Crime Trend in Bangladesh, An Analysis and Ways Out To Combat The Threat
Cyber Crime Trend in Bangladesh, An Analysis and Ways Out To Combat The Threat
net/publication/324468211
Cyber crime trend in Bangladesh, an analysis and ways out to combat the threat
CITATIONS READS
2 9,688
6 authors, including:
5 PUBLICATIONS 17 CITATIONS
Military Institute of Science and Technology
5 PUBLICATIONS 10 CITATIONS
SEE PROFILE
SEE PROFILE
3 PUBLICATIONS 5 CITATIONS
University of the West of Scotland
18 PUBLICATIONS 26 CITATIONS
SEE PROFILE
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Shusmoy Kundu on 05 December 2020.
Abstract—In this paper an analysis has been carried out institutions, Research and Development (R&D) organiza-
on the cyber attacks, that have happened in the recent tions and other telecommunication firms etc. In this paper
years. Based on the analysis the cyber attack trend in the we shall analytically examine the cyber security scenario
financial sector of Bangladesh has been investigated. The
study is further extended to identify the causes of cyber in the world with an in-depth emphasis in Bangladesh.
heist in the financial sectors. The existing legal framework Thereafter, we shall discuss the cyber security trend in
of Bangladesh for dealing with the cyber crimes has also the financial sector of Bangladesh. After that we shall
been investigated in this paper. The analysis results are put an endeavour to find the ways out to combat cyber
presented in appropriate graphs and charts. Finally a crime in Bangladesh.
few recommendations are put forward for combating the
increasing cyber crimes in the world, and in Bangladesh in We organize the rest of the paper as follows. Back-
particular. ground study of our work is discussed in Section II. In
Keywords—Cyber security, cyber crimes, SCADA, code Section III, we are going to discuss about the major cyber
of ethics, legal issues. attacks in recent times. In Section IV a comparison is
given of cyber attacks among some other countries. In-
I. I NTRODUCTION vestments in cyber security measures by government and
Cyber Security is a security system to protect the ICT organizations will be highlighted in the Section V.
computing devices and computer network where the The trend of cyber attacks in Bangladesh are discussed
important data are stored, retrieved and interchanged in the Section VI. Next Section VII is about the legal
against any kind of attack or intersection. Cyber security framework to combat cyber crime in Bangladesh. The
includes application security, information security, net- following Section VIII contains the ways out to combat
work security, disaster recovery or planning, operational cyber crimes and finally Section IX concludes the paper.
security and so on. All over the world all most all the
II. L ITERATURE R EVIEW
organizations and enterprises are using computers, cloud
and many others server and devices. All the data which Shang, Jiang, Li and Wang [1] tried to combine the
belong to that companies are saved in the data base. available clustered knowledge on cyber security into
They are supposed to be seen only by the employees one big knowledge base and use that to train an entity
and other members who are related to that organization. recognizer. Thus the entity recognizer will be able to gain
Sometimes they have to send their secret data from one knowledge from integrated knowledge base and be able
place to another over the internet. Here professionals to identify any cyber security related entity from text.
are engaged in the art of secret communication; i.e., Duić, Cvrtila and Ivanjko [2] worked with a goal to
have developed mechanisms for ensuring confidential find more effective and long lasting ways to combat cyber
information is not leaked to unauthorized parties. The attacks and crimes happening frequently around us in the
more people are trying to access any program or system world. They emphasized on how these cyber attacks are
in an unauthorized way, the more information and data going to be threat to international relations and what is
need to be saved in a secured and protected way. the way out to fight this using NATO’s planning process
Cyber crime is a bi-product of the ever-increasing for protection from cyber crimes.
development in the areas of information and commu- Roldán-Molina, Almache-Cueva, Silva-Rabadão,
nication technology (ICT). The attackers mainly attack Yevseyeva and Basto-Fernandes [3] presented their work
the confidential data of the organizations or personal to help in estimating the probability of cyber security
information thereof. The most targeted organizations are risks and to form cyber security strategies by building a
hospitals, government offices, police stations, financial software.
Azad, Mazid and Sharmin [4] presented their work that day, Kaspersky Lab reported infections in France,
wherein they have highlighted the cyber crime laws of Germany, Italy, Poland, the United Kingdom, and the
Bangladesh. United States, but the majority of infections targeted
Teoh and Mahmood [5] discussed about the relation- Russia and Ukraine, where more than 80 companies
ship between the development of cyber security strategy initially were attacked, including the National Bank of
and the successful growth of economy. Ukraine. Many organizations in Ukraine were affected,
including government sectors, banks, state power utilities
III. C YBER C RIME IN G LOBAL S CENARIO and Kiev’s airport and metro system. For the solution,
A. WannaCry Ransomware when the file is encrypting that time if process can be
On 12 May, 2017, the ransomware WannaCry has stopped, it can be saved from encryption. Many anti-virus
begun to spread. It has been reported that, within a day companies claim that their software has been updated
it infected more than 230,000 computers in over 150 for preventing this type of encryption. Kaspersky also
countries. Parts of the United Kingdom’s National Health says its security software is now capable of spotting the
Service (NHS), Spain’s Telefonica, FedEx and Deutsche malware [8]. It is safe to keep using all the updated
Bahn were hit, along with many other countries and com- software and anti-virus.
panies worldwide. The WannaCry ransomware targeted IV. C OMPARISON OF C YBER ATTACK AMONG OTHER
computers running the Microsoft Windows operating C OUNTRIES
system by encrypting data and files and then demanded
ransom payments in the Bitcoin cryptocurrency. Viruses Almost all the countries over the world are under the
are normally spread as an attachment on an email or cyber-attack threat. Due to lack of security any country’s
other downloaded file but WannaCry is a different type organization can be victim of the cyber-attack. A list of
of ransomware because it can spread through a local countries which are lowest malware infected [9] is shown
network on its own. The ransomware has hit organi- in Figure 1.
zations using aging technology and outdated software A pie chart of countries with highest malware infection
[6]. For the remedy for this ransomware, a 22-year-old rates computers is shown below in Figure 2. The highest
web security researcher from North Devon in England infected country is China and the lowest one is Poland
known as MalwareTech researched on this ransomware [9].
and analyzed the problem and code. Then he discovered Supervisory control and data acquisition (SCADA)
an effective kill switch by registering a domain name is a system architecture of software or hardware for
he found in the code of the ransomware. Kill switch process control. It is a center control system. It con-
is a mechanism which remotely stopped any system or sists of controller network interfaces input or output
software without doing any harm and deleting any data. and gathers real time data. It uses peripheral devices
But cyber criminals are fighting back by modifying the like programmable logic controllers and discrete PIF
code for further attack. controllers to the interface. The threat on SCADA is not
new. In the network communication system an effective
B. Petya Ransomware way of gaining the control means operating the system
Petya is a kind of ransomware which also encrypt the in real time. This communication can be attacked by the
data and demand for ransom through bitcoin. Petya 1st attacker. In September 2011, Russian hackers took gain
is introduced in 2016. Till now there are two versions
V1.0 and V2.0. It mainly infects the computer’s Master
Boot Record (MBR). When the malware is installed, it
overwrites the Windows bootloader and then triggers a
restart. It may come to the computers in many ways.
But when user tries to install it, pretends as a normal
software, then it shuts down the operating system and
infects the boot loader. Then there will pop out a message
which is similar with the message which user usually gets
when repairing any system. But it shows the percentage
of progress of file encrypting. After encryption, it will
give a danger message which will tell to press any key,
then it will pop out another message that user’s data
has been encrypted, for restoring the data the user has
to pay the ransom though the bitcoin [7]. On 27 June, Fig. 1. The List of Countries with Lowest Malware Infection Rates in
2017, the Petya V2.0 has been started to spread. On Computers.
Fig. 2. The Pie Chart of Countries with Highest Malware Infection in Fig. 3. Top 10 Cyber Security Companies around the World.
Computer.
TABLE I
S ECTOR WISE CYBER ATTACKS IN VARIOUS COUNTRY
the country [16]. succeeded. They kept trying to transition, after that they
were able to transfer money though their fake accounts.
VI. C YBER ATTACK T REND IN BANGLADESH
After that when on Sunday the bank is opened after
Bangladesh is a developing country. In most of the weekend, the officials noticed that something wrong had
countries like Bangladesh have limitations in information happened because the malware also stopped printer from
accessing and it is because of having very less knowledge printing the transition information. The malware also
about the existing infrastructure. Cyber crime is a prop- handled the log in and log out process and also controlled
erty related crime. Victims are not the priority here, only the server and modification. Then they said to Philippines
snatching of properties such as information, data etc. is bank to stop the transition, but that time in Philippines
the purpose of this crime. In our country most of the it was there weekend. The malware was programmed
banks are at high security risk. According to Bangladesh for activation up to 6th February. After identifying the
Institute of Bank Management (BIBM), approximately attack, the transition has been stopped, but the attacker
Tk 1,793 crore was invested in the banking IT sector in succeeded to transfer $81 million.
2016. Still this banking sector is not cyber crime free at Credit cards, debit cards etc are denoted as “plastic
all. A study of Bangladesh Institute of Bank Management money” are the replacement of conventional financial
(BIBM) says that, a total of 52% of the banks in our components paper money in the current living time. The
country are at high risk of cyber security issues (shown in use of ATM is convenient but has a negative phase,
Figure 5). Out of that 52% banks, 16% banks are at very which comes out in the form of “ATM frauds”. “Internet
high risk and 36% banks are high risk [17]. Risks in 32% fraud” is the use of internet services or software with
banks are moderate, 12% banks are at low risk and the internet access to defraud victims or to otherwise take
remaining 4% of banks are at very low risk region. Cyber advantage of them using various components of the
security in the banking sectors is a burning question in internet, like chat rooms, email, forums, or websites -
recent times especially after the Bangladesh Bank Heist. to execute fraudulent transactions. Bank criminals are
The incident Bangladesh Bank Heist held on 4th making utilization of different electronic medium, for
February 2016, where the hackers (still unknown) tried example, web, email, and encoded messages for their
to steal $1 billion. The hackers managed to get $81 fraudulent activities [19].
million sent to Rizal Commercial Banking Corporation In the last few years, several security breaches had
in the Philippines and PABC bank in the Srilanka via happened in the banking sector of Bangladesh [19], some
four different transfer requests and an additional $20 of those are shown in Table II.
million sent to Pan Asia Banking in a single request. The
malware’s name was evtdiag.exe. The attackers are called VII. L EGAL F RAMEWORK TO C OMBAT C YBER
Reuters [18]. The hacker did this through a malware C RIME IN BANGLADESH
which worked on swift messaging system. This malware The term Cyber Law is used to describe the legal
deletes any incoming message and the confirmation issues related to use of information and communications
message before sending the office printer [7]. On 4th technologies(ICT). An effective cyber law can play a
February, Thursday after working hour, the malware vital role in ensuring that the cyber criminals are fairly
was activated. As Friday was holiday in Bangladesh, and successfully tried and judged for their crimes. Cyber
there was no one for monitoring the transition message. law is much needed to control the misuse and abuse
The attacker gave many request for transition, not all of computer technologies in order to protect nations
Fig. 5. Banks of Bangladesh at Cyber Risks. Fig. 6. Technology and related crimes.
Shusmoy Kundu was born in Jhenaidah, Md Afzal Hossain was graduated from
Bangladesh in 1996. He is completing his Bangladesh Institute of Technology (BIT),
B.Sc from Military Institute of Science and Rajshahi from the department of Electrical
Technology (MIST). His major of study is and Electronic Engineering (EEE) securing
Computer Science and Engineering. Cyber 1st class. He obtained M.Sc (EEE) degree
security is the field of his final year re- from Bangladesh University of Engineering
search work. He has keen interest to work and Technology (BUET). He is pursuing PhD
regarding cyber and network security. He (in engineering) in the field of Multicore
has completed several projects related to AI, Optical Fiber (MCF) at BUET. He has ob-
Computer Interfacing, Computer Graphics, tained MBA (MIS) degree from IBA (Dhaka
Database Management System, Android Apps University) and M.Phil degree in National
Development. Shusmoy has completed courses on Cisco Certified Net- Security and Strategy from the University of Madras, Chennai, India.
work Associate (CCNA) and Mobile Apps Development. He attended His fields of research interests are ’Optical Fiber Communication’ and
2nd IEEE International Conference on Communications and Photonics ’Information System Security’. He has a good number of publications
(ICTP), International Humanitarian Technology Project Competition in his credit in national and international conference proceedings and
(IHTPC) in Bangladesh University of Engineering and Technology. journals. Mr. Hossain attended the 12th ICACT (2010) in Phoenix Park,
South Korea to present his research paper. Currently Afzal is serving
as Senior Instructor (professor) in the Department of CSE, Military
Institute of Science and Technology (MIST).