True crime news logo
  • Krimidex

Sign up for our newsletter and get the latest stories

Never miss the latest true crime news, reviews and top lists — plus new podcasts, series, films and books.

You can unsubscribe with one click from any email.

True crime news logo

The international true crime destination. Cases, documentaries, podcasts and travel routes.

© 2026 truecrime.news. All rights reserved.

Krimidex/Cybercrime
Concept

Cybercrime

Criminal offenses committed using computer technology, networks, or the internet, where a computer serves as the target, tool, or both. Prosecuted under various federal statutes depending on the specific conduct involved.

Cyberkriminalitet — linocut illustration

Definition

Cybercrime is not a single, uniformly defined offense in U.S. federal criminal law, but rather a broad category encompassing criminal acts committed through or against computer systems, networks, and the internet. The term covers diverse conduct including unauthorized computer access, identity theft, online fraud, ransomware deployment, phishing schemes, and distribution of illegal materials. In federal prosecutions, these cases are charged under specific statutes that address the particular criminal conduct rather than under a single "cybercrime" provision.

The primary federal statute governing computer-related offenses is the Computer Fraud and Abuse Act, which criminalizes unauthorized access to computers and computer systems, particularly those involved in interstate commerce or government operations. This statute addresses activities such as hacking into protected systems, causing damage to computers through malware or denial-of-service attacks, and obtaining information through unauthorized access. The CFAA applies when the defendant knowingly accesses a computer without authorization or exceeds authorized access.

Depending on the nature of the offense, cybercrime cases may also be prosecuted under traditional fraud statutes adapted to electronic contexts. Wire fraud provisions apply to schemes conducted through electronic communications, while identity theft statutes address the misuse of personal information obtained online. Financial crimes involving electronic payment systems fall under banking fraud provisions, and cases involving exploitation or obscene material are charged under specific statutes addressing those harms.

In true crime contexts, cybercrime cases often involve sophisticated technical methods and can cross international borders, creating jurisdictional complexities. Federal prosecutors typically work with specialized cybercrime units and digital forensic experts to trace electronic evidence, identify perpetrators operating behind anonymizing technologies, and establish the technical elements required for conviction. The rapid evolution of technology means that courts frequently interpret existing statutes to address novel forms of criminal conduct that legislators did not originally anticipate.

Related entries

Cyberkriminalitet

Related articles

Bots angriber banker med tusindvis af mikrotransaktioner

Bots Hit Banks with Thousands of Micro-Transactions

Criminal groups have increasingly replaced human operators with autonomous bots and AI agents capable of executing thousands of sub-cent transactions against banking platforms within minutes — validating stolen card data before victims or security systems can respond.

AI-agenter accelererer finansiel svindel i sekunder

AI Agents Accelerating Financial Fraud in Seconds

Autonomous AI systems are executing financial transactions at speeds that outpace traditional fraud detection. Digital Watch Observatory warns that this velocity creates dangerous blind spots in combating financial crime.

Menschenjagd: NDR-Podcast über White Tiger wird Chartstürmer

German Podcast Exposes Massive White Tiger Cybercrime Network

A German podcast series about the Cambodian cybercrime network White Tiger reached number 1 on true crime charts. The series documents how thousands are held in forced labor while Danes and Germans lose billions to fraud.

Ransomware-Angriff Uniklinik Düsseldorf 2020

The Düsseldorf University Hospital Ransomware Attack 2020

On September 10, 2020, Universitätsklinikum Düsseldorf, one of the Rhineland's leading university hospitals, was hit by a massive ransomware attack attributed to the cybercriminal group Netwalker. The attack forced the hospital to turn away emergency patients and resulted in at least one death, marking one of Europe's most serious cyberattacks on critical infrastructure.

DarkMarket-operationen 2021

The DarkMarket Operation 2021

In January 2021, German and American law enforcement dismantled DarkMarket — an illegal darknet marketplace with more than 500,000 users and transactions worth billions. The operation ended with the arrest of the platform's administrator and the seizure of its servers. It was considered the largest darknet marketplace takedown in history at the time.

A computer screen displays Binance's cryptocurrency dashboard, a red alert notification flashing next to the balance showing a missing 7,000 bitcoin, symbolizing the massive cyberattack that rocked the exchange.

Hackers Steal $570 Million in Binance Coin Cyberattack

Unknown hackers exploited a vulnerability in Binance's BSC Token Hub bridge on October 4, 2022, stealing approximately 2 million BNB tokens valued at $570 million. The attack, discovered two days later, marked one of crypto's largest bridge heists but left user funds untouched.

A figure resembling Joseph Colombo lies surrounded by chaos during the 1971 assassination attempt; visible crowds and a sense of panic in a bustling New York street.

The Colombo Crime Family: New York's Most Brutal Mafia Dynasty

The Colombo crime family emerged in 1928 as New York's youngest of the Five Families, built on bootlegging and eventually dominating organized crime across the Northeast. Known for extreme internal violence and brutality, the family's decline from 150 made members to just 75 by 1993 reflects decades of devastating internal wars and federal prosecution.

A cracked Equifax logo on a glass door with reflection of anonymous figures in suits, symbolizing espionage and security failure, against the backdrop of a busy urban landscape.

U.S. Charges Chinese Military Officers in Massive Equifax Hack

U.S. federal prosecutors charged four members of China's People's Liberation Army on February 10, 2020, with orchestrating one of the largest data breaches in history. The defendants allegedly exploited a vulnerability in Equifax's systems to steal sensitive information from approximately 145 million Americans over a two-month period in 2017.

A laptop screen displaying lines of code and visible API tokens, surrounded by notes and diagrams illustrating a data scraping scheme related to LinkedIn profiles, in a cluttered tech workspace.

700 Million LinkedIn Users' Data Sold on Dark Web Forum

In June 2021, a hacker using the username TomLiner posted personal data from approximately 700 million LinkedIn users—roughly 93% of the platform's membership—for sale on the dark web forum RaidForums. LinkedIn disputed the characterization as a breach, arguing the data came from public profiles and external sources rather than a direct hack of its systems.

A Starwood-branded server room with tangled Ethernet cables and a laptop displaying a web shell interface, symbolizing the vulnerability exploited in Marriott's data breach affecting 500 million guests

Marriott's Massive Breach: 383 Million Guests Exposed

Marriott International disclosed on November 30, 2018, that hackers had accessed its Starwood guest reservation database for approximately four years, affecting up to 383 million guests. The breach exposed sensitive personal information including names, addresses, passport numbers, and encrypted payment data—making it one of the largest data compromises in history.

A compromised Microsoft Exchange server displays a terminal screen filled with cryptic code, cables snaking out as a technician in the background examines the setup, symbolizing the widespread impact of the 2021 Hafnium cyberattack.

Chinese State Hackers Breached Thousands via Microsoft Exchange

A state-sponsored Chinese threat actor known as HAFNIUM launched a sophisticated cyberattack against Microsoft Exchange servers beginning January 6, 2021, remaining undetected for two months before Microsoft's March disclosure revealed the breach had compromised thousands of organizations worldwide.

A cluttered office desk with stacks of forged invoices and documents, featuring a figure resembling B. Ramalinga Raju, focused intently on a computer screen displaying manipulated financial data at Satyam Computer Services.

Satyam: How India's IT Giant Hid $1 Billion in Fraud

In January 2009, Ramalinga Raju, founder and chairman of Satyam Computer Services—India's fourth-largest IT firm—confessed to a massive accounting fraud spanning at least seven years. The scheme involved fabricated clients, phony invoices, and fictitious cash balances totaling over $1 billion, roughly half the company's reported assets.

Facts

Type
Concept
Legal reference
18 U.S.C. § 1030 (Computer Fraud and Abuse Act)
Last updated
22 May 2026