Cybercrime in Nigeria Politics

An election is approaching likewise cybercrime victims increased and millions have been duped from the election (Incentive Compensation Payment Election) which leads to different forms of cybercrime attacks.
The efficacy of democratic institutions in hiring hacktivists to canvas vulnerable citizens in terms of funding their bank accounts for supporting them either in election campaigns or in voting. This is what the hacktivists used as a guide in persuading vulnerable citizens in imposing them through calling (VOIP), mailing, and text messages.
We have different kinds of political parties in Nigeria and each of them has its perspective on canvassing the citizens to vote for their candidate. The era of technology has transformed election campaigns to one’s doorstep.
Who are the hacktivists target and the motivation in election campaigns?
A hacktivist(Anonymous) is a person who employs technology to announce social, ideological, or political messages and religious matters. Hacktivists coordinate campaigns of sabotage.

Hacktivists’ target is the country’s citizens don’t be surprised “Ageing are not safe from the hacktivist exploit”. Verily you have the right to vote but don’t be deceived by the election incentives received through messages, calling, and mailing else you’re victims of political fraud.
What motivates us(hacktivists) is Financial gain, Every entrepreneur invests in business to make a profit so all cyber-criminals motivation is financial gain.
How did we launch attacks?
- Doxing: Doxing is a tactic used by hacktivist groups to leak confidential information of public figures, organizations, or government bodies.
- DDoS: Distributed Denial-of-Service (DDoS) is a tactic used by hacktivist groups to overload computer systems and crash company websites. It is most commonly performed on large organizations.
- Defacement: Defacement is a tactic used by hacktivists to alter the appearance of a website. The tactic is most commonly done to spread activist agendas on government websites.

According to the diagram, the most commonly used attack used in Nigeria Politics to commit cybercrime is Social Engineering Attack learn more https://en.wikipedia.org/wiki/Phishing
How does the social engineering attack looks like?

If you receive a such message on your mobile phone please kindly shred it, forewarned is to be forearmed. some misspelled words can be indicated.
Don’t Call the number else you’re responsible PBX(Private Branch Exchange). A private telephone network used by businesses to make internal and external calls. An IP-PBX is a telephone system based on Internet Protocol which means that it uses Internet infrastructure to make calls. Sometimes IP-PBX is referred to as VoIP PBX which means a PBX that passes Voice over the Internet Protocol. IP Phones are phones that transfer voice over the Internet protocol, over a local network or the Internet. attack victims.
Scenarios on PBX Hacking from FBI: https://darknetdiaries.com/episode/1/

This is similar to the above image.
Behavioral dysregulation in cyberspace can not be eradicated but can be managed.
Countermeasure:
- Security Awareness training
- Think before you react to cyber crisis.
- Layers upon layers (Defense in Depth)
Learn more on protecting yourself through email attack exploit https://tinyurl.com/4eay2jhh
Thanks for reading there’s a space to elaborate on this matter simply because we are talking about knowledge which nobody is an island ain’t a politician or a journalist I’m a future cybersecurity analyst. I did these not to defame anybody but to educate unprivileged people whose cybercrime knowledge are yet to be known.
Written by: Abdul Basit Rotimi