The Republic of Srpska - Ministry of the Interior


Criminal Police Administration

Unit for High-Tech Crime

Creation and introduction of computer viruses


    What is it?

    • The criminal offense of Creating and Introducing Computer Viruses is committed by creating a computer virus - malicious software, with the aim of inserting it into someone else's computer or computer or telecommunication network.
    • Malware is a common term for harmful or malicious programs that cybercriminals use to access someone else's computer, which are usually hidden in attachments or free content.
    • It is used for a range of illegal activities from stealing personal data, deleting or damaging data to creating botnet networks (networks of infected computers) and bypassing security programs (the most significant malicious programs are viruses, trojans, spyware, adware).
    • In connection with the above, our practice includes ransomware, which involves a very complex criminal activity that is incriminated in our criminal legislation through two criminal offenses, namely the criminal offense of Extortion in connection with the criminal offense of Creating and Introducing Computer Viruses.
    • The subject criminal offense is committed by an organized group of individuals creating malicious software, which is then inserted into a computer, whereby all data on the infected computer is blocked and encrypted, and the owner of the infected computer simultaneously receives instructions to pay a certain amount of money to unlock their data.
    • The payment instructions involve the wallet number for some of the cryptocurrencies of the perpetrator of the criminal offense and instructions on how the injured party can purchase some of the cryptocurrencies, most commonly Bitcoin.
    • The emphasis of the perpetrators of criminal offenses is on inserting malicious software into computers owned or used by legal entities, i.e., companies that conduct business, perform financial transactions, have databases on computers, etc.
    • In this way, the effect of extortion is much greater, and perpetrators of criminal offenses demand much larger amounts of money from users of such computers than from users of computers who are natural persons.
    • There is no guarantee that encrypted documents will be decrypted after payment. The injured party risks double victimization.

     

    How to protect yourself?

    • Do not open email messages received from unknown senders.
    • Do not open email messages with unknown attachments.
    • Use original and licensed software.
    • Use and regularly update antivirus programs.
    • Use USB drives cautiously.
    • Engage experts to maintain information systems.
    • Separate private and official email accounts.
    • Open email accounts with trusted and well-known internet service providers.
    • Regularly back up data to separate storage capacities.

     

    What if it happens?

    • Report to the Ministry of the Interior of Republika Srpska as soon as possible.
    • Do not make any payments.
    • Save the data about the email address from which the notification was sent.
    • Save all communication if it has been established.
    • Save the payment instructions.
    • Save a screenshot of the screen.
    • When reporting, provide any other data if possible (type of operating system, document extension, antivirus program, etc.)