Photo: UNODC / Laura Gil
Through training held in Phnom Penh, UNODC is helping to build a more robust response to cybercrime in Cambodia.
This originally appeared on UN News.
24 October 2025 – Imagine this: you visit the familiar website of your local hardware store. Everything looks the same — the same design, the same brand name, the same interface.
You place your order, make the payment, and only later notice a small detail: just one letter in the website address was different.
That’s how easily you can fall into a cybercriminal trap. If you’re lucky, the amount lost is small, and your bank acts fast — refunding the money and reissuing your card. But not everyone is so fortunate: in many countries, recovering stolen funds is nearly impossible.
One click away from losing everything
A bankruptcy lawyer told UN News that an increasing number of people are being forced to declare bankruptcy after losing money to cybercrime.
Anyone can fall victim to a cyberattack — no matter where they live — and everyone deserves protection and support.
While in some countries, cybercriminal acts still don’t fall clearly under the legal definition of “cybercrime,” and mechanisms for international legal cooperation are lacking, cybercrime itself is rapidly evolving.
What once were isolated attacks by individual hackers have become large-scale operations run by organized criminal networks.
The Internet and new technologies, including artificial intelligence, allow criminals to act faster and at greater scale, reach victims across the globe, and commit crimes with minimal human involvement.
From autonomous cyberattacks and fake images created using deep-fake technologies to malicious software and phishing campaigns enhanced by AI, the misuse of new technologies challenges traditional systems of investigation and cybercrime prevention.
Phishing kits for criminals
The most common cybercrime today is phishing — deceiving victims into revealing passwords or financial information through fake websites or emails, like the local hardware store.
Even inexperienced criminals can now use ready-made “phishing kits” to instantly create realistic clones of major brand websites and send convincing fraudulent messages.
In recent years, billions of stolen username and password combinations have surfaced on the dark web. These data are used in so-called credential-stuffing attacks — automated login attempts across thousands of websites at once.
Click Here For The Original Source.