The paper deals with partial findings from the research of cyber crime of those offenders whose criminal proceedings ended definitively in 2015. It focuses on unauthorized penetration into email boxes and demonstrates their vulnerability in the form of a weakly secure password on the case of one of the perpetrators.