Cyber Crime In 2025

Cyber crime costs include damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, embezzlement, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and systems, and reputational harm. 

A 2020 World Economic Forum Report say’s that cyber attacks on infrastructure were probably the fifth highest risk to business.

The US government says that many of the recent cyber attacks against America have been sourced to operations in Russia and that Russia has responsibility for the ransomware attacks that are carried out from its territory and by one authoritative estimate, the worldwide cost of cyber crime is expected to reach $10.5 trillion dollars by 2025. 

These numbers are alarming, and for us to better understand the tremendous impact that cyber attacks might have on companies and individuals, it is important to look back and consider some of the biggest cyber attacks in history: 

Melissa Virus: One of the earliest and biggest cyber threats was started by the Melissa Virus. In1999, the Melissa Virus was unleashed by a rogue programmer by sending users a file to be opened by Microsoft Word. The virus caused severe destruction to hundreds of companies, including Microsoft. 

NASA Cyber Attack: In 1999, a 15 year old schoolboy was able to hack and shutdown NASA’s computers for 21 days. Around 1.7M software were downloaded during the attack, which cost the space giant around $41,000 in repairs. 

Estonia Cyber Attack: In April 2007, Estonia witnessed what is thought to be the first cyber attack on an entire country, during which about 58 Estonian websites went offline, including websites of governments, banks and media outlets. 

Attack on Sony’s PlayStation Network: A cyber attack on Sony’s PlayStation Network in April 2011 claimed the personal information of 77 million users. 

Adobe Cyber Attack: The cyber attack which was first thought to have breached the data of 2.9 million users soon went on to compromise the personal data of up to 38 million users. Adobe claims that only the passwords and credit card information of the first 2.9 milion were compromised, whereas the remaining 35.1 million users only suffered the loss of their passwords and IDs. 

Attack on Yahoo: In 2014,Yahoo witnessed one of the biggest cyber attacks of the year when 500 million accounts were compromised. However, it is reported that basic information and passwords were stolen, whereas bank information was not. 

Ukraine’s Power Grid Attack: In what was the first cyber attack on a power grid, the attack left around half of the homes in the Ivano-Frankivsk region in Ukraine without power in 2015 for about a few hours. 

WannaCry Ransomware Attack:  One of the biggest ransomware of all time took place in 2017, when around 200,000 computers were affected in more than 150 countries. This outbreak had a massive impact across several industries and had a global cost of about £6 billion.

Cyber Attack on Marriott Hotels:  A cyber attack was lurking in the shadows for quite a while when Marriott acquired the Starwood Hotels group, and it did not come into light until 2018 . However, by then the attacker continued to have access to personal information of guests.More than 339 milion guests have had their data compromised. This had led the UK’s data privacy watchdog to fine the Marriott Hotels £18.4 million. 

The biggest password leak yet: It was reported earlier this June that a compilation of about 8.4 billion passwords were leaked. This by far is the biggest password leak and is referred to as #RockYou2021 in reference to the 2009 data breach of RockYou site that compromised around 32 million accounts. 

Cyber Attacks Last Month - July 2021

  • A data leak impacted Northern Ireland's COVIDCert online vaccination certification service, causing their Department of Health to temporarily suspend the portal.
  • Estonia stated a Tallinn-based hacker downloaded 286,000 ID photos from government database, exposing a vulnerability in a platform managed by their Information System Authority (RIA).
  • A widespread APT operation was discovered against users in Southeast Asia, believed to be spearheaded by Chinese entities. Researchers found a total of 100 victims in Myanmar and 1,400 in the Philippines, including many government entities.
  • The Japan 2020 Olympics was subject to data breach exposing the personal credentials of volunteers and ticket holders. The information included usernames, passwords, addresses, and bank account numbers.

The United States, the European Union, NATO and other world powers released joint statements condemning the Chinese government for a series of malicious cyber activities. They attributed responsibility to China for the Microsoft Exchange hack from early 2021 and the compromise of more than 100,000 servers worldwide.

In short, the more we move towards digitalisation and technology, the more vulnerable we become to cyber threats.

Technology is a double-edged sword, while it is a great asset and can provide us with new advanced methods of security, there are still those who misuse it and can pose a threat to our privacy. It is imperative for governments and businesses to invest in upgrading their cyber security and online privacy  combat cyber attacks. 

WEF:     CSIS:     Cyber Security Ventures:       Guardian:     Al Bawaba

You Might Also Read:

Minimising The Impact Of Ransomware:

 

« Stolen: Over $600 Million In Crypto Currencies
One Million Stolen Credit Cards Hit The Dark Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

Firebrand

Firebrand

Firebrand is the leader in Accelerated Learning in the field of IT and project management.

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

Acutec

Acutec

Acutec is an award winning IT support, services and solutions provider including managed IT Security and backup/disaster recovery.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

MagicCube

MagicCube

MagicCube is a device independent IoT security platform that protects against on-device, cloud, and network attacks.

Nubeva Technologies

Nubeva Technologies

Nubeva provide a breakthrough TLS Decrypt solution with Symmetric Key Intercept to gain the visibility needed to monitor and secure network traffic.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

eCloudvalley Digital Technology

eCloudvalley Digital Technology

eCloudvalley Digital Technology is a born-in-the-cloud partner focused entirely on AWS services across APAC region.

Dimension Data

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including intelligent security solutions.

RADICL

RADICL

RADICL's mission is to give SMBs that serve America's Defense Industrial Base (DIB) access to strong, enterprise-grade cyber security protection.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

ThreatCaptain

ThreatCaptain

ThreatCaptain is a Cybersecurity Leadership Development Company driven to enhance and illuminate cybersecurity risk through strategic alignment and informed business decision-making.

Dial A Geek

Dial A Geek

Dial A Geek are a Bristol-based B Corp that provides Managed IT Services to companies of 20+ users. We help businesses with a smart use of tech, including compliance and cybersecurity solutions.