Cyber Crime In 2025

Cyber crime costs include damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, embezzlement, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and systems, and reputational harm. 

A 2020 World Economic Forum Report say’s that cyber attacks on infrastructure were probably the fifth highest risk to business.

The US government says that many of the recent cyber attacks against America have been sourced to operations in Russia and that Russia has responsibility for the ransomware attacks that are carried out from its territory and by one authoritative estimate, the worldwide cost of cyber crime is expected to reach $10.5 trillion dollars by 2025. 

These numbers are alarming, and for us to better understand the tremendous impact that cyber attacks might have on companies and individuals, it is important to look back and consider some of the biggest cyber attacks in history: 

Melissa Virus: One of the earliest and biggest cyber threats was started by the Melissa Virus. In1999, the Melissa Virus was unleashed by a rogue programmer by sending users a file to be opened by Microsoft Word. The virus caused severe destruction to hundreds of companies, including Microsoft. 

NASA Cyber Attack: In 1999, a 15 year old schoolboy was able to hack and shutdown NASA’s computers for 21 days. Around 1.7M software were downloaded during the attack, which cost the space giant around $41,000 in repairs. 

Estonia Cyber Attack: In April 2007, Estonia witnessed what is thought to be the first cyber attack on an entire country, during which about 58 Estonian websites went offline, including websites of governments, banks and media outlets. 

Attack on Sony’s PlayStation Network: A cyber attack on Sony’s PlayStation Network in April 2011 claimed the personal information of 77 million users. 

Adobe Cyber Attack: The cyber attack which was first thought to have breached the data of 2.9 million users soon went on to compromise the personal data of up to 38 million users. Adobe claims that only the passwords and credit card information of the first 2.9 milion were compromised, whereas the remaining 35.1 million users only suffered the loss of their passwords and IDs. 

Attack on Yahoo: In 2014,Yahoo witnessed one of the biggest cyber attacks of the year when 500 million accounts were compromised. However, it is reported that basic information and passwords were stolen, whereas bank information was not. 

Ukraine’s Power Grid Attack: In what was the first cyber attack on a power grid, the attack left around half of the homes in the Ivano-Frankivsk region in Ukraine without power in 2015 for about a few hours. 

WannaCry Ransomware Attack:  One of the biggest ransomware of all time took place in 2017, when around 200,000 computers were affected in more than 150 countries. This outbreak had a massive impact across several industries and had a global cost of about £6 billion.

Cyber Attack on Marriott Hotels:  A cyber attack was lurking in the shadows for quite a while when Marriott acquired the Starwood Hotels group, and it did not come into light until 2018 . However, by then the attacker continued to have access to personal information of guests.More than 339 milion guests have had their data compromised. This had led the UK’s data privacy watchdog to fine the Marriott Hotels £18.4 million. 

The biggest password leak yet: It was reported earlier this June that a compilation of about 8.4 billion passwords were leaked. This by far is the biggest password leak and is referred to as #RockYou2021 in reference to the 2009 data breach of RockYou site that compromised around 32 million accounts. 

Cyber Attacks Last Month - July 2021

  • A data leak impacted Northern Ireland's COVIDCert online vaccination certification service, causing their Department of Health to temporarily suspend the portal.
  • Estonia stated a Tallinn-based hacker downloaded 286,000 ID photos from government database, exposing a vulnerability in a platform managed by their Information System Authority (RIA).
  • A widespread APT operation was discovered against users in Southeast Asia, believed to be spearheaded by Chinese entities. Researchers found a total of 100 victims in Myanmar and 1,400 in the Philippines, including many government entities.
  • The Japan 2020 Olympics was subject to data breach exposing the personal credentials of volunteers and ticket holders. The information included usernames, passwords, addresses, and bank account numbers.

The United States, the European Union, NATO and other world powers released joint statements condemning the Chinese government for a series of malicious cyber activities. They attributed responsibility to China for the Microsoft Exchange hack from early 2021 and the compromise of more than 100,000 servers worldwide.

In short, the more we move towards digitalisation and technology, the more vulnerable we become to cyber threats.

Technology is a double-edged sword, while it is a great asset and can provide us with new advanced methods of security, there are still those who misuse it and can pose a threat to our privacy. It is imperative for governments and businesses to invest in upgrading their cyber security and online privacy  combat cyber attacks. 

WEF:     CSIS:     Cyber Security Ventures:       Guardian:     Al Bawaba

You Might Also Read:

Minimising The Impact Of Ransomware:

 

« Stolen: Over $600 Million In Crypto Currencies
One Million Stolen Credit Cards Hit The Dark Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

GrammaTech

GrammaTech

GrammaTech is a leading developer of software-assurance tools and advanced cyber-security solutions.

JPCERT/CC

JPCERT/CC

JPCERT/CC is the first Computer Security Incident Response Team (CSIRT) established in Japan.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

Labris Networks

Labris Networks

Labris Networks specializes in DDoS mitigation, NG Firewall, Unified Threat Management, Centralized Management, Regulatory Compliances and SOC/CERT Services.

Intrasoft International

Intrasoft International

Intrasoft International is a leading European IT Solutions and Services Group offering a full range of IT services including Information Security.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

Excelsecu Data Technology

Excelsecu Data Technology

Excelsecu is a global solution provider of online identity authentication, widely applied in banks, government bodies and enterprises.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

Dataprovider.com

Dataprovider.com

Our Brand Protection Suite gives you the tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately noticeable.

ConnectWise

ConnectWise

The Unified ConnectWise Platform offers intelligent software and expert services to easily run your business, deliver your services, secure your clients, and build your staff.

Securd

Securd

Securd takes opportunities away from your cyber adversaries. Cloud-delivered zero-trust DNS firewall and web filtering protection keep your business network and remote employees safe.

Kaesim Cybersecurity

Kaesim Cybersecurity

Kaesim are a global team of cybersecurity experts protecting businesses since 2015. We stop bad people damaging your business, your data and your reputation.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.

AuthenticID

AuthenticID

Our mission at AuthenticID is to combat fraud worldwide and help businesses protect their enterprise and valuable data assets.

OmniIndex

OmniIndex

OmniIndex PostgresBC is the only commercial solution allowing you to keep your most sensitive and critical data encrypted while analyzing it. Structured and unstructured.