Cyber Crime Just Keeps On Growing

The persistent rise in cyber crime seems unstoppable and there have been many well-publicised large scale attacks in recent months. Online crime isn’t going away and cyber criminal activity is one of the biggest challenges that society will face in the next two decades. If cyber criminals continue operating at their current rate, then, by 2025, some researchers suggest that global cyber crime costs will reach $10.5 trillion by 2025

It is very difficult to catch cyber criminals and in a number of countries cyber crime is not an offence. Of the crime rate in the UK, 50% of it is cyber crime, but police reduction of this type of crime is very low at 0.1. This is because Police resources are not fully IT responsible and a lot of the crime is created overseas making it very difficult for the local police to engage and operate and its the same situation to many other countries' police operations.

Cyber criminals are using social engineering, phishing, identity theft, spam emails, malware, ransomware and whaling to compromise their targets. The global cost of cyber crime is estimated to reach $6 trillion by 2022, a massive increase from the 2015 estimate of $500 billion.Cyber crime costs include damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and reputational harm

LockFile is a new ransomware that has appeared in July 2021 following the discovery in April 2021 of the ProxyShell vulnerabilities in Microsoft Exchange servers. LockFile ransomware appears to exploit the ProxyShell vulnerabilities to breach targets with unpatched, on premises Microsoft Exchange servers, followed by a PetitPotam NTLM relay attack to seize control of the domain. 

According to researchers at Sophos this novel approach, which they call “intermittent encryption,” helps the ransomware to avoid triggering a red flag because the new encryption method looks statistically very similar to the unencrypted original. This is the first time that Sophos researchers have seen this approach used in ransomware. Indeed, cyber criminals are harnessing the latest emerging technology and are forever changing techniques in order to make their crimes more effective, faster and adaptable to current safety measures. This makes it very hard for investigators and cyber security teams to identify evidential artifacts and the methodology. This is demonstrated by the way malicious bots impersonate genuine users to unlock security systems.                                                  

From attacking individuals and demanding $100-$200/person a decade ago, cyber criminals in 2017 demonstrated that they could bring down entire organisations

Cyber criminals are always probing software and hardware for security vulnerabilities for as long as computers have existed. However, the discovery and exploitation of security holes used to be an exhaustive process, hackers had to patiently explore different parts of a system or application until they found an opportunity. 

Now, hackers can enlist the services of machine-learning AI bots to automate the process. The result has been a technology-powered increase in cyber crime. Nation states are now deeply involved and it has become far more impactful to attack corporate entities and governments.

With large industries being attacked, federal agencies and politicians are beginning to take a stand on cyber crime and there is a scramble to address the problem because ordinary people are being affected by this in much larger numbers than ever before. 

Emerging technologies, such as the Internet of Things (IoT), artificial intelligence (AI) and cloud computing, are now a part of our everyday lexicon. Such technologies may be a doorway to a more cost effective and efficient future for the business world.

These technologies can also provide avenues for cyber criminals to commit larger, more rewarding and potentially more sophisticated cyber crimes.

KPMG:   Cyber Security Ventures:   Sophos:   Herjevac Group:    Economic Times:   Acedemia:   Evalian:

You Might Also Read: 

Cyber Crime In 2021: How Hackers Are Evolving:

 

« Medical Devices Need Better Cyber Security
Financial Services Are Taking Threat Intelligence Seriously »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

RiskLens

RiskLens

RiskLens is a software company that specializes in the quantification of cybersecurity risk.

Centre for Cyber Security (CFCS) - Denmark

Centre for Cyber Security (CFCS) - Denmark

The Centre for Cyber Security is the Danish national IT security authority, Network Security Service and Centre for Excellence within cyber security.

PETRAS IoT Hub

PETRAS IoT Hub

PETRAS is a consortium of 12 research institutions and the world’s largest socio-technical research centre focused on the future implementation of the IoT.

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

PeopleSec

PeopleSec

PeopleSec specializes in the human element of cybersecurity with a comprehensive set of services designed to maximize your security by educating your workforce as a whole.

CyberSec Hub - The Kosciuszko Institute

CyberSec Hub - The Kosciuszko Institute

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Blue Cedar

Blue Cedar

Blue Cedar's mobile app security integration platform secures and accelerates mobile app deployment for enterprises and government organizations around the world.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

Prelude

Prelude

Prelude offer the first autonomous platform built to attack, defend and train critical assets through continuous red-teaming.

Cyberplc

Cyberplc

Cyberplc is a global cybersecurity consulting firm providing services to government, the public sector and enterprises.

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.

RAH Infotech

RAH Infotech

RAH Infotech is India’s leading value added distributor and solutions provider in the Network and Security domain. We are specialists in Enterprise and App Security and Application Delivery.

Sirar by STC

Sirar by STC

Sirar is an advanced technology and cybersecurity company established by STC, the MENA region’s ICT and digital services provider.