Cyber Crime Just Keeps On Growing

The persistent rise in cyber crime seems unstoppable and there have been many well-publicised large scale attacks in recent months. Online crime isn’t going away and cyber criminal activity is one of the biggest challenges that society will face in the next two decades. If cyber criminals continue operating at their current rate, then, by 2025, some researchers suggest that global cyber crime costs will reach $10.5 trillion by 2025

It is very difficult to catch cyber criminals and in a number of countries cyber crime is not an offence. Of the crime rate in the UK, 50% of it is cyber crime, but police reduction of this type of crime is very low at 0.1. This is because Police resources are not fully IT responsible and a lot of the crime is created overseas making it very difficult for the local police to engage and operate and its the same situation to many other countries' police operations.

Cyber criminals are using social engineering, phishing, identity theft, spam emails, malware, ransomware and whaling to compromise their targets. The global cost of cyber crime is estimated to reach $6 trillion by 2022, a massive increase from the 2015 estimate of $500 billion.Cyber crime costs include damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and reputational harm

LockFile is a new ransomware that has appeared in July 2021 following the discovery in April 2021 of the ProxyShell vulnerabilities in Microsoft Exchange servers. LockFile ransomware appears to exploit the ProxyShell vulnerabilities to breach targets with unpatched, on premises Microsoft Exchange servers, followed by a PetitPotam NTLM relay attack to seize control of the domain. 

According to researchers at Sophos this novel approach, which they call “intermittent encryption,” helps the ransomware to avoid triggering a red flag because the new encryption method looks statistically very similar to the unencrypted original. This is the first time that Sophos researchers have seen this approach used in ransomware. Indeed, cyber criminals are harnessing the latest emerging technology and are forever changing techniques in order to make their crimes more effective, faster and adaptable to current safety measures. This makes it very hard for investigators and cyber security teams to identify evidential artifacts and the methodology. This is demonstrated by the way malicious bots impersonate genuine users to unlock security systems.                                                  

From attacking individuals and demanding $100-$200/person a decade ago, cyber criminals in 2017 demonstrated that they could bring down entire organisations

Cyber criminals are always probing software and hardware for security vulnerabilities for as long as computers have existed. However, the discovery and exploitation of security holes used to be an exhaustive process, hackers had to patiently explore different parts of a system or application until they found an opportunity. 

Now, hackers can enlist the services of machine-learning AI bots to automate the process. The result has been a technology-powered increase in cyber crime. Nation states are now deeply involved and it has become far more impactful to attack corporate entities and governments.

With large industries being attacked, federal agencies and politicians are beginning to take a stand on cyber crime and there is a scramble to address the problem because ordinary people are being affected by this in much larger numbers than ever before. 

Emerging technologies, such as the Internet of Things (IoT), artificial intelligence (AI) and cloud computing, are now a part of our everyday lexicon. Such technologies may be a doorway to a more cost effective and efficient future for the business world.

These technologies can also provide avenues for cyber criminals to commit larger, more rewarding and potentially more sophisticated cyber crimes.

KPMG:   Cyber Security Ventures:   Sophos:   Herjevac Group:    Economic Times:   Acedemia:   Evalian:

You Might Also Read: 

Cyber Crime In 2021: How Hackers Are Evolving:

 

« Medical Devices Need Better Cyber Security
Financial Services Are Taking Threat Intelligence Seriously »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

Information Security Forum (ISF)

Information Security Forum (ISF)

The ISF is a leading authority on information security and risk management.

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN) is a not for profit group of professionals in the field of Information Security in Nigeria and Diaspora.

Hague Security Delta (HSD)

Hague Security Delta (HSD)

The Hague Security Delta Campus is home of the leading cyber security cluster in Europe with an Innovation Centre, labs and training facilities.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

Appsian Security

Appsian Security

Appsian provides powerful solutions that help organizations take control of their business critical data and financial transactions.

Cyware

Cyware

Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

Responsive Technology Partners

Responsive Technology Partners

Responsive Technology Partners provides superior IT support services including cybersecurity and compliance, telephony, cloud services, cabling, access control, and camera systems.

Zilla Security

Zilla Security

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation.

Protexxa

Protexxa

Protexxa is a B2B SaaS cybersecurity platform that leverages Artificial Intelligence to rapidly identify, evaluate, predict, and resolve cyber issues for employees.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.

EmberOT

EmberOT

EmberOT is at the forefront of operational technology (OT) security, offering cutting-edge solutions designed to protect critical infrastructure within energy, utilities, and manufacturing sectors.

Health Sector Cybersecurity Coordination Center (HC3)

Health Sector Cybersecurity Coordination Center (HC3)

HC3 was created by the US Department of Health and Human Services to aid in the protection of vital, controlled, healthcare-related information.