Cyber Crime Just Keeps On Growing

The persistent rise in cyber crime seems unstoppable and there have been many well-publicised large scale attacks in recent months. Online crime isn’t going away and cyber criminal activity is one of the biggest challenges that society will face in the next two decades. If cyber criminals continue operating at their current rate, then, by 2025, some researchers suggest that global cyber crime costs will reach $10.5 trillion by 2025

It is very difficult to catch cyber criminals and in a number of countries cyber crime is not an offence. Of the crime rate in the UK, 50% of it is cyber crime, but police reduction of this type of crime is very low at 0.1. This is because Police resources are not fully IT responsible and a lot of the crime is created overseas making it very difficult for the local police to engage and operate and its the same situation to many other countries' police operations.

Cyber criminals are using social engineering, phishing, identity theft, spam emails, malware, ransomware and whaling to compromise their targets. The global cost of cyber crime is estimated to reach $6 trillion by 2022, a massive increase from the 2015 estimate of $500 billion.Cyber crime costs include damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and reputational harm

LockFile is a new ransomware that has appeared in July 2021 following the discovery in April 2021 of the ProxyShell vulnerabilities in Microsoft Exchange servers. LockFile ransomware appears to exploit the ProxyShell vulnerabilities to breach targets with unpatched, on premises Microsoft Exchange servers, followed by a PetitPotam NTLM relay attack to seize control of the domain. 

According to researchers at Sophos this novel approach, which they call “intermittent encryption,” helps the ransomware to avoid triggering a red flag because the new encryption method looks statistically very similar to the unencrypted original. This is the first time that Sophos researchers have seen this approach used in ransomware. Indeed, cyber criminals are harnessing the latest emerging technology and are forever changing techniques in order to make their crimes more effective, faster and adaptable to current safety measures. This makes it very hard for investigators and cyber security teams to identify evidential artifacts and the methodology. This is demonstrated by the way malicious bots impersonate genuine users to unlock security systems.                                                  

From attacking individuals and demanding $100-$200/person a decade ago, cyber criminals in 2017 demonstrated that they could bring down entire organisations

Cyber criminals are always probing software and hardware for security vulnerabilities for as long as computers have existed. However, the discovery and exploitation of security holes used to be an exhaustive process, hackers had to patiently explore different parts of a system or application until they found an opportunity. 

Now, hackers can enlist the services of machine-learning AI bots to automate the process. The result has been a technology-powered increase in cyber crime. Nation states are now deeply involved and it has become far more impactful to attack corporate entities and governments.

With large industries being attacked, federal agencies and politicians are beginning to take a stand on cyber crime and there is a scramble to address the problem because ordinary people are being affected by this in much larger numbers than ever before. 

Emerging technologies, such as the Internet of Things (IoT), artificial intelligence (AI) and cloud computing, are now a part of our everyday lexicon. Such technologies may be a doorway to a more cost effective and efficient future for the business world.

These technologies can also provide avenues for cyber criminals to commit larger, more rewarding and potentially more sophisticated cyber crimes.

KPMG:   Cyber Security Ventures:   Sophos:   Herjevac Group:    Economic Times:   Acedemia:   Evalian:

You Might Also Read: 

Cyber Crime In 2021: How Hackers Are Evolving:

 

« Medical Devices Need Better Cyber Security
Financial Services Are Taking Threat Intelligence Seriously »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Lacuna Talent

Lacuna Talent

Lacuna Talent delivers the combined power of Via Resource, the international Cyber Security recruiter, and Lacuna Talent, the Specialist AI/Data recruiter.

CryptTalk

CryptTalk

CryptTalk is an easy-to-use secure communication service.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

Total Defense

Total Defense

Total Defense solutions include anti-malware, anti-virus, intrusion prevention & mobile security.

Safe Security

Safe Security

Safe Security (formerly Lucideus) provides Cyber risk assessment services and platforms to multiple Fortune 500 companies and governments across the globe.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

CyberClan

CyberClan

CyberClan’s carefully selected team of experts is capable of solving complex cyber security challenges – keeping your data secure and your businesses running as usual.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

Velta Technology

Velta Technology

Velta Technology provide digital safety and cybersecurity solutions for the industrial space.

Stefanini Group

Stefanini Group

Stefanini is a global IT services company providing a broad range of solutions for digital transformation including automation, cloud, IoT and cybersecurity.

IT-Seal

IT-Seal

IT-Seal GmbH specializes in sustainable security culture and awareness training.

Sec-Ops

Sec-Ops

Sec-Ops is a forward thinking cyber security company, formed by a group of security enthusiasts with years of experience and backgrounds in the technology and the government industries.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

Logiq Consulting

Logiq Consulting

Logiq Consulting provide a full range of Cyber Security, Information Assurance and System Engineering services.

Dispel

Dispel

Dispel makes the fastest secure remote access for industrial networks. Built by operators for operators: a zero trust engine for your entire OT, IoT, and xIoT stack.