Cyber Crime Just Keeps On Growing

The persistent rise in cyber crime seems unstoppable and there have been many well-publicised large scale attacks in recent months. Online crime isn’t going away and cyber criminal activity is one of the biggest challenges that society will face in the next two decades. If cyber criminals continue operating at their current rate, then, by 2025, some researchers suggest that global cyber crime costs will reach $10.5 trillion by 2025

It is very difficult to catch cyber criminals and in a number of countries cyber crime is not an offence. Of the crime rate in the UK, 50% of it is cyber crime, but police reduction of this type of crime is very low at 0.1. This is because Police resources are not fully IT responsible and a lot of the crime is created overseas making it very difficult for the local police to engage and operate and its the same situation to many other countries' police operations.

Cyber criminals are using social engineering, phishing, identity theft, spam emails, malware, ransomware and whaling to compromise their targets. The global cost of cyber crime is estimated to reach $6 trillion by 2022, a massive increase from the 2015 estimate of $500 billion.Cyber crime costs include damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and reputational harm

LockFile is a new ransomware that has appeared in July 2021 following the discovery in April 2021 of the ProxyShell vulnerabilities in Microsoft Exchange servers. LockFile ransomware appears to exploit the ProxyShell vulnerabilities to breach targets with unpatched, on premises Microsoft Exchange servers, followed by a PetitPotam NTLM relay attack to seize control of the domain. 

According to researchers at Sophos this novel approach, which they call “intermittent encryption,” helps the ransomware to avoid triggering a red flag because the new encryption method looks statistically very similar to the unencrypted original. This is the first time that Sophos researchers have seen this approach used in ransomware. Indeed, cyber criminals are harnessing the latest emerging technology and are forever changing techniques in order to make their crimes more effective, faster and adaptable to current safety measures. This makes it very hard for investigators and cyber security teams to identify evidential artifacts and the methodology. This is demonstrated by the way malicious bots impersonate genuine users to unlock security systems.                                                  

From attacking individuals and demanding $100-$200/person a decade ago, cyber criminals in 2017 demonstrated that they could bring down entire organisations

Cyber criminals are always probing software and hardware for security vulnerabilities for as long as computers have existed. However, the discovery and exploitation of security holes used to be an exhaustive process, hackers had to patiently explore different parts of a system or application until they found an opportunity. 

Now, hackers can enlist the services of machine-learning AI bots to automate the process. The result has been a technology-powered increase in cyber crime. Nation states are now deeply involved and it has become far more impactful to attack corporate entities and governments.

With large industries being attacked, federal agencies and politicians are beginning to take a stand on cyber crime and there is a scramble to address the problem because ordinary people are being affected by this in much larger numbers than ever before. 

Emerging technologies, such as the Internet of Things (IoT), artificial intelligence (AI) and cloud computing, are now a part of our everyday lexicon. Such technologies may be a doorway to a more cost effective and efficient future for the business world.

These technologies can also provide avenues for cyber criminals to commit larger, more rewarding and potentially more sophisticated cyber crimes.

KPMG:   Cyber Security Ventures:   Sophos:   Herjevac Group:    Economic Times:   Acedemia:   Evalian:

You Might Also Read: 

Cyber Crime In 2021: How Hackers Are Evolving:

 

« Medical Devices Need Better Cyber Security
Financial Services Are Taking Threat Intelligence Seriously »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Custodio Technologies

Custodio Technologies

Custodio Technologies was established as a Singaporean R&D Centre of Israel Aerospace Industries (IAI) in order to spearhead R&D activities in the field of cyber early warning.

Altron

Altron

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers.

42Gears

42Gears

42Gears is a leading Unified Endpoint Management provider. Secure, monitor and manage tablets, phones, desktops and wearables.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

Accedian

Accedian

Accedian is a leader in performance analytics and end user experience solutions, dedicated to providing our customers with the ability to assure their digital infrastructure.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.

Crayon

Crayon

Crayon is a customer-centric innovation and IT services company. We provide guidance on the best solutions for our clients’ business needs and budget with software, cloud, AI and big data.

Telesystem

Telesystem

Telesystem empowers businesses across the USA with a range of innovative network, communication and collaboration solutions.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

GlassHouse Technology

GlassHouse Technology

GlassHouse supports customers in their digitalization journey with our deep technical expertise in Managed Cloud and Security Services, SAP Infrastructure Service and Business Continuity Services.

Tamnoon

Tamnoon

Tamnoon is the Managed Cloud Detection and Response platform that helps you turn CNAPP and CSPM alerts into action and fortify your cloud security posture.

Academia the Technology Group

Academia the Technology Group

Academia specialise in the supply of software, IT hardware, training and service solutions to the public sectors, business and pro media markets.

National Critical Information Infrastructure Protection Centre (NCIIPC) - India

National Critical Information Infrastructure Protection Centre (NCIIPC) - India

NCIIPC's mission is to protect the Critical Information Infrastructure of India, from unauthorized access, modification, use, disclosure, disruption, incapacitation or destruction.

Defend

Defend

DEFEND are 100% focused on providing managed cybersecurity solutions and services that make a real difference to the cyber resilience of your organisation.

DeepSurface Security

DeepSurface Security

DeepSurface is the first risk-based vulnerability management platform that allows cybersecurity teams to automate the process of analyzing and prioritizing vulnerabilities.