Cyber Criminals Are The New Mafia

The new generation of cyber-criminals resemble traditional Mafia organisations, not just in their professional coordination, but also in their willingness to intimidate and paralyse victims.

A new report from Malwarebytes The New Mafia: Gangs and Vigilantes determines that there are four distinct groups of cyber-criminals: traditional gangs, state-sponsored attackers, ideological hackers and hackers-for-hire. 

The report said that the entrance of new participants has transformed cybercrime from isolated and individualised acts into pervasive, savage practices run by distinct groups of individuals. 

“Similar to the criminal gangs that dominated major cities like New York in the 1930s, these new participants have largely been attracted by the potential for riches and power. Likewise, these newer perpetrators of cybercrime have increasingly resorted to fear, intimidation and a feeling of helplessness to achieve their aims. 

“Similar to the mobsters who would muscle their way into a business and make demands, cyber-criminals are taking command of computers and sensitive personal information to threaten victims.” 
Research from Malwarebytes determined that the number of attacks recorded in the first 10 months of 2017 surpassed the total for all of 2016.

“The average number of monthly attacks has also increased by 23% in 2017,” the report said. “2016 itself saw a spectacular rise in business-targeted cybercrime, with a 96% increase in attacks compared to the previous year.”
The report calls for businesses and consumers to fight back by acting as ‘vigilantes’ through greater collective awareness, knowledge sharing and proactive defenses. This includes a shift from shaming businesses who have been hacked and instead engaging with them, working together to fix the problem.

Speaking to Infosecurity, Marcin Kleczynski, CEO of Malwarebytes said that old gang-style organised crime has evolved into cybercrime, in a style of “old versus new mafia through technology advances.” 

He added: “The game has shifted to corporate espionage, and it is undetectable at this point as you don’t need to manipulate the blueprints, you’re just copying them without leaving a trace behind. The idea that Boeing puts together a plan for a new plane and you can skip that stage and go straight to manufacturing.” 

Kleczynski said that the most damaging cyber-attacks to businesses are the ones that go undetected for long stretches of time. “In spite of high-profile occurrences over the last year, this report shows that many business executives may still have some knowledge gaps to fill. CEOs will soon have little choice but to elevate cybercrime from a technology issue to a business-critical consideration.”

Infosecurity Magazine

You Might Also Read:

Cisco & INTERPOL: Working Against Cybercrime:

Cybercrime In The EU -  Where Are You Safe?:

Cybercrime Is A Boardroom Issue:
 

« MH370 Loss Could Have Been A Remote Skyjacking
Undersea Telecoms Cables Are Interception Targets »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

World Privacy Forum (WPF)

World Privacy Forum (WPF)

The World Privacy Forum is a non-profit public interest research group that focuses on privacy and technology issues.

Site24x7

Site24x7

Site24x7 is an AI-powered observability platform for DevOps and IT operations.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

Khipu Networks

Khipu Networks

Khipu Networks is an award winning Cyber Security Company delivering a wide range of network, wireless and security solutions, technologies and services across multiple sectors.

spiderSilk

spiderSilk

spiderSilk is a Dubai-based cybersecurity firm, specializing in simulating the most advanced cyber offenses on your technology so you can build your best security defenses.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

Ridge Canada Cyber Solutions

Ridge Canada Cyber Solutions

Ridge Canada helps insurance brokers and insurance buyers understand, evaluate, and secure cyber coverage that is tailored to their business.

Intracom Telecom

Intracom Telecom

Intracom Telecom is a global telecommunication systems & solutions vendor offering a complete range of professional services and solutions including Information Security.

KT Secure

KT Secure

KTSecure’s mission is to provide proven and productive cyber security solutions and managed services, backed by our highly qualified and passionate team of experts.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startups Association is an umbrella organization that aims to promote, support and represent the interests of tech startups in Romania.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

Sitehop

Sitehop

Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for networks.

NetScout Systems

NetScout Systems

NetScout assures digital business services against disruptions in availability, performance, and security.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

Cyberlocke

Cyberlocke

Cyberlocke is dedicated to finding inventive solutions to meet the distinct IT obstacles of each organization we support.