Cyber Criminals Love The UK

The UK is a prime destination for hackers to spend and launder dirty money, according to Charlie McMurdie, the former head of the Met Police’s cybercrime unit.

In a speech at Datto‘s cyber security summit for MSPs this week, McMurdie said London is particularly attractive for cyber criminals seeking to cash out the proceeds of their crimes.

“If you’re making millions from cyber-crime you don’t want to be in the back of beyond, where you can’t spend your lovely cash and bitcoins,” she said. “You want to be in the UK where you can go down to Harrods and Knightsbridge.”

McMurdie, who left the Met in 2013, said the speed at which British banks transfer money is another reason cyber criminals gravitate towards the UK. 

“If you’re making loads of money, you need to bounce it around the banks, to launder that cash,” she said. “In the UK, it doesn’t take two days to move money from A to B.”

“The only bad side for cyber-criminals is our banks are good at recognising these transactions and they’re also pretty hot at working with law enforcement,” she added. 

In recent years, the UK has been named the top target for cyber criminals in Europe. While McMurdie said Brits are a prime target for hackers, citing affluence and the prevalence of tech, she cast doubt on the claim.

“We’re more cited on what’s actually happening, how it’s happening, the scale of the problem, perhaps than our European and international counterparts,” McMurdie suggested. “Perhaps our other partners are suffering the same sort of issues, but pushing them under the table, not sharing that information and not reporting it as much.”

Research conducted by a criminologist at Surrey University earlier this year revealed that cyber-crime now generates $1.5tn (£1.1tn) annually. By the same estimates, if cyber-crime was a country, it would have the 13th highest GDP in the world.

New Statesman

You Might Also Read: 

Cybercrime Costs Londoners £26m Every Month:

UK Police Ignore Most Cyber Crime:

« AI Is Re-Inventing IT
Cybrary and Cybersecurity Collaborative Form New Strategic Partnership »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MaxMind

MaxMind

MaxMind is an industry-leading provider of IP intelligence and online fraud detection tools.

International Computer Science Institute (ICSI)

International Computer Science Institute (ICSI)

ICSI is a leading independent, nonprofit center for research in computer science. Research areas include network security and privacy.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

Jamcracker

Jamcracker

Jamcracker is a cloud services management and cloud governance solutions company, with more than a decade of experience providing industry leading software and services.

achelos

achelos

achelos is an independent software development company providing innovative technical solutions for micro-processor chips / security chips and embedded systems in security-critical application fields.

Cygilant

Cygilant

Cygilant is a SOC2 certified service provider that combines MSSP and Incident Detection and Response (IDR) capabilities managed by global SOCs staffed with trained security engineers.

authUSB

authUSB

authUSB Safe Door is a tool that provides secure access to the content of USB devices that circulate in organizations.

Cryptshare

Cryptshare

Cryptshare is a communication solution that enables you to share e-mails and files of any size securely.

Fiserv

Fiserv

Fiserv offers a wide array of Risk & Compliance solutions to help you prevent losses from fraud and ensure adherence to regulatory and compliance mandates.

CYDES

CYDES

CYDES is the first event in Malaysia to showcase advanced solutions and technologies to address cyber defence and cyber security challenges for the public and private sectors.

ThreatReady Resources

ThreatReady Resources

ThreatReady reduces an organization’s risk by delivering cyber security awareness training based on the latest, state-of-the-art learning science to effectively drive long-term cyber-safe behavior.

Serbus

Serbus

Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools.

ExtraHop

ExtraHop

ExtraHop's dynamic cyber defense platform uses cloud-scale AI to help enterprises detect and respond to advanced threats - before they compromise your business.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

Piiano

Piiano

Piiano offers developer-friendly privacy and security products. Reduce risk and protect your data by using our specialized security and privacy SaaS tools.

Screwloose IT

Screwloose IT

Screwloose IT are a national provider of information technology services. We specialise in managed IT, cloud services, cyber security, website design and digital marketing for businesses of all sizes.