Cyber Criminals Love The UK

The UK is a prime destination for hackers to spend and launder dirty money, according to Charlie McMurdie, the former head of the Met Police’s cybercrime unit.

In a speech at Datto‘s cyber security summit for MSPs this week, McMurdie said London is particularly attractive for cyber criminals seeking to cash out the proceeds of their crimes.

“If you’re making millions from cyber-crime you don’t want to be in the back of beyond, where you can’t spend your lovely cash and bitcoins,” she said. “You want to be in the UK where you can go down to Harrods and Knightsbridge.”

McMurdie, who left the Met in 2013, said the speed at which British banks transfer money is another reason cyber criminals gravitate towards the UK. 

“If you’re making loads of money, you need to bounce it around the banks, to launder that cash,” she said. “In the UK, it doesn’t take two days to move money from A to B.”

“The only bad side for cyber-criminals is our banks are good at recognising these transactions and they’re also pretty hot at working with law enforcement,” she added. 

In recent years, the UK has been named the top target for cyber criminals in Europe. While McMurdie said Brits are a prime target for hackers, citing affluence and the prevalence of tech, she cast doubt on the claim.

“We’re more cited on what’s actually happening, how it’s happening, the scale of the problem, perhaps than our European and international counterparts,” McMurdie suggested. “Perhaps our other partners are suffering the same sort of issues, but pushing them under the table, not sharing that information and not reporting it as much.”

Research conducted by a criminologist at Surrey University earlier this year revealed that cyber-crime now generates $1.5tn (£1.1tn) annually. By the same estimates, if cyber-crime was a country, it would have the 13th highest GDP in the world.

New Statesman

You Might Also Read: 

Cybercrime Costs Londoners £26m Every Month:

UK Police Ignore Most Cyber Crime:

« AI Is Re-Inventing IT
Cybrary and Cybersecurity Collaborative Form New Strategic Partnership »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

Intertek Group

Intertek Group

Intertek Group provides Assurance, Testing, Inspection and Certification services. Activities include cybersecurity testing and certification.

Finnish Accreditation Service (FINAS)

Finnish Accreditation Service (FINAS)

FINAS is the national accreditation body for Finland. The directory of members provides details of organisations offering certification services for ISO 27001.

Hut Six Security

Hut Six Security

Train, test and track your Information Security culture through information security awareness training and customised phishing simulation campaigns.

Corsha

Corsha

Corsha is on a mission to simplify API security and allow enterprises to embrace modernization, complex deployments, and hybrid environments with confidence.

Aries Security

Aries Security

Aries Security provides a premiere cyber training range and skills assessment suite and develops content for all levels of ability.

Deepnet Security

Deepnet Security

Deepnet Security is a leading security software developer and hardware provider in Multi-Factor Authentication (MFA), Single Sign-On (SSO) and Identity & Access Management (IAM).

BATM Advanced Communications

BATM Advanced Communications

BATM Advanced Communications is a leading provider of real-time technologies for networking and cyber security solutions.

Wadilona Cyber Securities

Wadilona Cyber Securities

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.

CyBourn

CyBourn

Cybourn's diverse offerings include engineering, analysis, product development, assessment, and advisory services in the cybersecurity space.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.

Silence Laboratories

Silence Laboratories

Silence Laboratories is a cybersecurity company that focuses on the fusion of cryptography, sensing, and design to support a seamless authentication experience.

Ebryx

Ebryx

At Ebryx, we are at the forefront of cybersecurity innovation, leveraging over a decade of expertise to protect and empower organizations worldwide.

Nexio

Nexio

We are Nexio. We help organisations take every NEXT step toward their accelerated digital transformation.

Vortacity Cyber

Vortacity Cyber

Vortacity is a boutique cybersecurity provider specializing in associations, nonprofits, and mission-based organizations.