FBI’s Cybercrime Report 2017

The FBI’s Internal Crime Complaint Center (IC3) has just released its annual Internet Crime Report, where it outlines the most recent attack vectors of internet scammers and fraudsters, as well as cyber-criminal trends over the past year.

The Report is a comprehensive yet short and to-the-point document in which people can read the IC3’s findings and recommendations. The FBI division notes which groups of people are more likely to fall for these schemes, but the Report is aimed at everyone regardless of age or occupation.

Cyber-security is a serious issue and crimes of this nature have become increasingly more targeted. This year, the FBI started breaking down the report by states as well to show each of the 50 states their statistics and how to combat potential threats.

2017 IC3 Internet Crime Report: Demographic Highlights
The Internal Crime Complaint Center of the FBI receives 280,000 complaints per year in average, and since its inception in the year 2000, it has received almost 4 million reports. This year’s investigations show that the trend continued during 2016 but was a little higher, totaling 266,685 victims of Internet crime last year alone. The IC3 separates this population into five age groups to show which has a higher propensity to become a target.

People under 20 were the least affected group, amounting to just over 10,000 victims and nearly $7 million taken from them. Those between 20 and 29, however, saw ten times as many losses at $68 million and 46,300 people scammed approximately.
The group of victims ranging from 30 to 39 years old was the second most affected demographic, with almost 54,500 victims but just $190 million in losses. In contrast, 55,000 people over 60 fell for Internet scams and handed over close to $340 million.

A marked trend this year was the fact that losses increased with age. The older the group, the more money they got scammed out of them, as shown by the $224 and $298 million that those in their 40s and 50s got stolen respectively.

IC3 report: Trends and Recommendations
In the US, the most vulnerable states were California, New York, and Florida; while Canada topped the list of foreign victims surveyed at 3,722. India, the UK, Australia, and France also made the top 5.
The Internet crimes most committed had non-payment/non-delivery instances in the first place, with more than 81,000 reported incidents in which people were not paid for their services or didn’t receive the product they ordered.
Personal data breaches came second with close to 30,000 incidences, followed by 25,000 accounts of Nigerian 419 scams. These fraudulent requests rely on people wiring money to third parties on behalf of others asking for help because they allegedly cannot do it themselves.

Phishing cases were almost 20,000 in 2016, and extortion, identity theft, and credit card fraud all ranked in the high 10,000s. The most profitable crimes, however, business email compromise (BEC) attacks, making cyber criminals more than $360 million last year.

Confidence fraud schemes placed second on the list for victims’ loss, with close to $220 million spent by people in fake online relationships. Fraudulent investments, corporate data breaches, and cases of identity theft were also highly profitable. 

As most cyber security firms would advise, the IC3 recommends users to simply keep their operating systems and antiviruses up to date as a preemptive measure. The government agency also suggested common sense in social media, stronger passwords, and tighter authentication methods.

The USB Port

You Might Also Read:

Intelligence-Led Policing Gets Automated:

UK Fraud Hotspots Revealed:

Six Seconds To Hack A Credit Card:

 

« GDPR Guidance For May 2018
Breaking Down Hotel Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

CORDIS

CORDIS

CORDIS is the European Commission's primary public repository and portal to disseminate information on all EU-funded research projects and their results.

baramundi software

baramundi software

baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

Wooxo

Wooxo

Wooxo provides business security and continuity solutions to protect business data for organisation of all sizes.

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

Network Integrity Systems

Network Integrity Systems

Network Integrity Systems is a leader in network infrastructure security and offers solutions specifically developed for Government and Private Enterprise.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

AU10TIX

AU10TIX

AU10TIX’s smart forensic-level ID authentication technology links physical and digital identities, meets compliance mandates, and ensures your customers know their trust and safety come first.

Cyber Security Africa

Cyber Security Africa

Cyber Security Africa is a full-service Information Security Consulting firm offering a comprehensive range of Services and Products to help organizations protect their valuable assets.

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Abertay cyberQuarter

Abertay cyberQuarter

The Abertay cyberQuarter is a cybersecurity research and development centre housed within Abertay University.

Tidal Cyber

Tidal Cyber

We formed Tidal for one simple reason—we believe that defenders need and deserve tools and services that make achieving the benefits of threat-informed defense practical and sustainable.

ResilientX

ResilientX

ResilientX is an All-In-One Security Testing Platform designed to help MSPs and SMBs to perform their security testing and assessments without having to outsource IT.

Thunder Shield Security

Thunder Shield Security

Thunder Shield is a professional cyber security service provider of penetration test, source code review and security assessment services.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.