The Biggest International Cybercime Offenders

Cyber criminals at the top level are as technologically sophisticated as the most advanced IT companies and like them, have moved quickly to adopt cloud computing, artificial intelligence, Software-as-a-Service and encryption. 

Cybercrime remains far too easy, since many technology users fail to take the most basic protective measures, and many technology products lack adequate defenses. 

Cybercrime also leads in the risk-to-payoff ratio. It is a low risk crime that provides high payoffs. A smart cyber-criminal can make hundreds of thousands, even millions of dollars with almost no chance of arrest or jail. 

Criminal activity on the internet is much broader than cybercrime as essentially all elements of human criminal activity have moved into cyberspace. A senior British official reported, for example, that half of all reported crime in the UK is cyber-related. 

Over the last 20 years, we have seen cybercrime become professionalised and sophisticated. Cybercrime is a business with flourishing markets offering a range of tools and services for the criminally inclined. 

The most important area for the cost of cybercrime is in the theft of intellectual property and business confidential information. Internet connectivity has opened a vast terrain for cybercrime, and IP theft goes well beyond traditional areas of interest to governments, such as military technologies. One way to measure the cost of intellectual property theft is to look for competing products that take market share from the rightful owners. If hackers steal intellectual property, such as product designs, from a small or medium-size enterprise, it can be a fatal experience. 

For big companies, it can be an unexpected source of revenue lost as competing products enter the market. The theft of intellectual property accounts for at least a quarter of the cost of cybercrime and, when it involves military technology, creates risks to national security as well. 

These losses can often be invisible to the victim. They still have access to the IP that has been copied by the criminals and may attribute a decline in revenue to growing competition rather than theft. As much as $600 Billion is lost annually to cyber-crime as attackers are becoming increasingly sophisticated in their approach, adopting new technologies and leveraging black markets and digital currencies. 

A few countries, however, stand out as the most active sources of attacks in cyberspace. 
According to a Report produced by the Center for Strategic and International Studies (CSIS), a think tank based in Washington, 2018 was an active year for cyberattacks, with more than 100 significant incidents occurring in the past year. 

Looking at publicly available data on cyber-espionage and warfare but excluding cybercrime, the CSIS study reveals that China and Russia have been the largest source of attacks in cyberspace since 2006. In December of 2018 alone, four major incidents were reported involving China, while three involved Russia.

  • From 2006 to 2018, China was involved in 108 cyber incidents with losses of more than $1 million each, compromising communications across Europe, conducting cyber-espionage spying on 12 countries and stealing information from hundreds of millions of customers of a US hotel chain, according to the CSIS report. 

The CSIS report examined data on China, North Korea, Iran, India, Russia, the UK, the US, Germany, Australia, Japan, South Korea, Ukraine, Israel and France, with the rest of the world listed as a separate category. 

The study named the rest of the world as the third-worst offender, with 67 incidents. Next in the ranking came Iran with 44 incidents, and North Korea with 38. India was listed as guilty of 16 important cyber incidents from 2006 to 2018, while the US was accused of nine. 

Just two countries were identified as having not been the source of cyber-attacks in the past 12 years: Japan and Australia.
"Cyber-attacks are a global-phenomena, and it's only growing." says Kurt Baumgartner, principal security researcher in the Global Research and Analysis Team at Kaspersky Lab. 

"There are hot spots in the world that both source cyber activity and attract that activity, and (this) is only growing to the point that more and more nations are budgeting offensive cyber-security operations."

The CSIS report found the "rest of world" category was the victim of no fewer than 165 incidents from 2006 to 2018, while US government agencies, defense and tech companies, and other entities were the target of 117 cyberattacks with losses of more than $1 million each. There have been 35 major cyber incidents targeting India and 34 targeting South Korea. China was attacked 25 times in major cyber incidents from 2006 to 2018, according to the report, including one involving an Indian group hacking Chinese government agencies and research institutions. 

The United Kingdom also reported 25 important cyberattacks, including one reported in May 2018 that had targeted its electric utility networks since 2017. In Israel, 24 important cyberattacks have occurred since 2006, while Ukraine saw 23. 
Russia was the victim 16 major cyberattacks in the past 12 years, the report said, with that figure including an attack by a state-sponsored Middle Eastern hacking group that targeted a Russian oil company with operations in Pakistan, Russia, Saudi Arabia, Turkey and North America.

Experts warn that regardless of the type, cyberattacks come at a great cost economically and in public regard. Organisations that expose users to such attacks are more likely to lose their customer's trust, while cyber-crimes may also deter those interested in investing in new technologies. 

"Over the past decade we've seen all sort of cybersecurity challenges and issues and they range anywhere from massive financial crime, sometimes performed on behalf of groups that are known to be sponsored and associated with state-owned groups, to events that affect people's daily lives," says Baumgartner. 

"It's a huge problem when money is just flushing around because of cybersecurity issues." 

USNews:          Mcafee:

You Might Also Read:

Australian Defence Chief Issues Cybercrime Warning:

Cyber Criminals Are Aiming At Business:

 

« Metro Bank Hacked
Please Login Or Sign Up »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

Protection Group International (PGI)

Protection Group International (PGI)

PGI helps organisations and governments to manage digital risk. From cyber security services to business intelligence, we help reduce the risks to your finances, reputation, assets and people.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

Ethyca

Ethyca

Ethyca builds automated data privacy infrastructure and tools for developers and privacy teams to easily build products that comply with GDPR, CCPA Privacy Regulations.

Risk Strategies

Risk Strategies

Risk Strategies is a leading specialty risk management consultancy and insurance broker offering smarter, practical approaches to risk mitigation including Cyber Liability insurance.

Hub71

Hub71

Hub71 is a world-class tech ecosystem opening doors to global opportunities from an optimal business environment for entrepreneurial-minded innovators.

Encova Insurance

Encova Insurance

Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data.

Jit

Jit

Jit empowers developers to own security for the product they are building from day zero.

Visory

Visory

Great businesses depend on great technology. We make sure our clients go to market with enterprise-level technology and world-class security for their data and infrastructure.

Zerify

Zerify

Zerify offers the industry’s only video conferencing platform built with a zero-trust architecture to keep your meetings secure, private and business compliant.

StrongBox.Academy

StrongBox.Academy

StrongBox.Academy provides cybersecurity training courses that are tailored to the specific needs and challenges of the industry.

Myntex

Myntex

Myntex® builds the future of mobile security. We empower our partners to deliver exclusive mobile endpoint security software, fortifying against mobile threats, device exploits and data exfiltration.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

Mantodea Security

Mantodea Security

Mantodea Security is an industry-agnostic powerhouse backed by extensive experience and expertise in the realm of IT security.

SOC-E

SOC-E

SOC-E is a leading technology provider for high-availability and deterministic networking, sub-microsecond synchronization and cybersecurity solutions for critical sectors.