UK Cyber Crime Is Increasing In 2019

The UK has seen a significant growth in cyber criminality in the form of high-profile ransomware campaigns over the last year. 
 
Breaches leaked personal data on a massive scale leaving victims vulnerable to fraud, while lives were put at risk and services damaged by the WannaCry ransomware campaign that affected the NHS and many other organisations worldwide. 
 
Tactics are currently shifting as businesses are targeted over individuals and although phishing attacks on individuals are increasing, fewer are falling victim as people have become more alert although because the distinction between nation states and criminal groups is increasingly blurred, cyber-crime attribution is sometimes difficult. 
 
Many Russian-speaking cyber groups are threatening UK interests, but home-grown cyber criminals are becoming more sophisticated and therefore a rising threat. 
 
Although young criminals are often driven by peer kudos rather than financial reward, organised UK cyber-crime groups are motivated by profit.Cyber criminals seek to exploit human or security vulnerabilities in order to steal passwords, data or money directly. 
 
The Most Common Cyber-Threats Include:
 
• Hacking - including of social media and email passwords
• Phishing - bogus emails asking for security information and personal details
• Malicious Software – including ransomware, through which, criminals hijack files and hold them to ransom
• Distributed Denial of Service (DDOS) attacks against websites, which is often accompanied by extortion
 
The scale and complexity of cyber-attacks is wide ranging.
 'Off the shelf' tools mean that less technically proficient criminals are now able to commit cyber-crime, and do so as awareness of the potential profits becomes more widespread. The evolving technical capabilities of malware means evolving harm as well as facilitating new crimes, such as the crypto-mining malware which attacks digital currencies like Bitcoin.  
 
Cyber-attacks are financially devastating and disrupting and upsetting to people and businesses. 
We know that there is significant under-reporting, although the new General Data Protection Regulation is likely to prompt a better picture of scale. Currently the level of sentencing at court is not commensurate with the seriousness of attacks, and this is an area which is ripe for consideration.
 
Action Fraud is the UK’s national reporting centre for fraud and cyber-crime where you should report fraud if you have been scammed, defrauded or experienced cyber-crime in England, Wales and Northern Ireland. 
 
You can talk to the fraud and cyber-crime specialists by calling 0300 123 2040 at Action Fraud.
 
ActionFraud:         Natiional Crime Agency:
 
You MIght Also Read:
 
30% Of Business Leaders Would Pay Ransom:
 
 
 
« New Ransomware Formats Double
WEBINAR: How to Secure App Pipelines in AWS »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

ATSEC Information Security

ATSEC Information Security

ATSEC is an independent, privately-owned company that focuses on providing laboratory and consulting services for information security.

Graphus

Graphus

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users.

Upstream Security

Upstream Security

Upstream Security is the first cloud-based cyber-security solution that protects the technologies and applications of connected and autonomous vehicles.

CERT Tonga

CERT Tonga

CERT Tonga is the national Computer Emergency Response Team for Tonga.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

L3Harris Technologies

L3Harris Technologies

L3Harris Technologies is a global aerospace and defense technology innovator, delivering solutions to meet mission-critical needs across air, land, sea, space and cyber domains.

ProLion

ProLion

ProLion provides Data Integrity solutions that ensure organisations’ data remains secure, compliant, manageable and accessible.

Pivot Technology School

Pivot Technology School

Pivot Tech offers Data Analytics, Software Development and Cyber Security training in boot camp style cohorts.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

WheelHouse IT

WheelHouse IT

WheelHouse IT secures, manages, and advances businesses with innovative, cost-effective IT solutions.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

Flotek

Flotek

Flotek is an IT & Comms service provider delivering SMEs with trusted, innovative and cost effective cloud technology, with confidence, clarity and clout.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.

Faddom

Faddom

Faddom is an agentless tool that visualizes your on-premises and cloud infrastructure, as well as their inter-dependencies.