Cyber Crime In 2025

Cyber crime costs include damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, embezzlement, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and systems, and reputational harm. 

A 2020 World Economic Forum Report say’s that cyber attacks on infrastructure were probably the fifth highest risk to business.

The US government says that many of the recent cyber attacks against America have been sourced to operations in Russia and that Russia has responsibility for the ransomware attacks that are carried out from its territory and by one authoritative estimate, the worldwide cost of cyber crime is expected to reach $10.5 trillion dollars by 2025. 

These numbers are alarming, and for us to better understand the tremendous impact that cyber attacks might have on companies and individuals, it is important to look back and consider some of the biggest cyber attacks in history: 

Melissa Virus: One of the earliest and biggest cyber threats was started by the Melissa Virus. In1999, the Melissa Virus was unleashed by a rogue programmer by sending users a file to be opened by Microsoft Word. The virus caused severe destruction to hundreds of companies, including Microsoft. 

NASA Cyber Attack: In 1999, a 15 year old schoolboy was able to hack and shutdown NASA’s computers for 21 days. Around 1.7M software were downloaded during the attack, which cost the space giant around $41,000 in repairs. 

Estonia Cyber Attack: In April 2007, Estonia witnessed what is thought to be the first cyber attack on an entire country, during which about 58 Estonian websites went offline, including websites of governments, banks and media outlets. 

Attack on Sony’s PlayStation Network: A cyber attack on Sony’s PlayStation Network in April 2011 claimed the personal information of 77 million users. 

Adobe Cyber Attack: The cyber attack which was first thought to have breached the data of 2.9 million users soon went on to compromise the personal data of up to 38 million users. Adobe claims that only the passwords and credit card information of the first 2.9 milion were compromised, whereas the remaining 35.1 million users only suffered the loss of their passwords and IDs. 

Attack on Yahoo: In 2014,Yahoo witnessed one of the biggest cyber attacks of the year when 500 million accounts were compromised. However, it is reported that basic information and passwords were stolen, whereas bank information was not. 

Ukraine’s Power Grid Attack: In what was the first cyber attack on a power grid, the attack left around half of the homes in the Ivano-Frankivsk region in Ukraine without power in 2015 for about a few hours. 

WannaCry Ransomware Attack:  One of the biggest ransomware of all time took place in 2017, when around 200,000 computers were affected in more than 150 countries. This outbreak had a massive impact across several industries and had a global cost of about £6 billion.

Cyber Attack on Marriott Hotels:  A cyber attack was lurking in the shadows for quite a while when Marriott acquired the Starwood Hotels group, and it did not come into light until 2018 . However, by then the attacker continued to have access to personal information of guests.More than 339 milion guests have had their data compromised. This had led the UK’s data privacy watchdog to fine the Marriott Hotels £18.4 million. 

The biggest password leak yet: It was reported earlier this June that a compilation of about 8.4 billion passwords were leaked. This by far is the biggest password leak and is referred to as #RockYou2021 in reference to the 2009 data breach of RockYou site that compromised around 32 million accounts. 

Cyber Attacks Last Month - July 2021

  • A data leak impacted Northern Ireland's COVIDCert online vaccination certification service, causing their Department of Health to temporarily suspend the portal.
  • Estonia stated a Tallinn-based hacker downloaded 286,000 ID photos from government database, exposing a vulnerability in a platform managed by their Information System Authority (RIA).
  • A widespread APT operation was discovered against users in Southeast Asia, believed to be spearheaded by Chinese entities. Researchers found a total of 100 victims in Myanmar and 1,400 in the Philippines, including many government entities.
  • The Japan 2020 Olympics was subject to data breach exposing the personal credentials of volunteers and ticket holders. The information included usernames, passwords, addresses, and bank account numbers.

The United States, the European Union, NATO and other world powers released joint statements condemning the Chinese government for a series of malicious cyber activities. They attributed responsibility to China for the Microsoft Exchange hack from early 2021 and the compromise of more than 100,000 servers worldwide.

In short, the more we move towards digitalisation and technology, the more vulnerable we become to cyber threats.

Technology is a double-edged sword, while it is a great asset and can provide us with new advanced methods of security, there are still those who misuse it and can pose a threat to our privacy. It is imperative for governments and businesses to invest in upgrading their cyber security and online privacy  combat cyber attacks. 

WEF:     CSIS:     Cyber Security Ventures:       Guardian:     Al Bawaba

You Might Also Read:

Minimising The Impact Of Ransomware:

 

« Stolen: Over $600 Million In Crypto Currencies
One Million Stolen Credit Cards Hit The Dark Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Berkman Klein Center for Internet & Society

Berkman Klein Center for Internet & Society

The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace.

Norton Rose Fulbright

Norton Rose Fulbright

Norton Rose Fulbright is a global business law firm. Practice areas include Data protection, Privacy and Cybersecurity.

Engage Black

Engage Black

Engage Black provides solutions for securing and protecting cryptographic keys, data at rest, and data in motion.

Verimuchme

Verimuchme

Verimuchme is a digital wallet and exchange platform to secure, verify and re-use personal information.

Cyber Execs

Cyber Execs

Cyber Execs is a Cyber Security Consultancy & Executive Recruitment firm.

Avansic

Avansic

Avansic is a leading provider of e-discovery and digital forensics services to attorneys, litigation support teams, and business communities.

Seavus

Seavus

Seavus is a software development and consulting company with a proven track-record in providing successful enterprise-wide business solutions including Managed Security Services.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub is a non-profit network organization focused on cooperation, information sharing, research and implementation of cutting-edge technologies in cybersecurity.

GateKeeper Enterprise

GateKeeper Enterprise

The GateKeeper Enterprise software is an identity access management solution. Automated proximity-based authentication into computers and websites. Passwordless login and auto-lock PCs.

Cyber Protection Group (CPG)

Cyber Protection Group (CPG)

Cyber protection Group specialize in Penetration Testing. We work with enterprise level companies as well as small to medium sized businesses.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.

Red Goat Cyber Security

Red Goat Cyber Security

Red Goat Cyber Security have created excellent, informative and interactive Social Engineering Awareness training which is suitable for all levels of staff.

Redpoint Cybersecurity

Redpoint Cybersecurity

Redpoint Cybersecurity is a human-led, technology-enabled managed cybersecurity provider specializing in Digital Forensics, Incident Response and proactive cyberattack prevention.

Diversified Technical Services Inc. (DTSI)

Diversified Technical Services Inc. (DTSI)

DTSI provides a wide range of technology solutions for Federal Agencies, the Department of Defense, and commerical organizations with capabilities including Cyber Security and DevSecOps.

Clarity

Clarity

Clarity is an AI cybersecurity startup that protects against deepfakes and new social engineering and phishing attack vectors accelerated by the rapid adoption of Generative AI.