Cyber Crime Just Keeps On Growing

The persistent rise in cyber crime seems unstoppable and there have been many well-publicised large scale attacks in recent months. Online crime isn’t going away and cyber criminal activity is one of the biggest challenges that society will face in the next two decades. If cyber criminals continue operating at their current rate, then, by 2025, some researchers suggest that global cyber crime costs will reach $10.5 trillion by 2025

It is very difficult to catch cyber criminals and in a number of countries cyber crime is not an offence. Of the crime rate in the UK, 50% of it is cyber crime, but police reduction of this type of crime is very low at 0.1. This is because Police resources are not fully IT responsible and a lot of the crime is created overseas making it very difficult for the local police to engage and operate and its the same situation to many other countries' police operations.

Cyber criminals are using social engineering, phishing, identity theft, spam emails, malware, ransomware and whaling to compromise their targets. The global cost of cyber crime is estimated to reach $6 trillion by 2022, a massive increase from the 2015 estimate of $500 billion.Cyber crime costs include damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and reputational harm

LockFile is a new ransomware that has appeared in July 2021 following the discovery in April 2021 of the ProxyShell vulnerabilities in Microsoft Exchange servers. LockFile ransomware appears to exploit the ProxyShell vulnerabilities to breach targets with unpatched, on premises Microsoft Exchange servers, followed by a PetitPotam NTLM relay attack to seize control of the domain. 

According to researchers at Sophos this novel approach, which they call “intermittent encryption,” helps the ransomware to avoid triggering a red flag because the new encryption method looks statistically very similar to the unencrypted original. This is the first time that Sophos researchers have seen this approach used in ransomware. Indeed, cyber criminals are harnessing the latest emerging technology and are forever changing techniques in order to make their crimes more effective, faster and adaptable to current safety measures. This makes it very hard for investigators and cyber security teams to identify evidential artifacts and the methodology. This is demonstrated by the way malicious bots impersonate genuine users to unlock security systems.                                                  

From attacking individuals and demanding $100-$200/person a decade ago, cyber criminals in 2017 demonstrated that they could bring down entire organisations

Cyber criminals are always probing software and hardware for security vulnerabilities for as long as computers have existed. However, the discovery and exploitation of security holes used to be an exhaustive process, hackers had to patiently explore different parts of a system or application until they found an opportunity. 

Now, hackers can enlist the services of machine-learning AI bots to automate the process. The result has been a technology-powered increase in cyber crime. Nation states are now deeply involved and it has become far more impactful to attack corporate entities and governments.

With large industries being attacked, federal agencies and politicians are beginning to take a stand on cyber crime and there is a scramble to address the problem because ordinary people are being affected by this in much larger numbers than ever before. 

Emerging technologies, such as the Internet of Things (IoT), artificial intelligence (AI) and cloud computing, are now a part of our everyday lexicon. Such technologies may be a doorway to a more cost effective and efficient future for the business world.

These technologies can also provide avenues for cyber criminals to commit larger, more rewarding and potentially more sophisticated cyber crimes.

KPMG:   Cyber Security Ventures:   Sophos:   Herjevac Group:    Economic Times:   Acedemia:   Evalian:

You Might Also Read: 

Cyber Crime In 2021: How Hackers Are Evolving:

 

« Medical Devices Need Better Cyber Security
Financial Services Are Taking Threat Intelligence Seriously »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

SCADAfence

SCADAfence

SCADAfence offers cutting edge cybersecurity solutions designed to ensure the operational continuity of industrial (ICS/SCADA) networks.

Signal Sciences

Signal Sciences

Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform.

NetKnights

NetKnights

NetKnights is an independent IT security company which offers services and products for strong authentication, identity management and encryption.

Cancom

Cancom

CANCOM group is one of the leading providers of IT infrastructure and IT services in Germany and Austria. Solution areas include network security.

Cyberens

Cyberens

Cyberens provide cybersecurity consulting services in IT sectors relating to defense and space, banking, industrial control systems and IoT.

Accertify

Accertify

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

Greylock Partners

Greylock Partners

Greylock Partners is a leading venture capital firm based in Silicon Valley. We invest in all sectors of enterprise software technology including applications, cloud/SaaS, networking and security.

Next47

Next47

Next47 is a global venture firm, backed by Siemens, committed to turning today's impossible ideas into tomorrow's indispensable industries.

BlackhawkNest

BlackhawkNest

Blackhawk is the only cyber security solution on the market that combines network monitoring and incident response into a cohesive appliance.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

Alkira

Alkira

Alkira has reinvented networking for the cloud era by delivering the network cloud, the first global unified network infrastructure with on-demand hybrid and multi-cloud connectivity.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

Cygna Labs

Cygna Labs

Cygna Labs is a software developer and one of the top three global DDI (DNS, DHCP, and IP address management) vendors.