Some Hackers Earn $2m A Year

The escalation in cyber-crime has significantly increased. Compared to other criminal activities cyber-crime has relatively low risks and criminals have realised that they can make more money, with less risk of getting caught, and receive smaller penalties if they do get caught, by manipulating cyber technology for their own advantage.

Recent research finds that a number of cyber criminals are earning around $2m annually and others between $40k to $1m and so criminal activity has increased significantly. Now, organised criminal gangs are using the electronic connected world to cyber-attack and hack globally.
 
Nevertheless, hackers spend as much time designing their attacks as they do finding ways to stay below the radar. A single slip-up can result in the end of their malicious enterprise.

But there is some recent good news that European police have recently arrested more than 800 people after shutting down an encrypted phone system, EncroChat, used by organised crime groups to plot murders and drug deals. More than two tonnes of drugs and £54m in cash, sub-machine guns, an  assault rifle, high value cars and luxury watches were impounded, says the British National Crime Agency (NCA). 

The top-secret phone system had been used by criminals to trade drugs and guns has been successfully penetrated and shut down.

The NCA worked with forces across Europe on the UK's "biggest and most significant" law enforcement operation. However, many other cyber criminals are using malware, DDoS and phishing attacks on companies and individuals that have poorly protected data.

The Dark Web provides the perfect platform for hackers to trade their stolen data. It can only be accessed using specialist software, and any websites hosted on the Dark Web are encrypted and can’t be found using traditional search engines or browsers.

In the UK, cyber-crime and fraud are now the most common offences, with around ten percent of the population getting hacked successfully. More than five and a half million cyber offences are thought to take place each year which accounts for almost 50% of all UK crime. Despite the scale of the problem, more than 80% of all these crimes are not reported to the police. Therefore, cyber criminals are rarely caught and prosecuted because they are virtually invisible. Crime has transformed with the digital age and police forces around the world are now having to rapidly adapt in order to tackle the problem.

The global nature of the problem has called for a global response, and many international law enforcement agencies are now working closely together to take down some of the world’s biggest cyber criminals.

Due to the sophisticated tactics that hackers use to cover their tracks, it’s extremely difficult to catch them and bring them to justice. Only around 4/5% of cyber criminals are apprehended for their crimes which demonstrates just how challenging it is for law enforcement agencies to arrest and prosecute these offenders.

Hackers will often use secure software such as a proxy server to hide their identity and funnel their communications through lots of different countries in order to evade detection.

Other technologies like Tor and encryption enable them to add multiple layers to mask their identity. The combination of these tools allows them to commit their crimes undetected and in countries where they know they can’t be prosecuted.

Tracking hackers down is laborious and often takes a lot of time, collaboration and investigative research. Specialist cybercrime units need to be assembled in order to retrieve and analyse any potential evidence. Encrypted files will need decrypted, deleted files recovered and passwords cracked.

Catching Hackers

Despite what may seem like an insurmountable task, hackers are human and make mistakes. It’s often these careless errors that will trip the criminals up and leave a trail of evidence that the police can follow. The majority of cyber-crimes are financially motivated, however for a large number of hackers it’s the thrill of the hack and the excitement of bringing down a company’s computer system that motivates them.

Following an attack, many will turn to hacker’s forums to brag about their exploits and this often provides police with the vital clues they need to start identifying the person responsible. Some cyber police operations have found effective way to lure cyber criminals in and find out more about how they operate and who they are. Essentially, they’re a decoy computer system set up to mimic a likely target for an attack.

The systems will contain data and applications that will trick hackers into thinking they are attacking a legitimate target.  The information gathered from these dummy attacks can provide valuable information on who is responsible and if there are any similarities that links the individual to other attacks.

A hacker can gain access to your organisation easily when your staff are not following your internal policies and procedures and it is very important that your management and employees receive cyber training that they engage with and use.

PaCCS Research:      Metacomplinace:       Metacompliance:     Web Professionals:        TechTarget:     

Cyber Security Intelligence recommends GoCyber cyber training for all employees and management:

Click HERE to register for a  free GoCyber demo

You Might Also Read: 

Young Hacker Makes $1m. Legally:

 

« Iran Threatens Retaliation For Cyber Attack At Nuclear Site
The Key Cyber Security Challenges »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

Seagate Technology

Seagate Technology

Seagate data storage systems are purpose-built for enterprise and data centre performance, scalability, reliability and security.

Fenror7

Fenror7

Fenror7 lowers the TTD (Time To Detection) of hackers, malwares and APTs in enterprises and organizations from 300 days on average to 24 hrs or less.

HYAS Infosec

HYAS Infosec

HYAS is a highly skilled information security firm developing the next generation of information security technology.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.

Metabase Q

Metabase Q

Metabase Q protects you from financial and reputational losses with more efficient and intelligent cybersecurity, using the best worldwide in technologies, processes and specialists.

Systal Technology Solutions

Systal Technology Solutions

Systal is a global managed network and security service and transformation specialist. We help enterprise-level businesses maximise the security and business value of their complex IT infrastructure.

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

PRE Security

PRE Security

PRE Security is leading the transition into the next era of AI cybersecurity with a new model: Predict & Prevent.

PureID

PureID

Protect your enterprise with PureAUTH #IAMFirewall, Resilient SSO platform, purpose built to provide Passwordless Authentication & Zero Trust Access, by default.

Soteria Cybersecurity

Soteria Cybersecurity

Soteria is your trusted Cybersecurity Partner in IT and OT.

TrustNet

TrustNet

TrustNet helps mid-to-large firms build trust through top-tier cybersecurity, compliance, and consulting—offering complete managed services all in one place.