Teen Hackers Steal £600,000 From N. Ireland Accounts

Teenage hackers are committing cyber crimes that cost victims in Northern Ireland nearly £600,000 last year.

The average age of a cyber offender is just 17, and according to the Organised Crime Task Force (OCTF) many are video gamers with links to gaming communities.

According to the OCTF's annual report and threat assessment, online criminals are the youngest offenders.

It also said that while the average age of a cyber criminal is 17, in reality offending is likely to begin even earlier, as many only come to the attention of the authorities when aged 17.

The report showed that a total of £591,000 was lost to victims here with 331 cyber-dependent crimes being carried out during the last financial year.

Cyber-dependent crimes are crimes that require computers or networks to carry out an offence.

Cyber-enabled crimes - such as fraud or blackmail - can be conducted offline as well as online.

The report said the true scale of cyber security breaches can only be obtained if businesses report incidents, something that the PSNI say does not always happen.

The police have put this down to businesses wanting to maintain a good reputation.

Five cyber security arrests were made between April 2017 and March 2018, with 25 searches carried out by the PSNI.

Anthony Harbinson is the director of Safer Communities at the Department of Justice and said progress is being made to help protect businesses.

"Significant progress is also being made in protecting individuals and businesses against cyber crime. The new purpose-built PSNI Cyber Crime Centre is just one addition which will help enhance the PSNI's forensic and investigative capabilities," he said.

Cyphra is a cyber security firm based in Belfast. One of the company's directors, Conrad Simpson, said businesses should take time to understand the threats posed by potential breaches of security.

"When it comes to businesses having to deal with a cyber security incident, the reality is that it's not a case of 'if', but 'when' it will happen," he said.

"With the reliance on digital technologies and the importance of data for business operation and innovation, organisations need to take steps to understand and manage their cyber threats. They should ensure that their approach encompasses not only steps to protect their information, but also enables them to detect an incident when it occurs and have the processes in place to allow them to recover as quickly as possible."

Mr Simpson added that the perpetrators are becoming more savvy in their approach to committing attacks.

He added: "Everyday our customers come to us with new and wide-ranging challenges and we're seeing a sophisticated level of criminality involved. With this increase in attacks, businesses have a responsibility to ensure all staff and suppliers are cyber security aware and that their business is more cyber resilient."

Belfast Telegraph:

You Might Also Read:

Cybersecurity Issues For Open Banking

« Cybersecurity Overtakes AI As Law Firms' Tech Priority
Scammers Steal Half-a-Billion Pounds From UK Bank Customers »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

Forter

Forter

Forter provides new generation fraud prevention to meet the challenges faced by modern enterprise e-commerce.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

National Digital Exploitation Centre (NDEC) - United Kingdom

National Digital Exploitation Centre (NDEC) - United Kingdom

NDEC is a project to create a centre of cyber and digital development and education for the UK. It will offer training in digital practices, cyber security and research.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

GV (Google Ventures)

GV (Google Ventures)

GV provides venture capital funding to bold new companies in the fields of life science, healthcare, artificial intelligence, robotics, transportation, cyber security and agriculture.

WisePlant

WisePlant

WisePlant's portfolio of solutions and services includes process measurement, secure automation, industrial cybersecurity, functional safety and more.

Fortiphyd Logic

Fortiphyd Logic

Fortiphyd Logic equips operators of the power grid, oil & gas, and other critical infrastructure with the tools and training they need to defend their industrial networks from advanced cyberattacks.

Dataprise

Dataprise

Dataprise is a leading IT managed services provider offering IT Management and Help Desk Support Services, Cloud Services, Information Security Solution, IT Strategy and Consulting.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

SOC Prime

SOC Prime

SOC Prime is the only Threat Detection Marketplace where researchers monetize their content to help security teams defend against attacks easier, faster and more efficiently than ever.

Creative Destruction Lab (CDL)

Creative Destruction Lab (CDL)

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies.

Technology Innovation Institute (TII)

Technology Innovation Institute (TII)

TII is a UAE-based research center that aims to lead global advances in AI, robotics, quantum computing, cryptography and secure communications and more.

Proaxiom

Proaxiom

Proaxiom are focused on erasing cyber driven panic paralysis for Small and Medium Enterprises through brilliant cyber technologies which drive productivity and support growth.

Xmore AI

Xmore AI

Xmore AI, an emerging disruptor in our incubation, is building AI models to optimize and secure IT with the mission of increasing efficiency and reducing costs.

Redblock

Redblock

Redblock's mission is to eliminate the drudgery and repetitive 'eye on the glass' work done by Security Teams.