The Biggest International Cybercime Offenders

Cyber criminals at the top level are as technologically sophisticated as the most advanced IT companies and like them, have moved quickly to adopt cloud computing, artificial intelligence, Software-as-a-Service and encryption. 

Cybercrime remains far too easy, since many technology users fail to take the most basic protective measures, and many technology products lack adequate defenses. 

Cybercrime also leads in the risk-to-payoff ratio. It is a low risk crime that provides high payoffs. A smart cyber-criminal can make hundreds of thousands, even millions of dollars with almost no chance of arrest or jail. 

Criminal activity on the internet is much broader than cybercrime as essentially all elements of human criminal activity have moved into cyberspace. A senior British official reported, for example, that half of all reported crime in the UK is cyber-related. 

Over the last 20 years, we have seen cybercrime become professionalised and sophisticated. Cybercrime is a business with flourishing markets offering a range of tools and services for the criminally inclined. 

The most important area for the cost of cybercrime is in the theft of intellectual property and business confidential information. Internet connectivity has opened a vast terrain for cybercrime, and IP theft goes well beyond traditional areas of interest to governments, such as military technologies. One way to measure the cost of intellectual property theft is to look for competing products that take market share from the rightful owners. If hackers steal intellectual property, such as product designs, from a small or medium-size enterprise, it can be a fatal experience. 

For big companies, it can be an unexpected source of revenue lost as competing products enter the market. The theft of intellectual property accounts for at least a quarter of the cost of cybercrime and, when it involves military technology, creates risks to national security as well. 

These losses can often be invisible to the victim. They still have access to the IP that has been copied by the criminals and may attribute a decline in revenue to growing competition rather than theft. As much as $600 Billion is lost annually to cyber-crime as attackers are becoming increasingly sophisticated in their approach, adopting new technologies and leveraging black markets and digital currencies. 

A few countries, however, stand out as the most active sources of attacks in cyberspace. 
According to a Report produced by the Center for Strategic and International Studies (CSIS), a think tank based in Washington, 2018 was an active year for cyberattacks, with more than 100 significant incidents occurring in the past year. 

Looking at publicly available data on cyber-espionage and warfare but excluding cybercrime, the CSIS study reveals that China and Russia have been the largest source of attacks in cyberspace since 2006. In December of 2018 alone, four major incidents were reported involving China, while three involved Russia.

  • From 2006 to 2018, China was involved in 108 cyber incidents with losses of more than $1 million each, compromising communications across Europe, conducting cyber-espionage spying on 12 countries and stealing information from hundreds of millions of customers of a US hotel chain, according to the CSIS report. 

The CSIS report examined data on China, North Korea, Iran, India, Russia, the UK, the US, Germany, Australia, Japan, South Korea, Ukraine, Israel and France, with the rest of the world listed as a separate category. 

The study named the rest of the world as the third-worst offender, with 67 incidents. Next in the ranking came Iran with 44 incidents, and North Korea with 38. India was listed as guilty of 16 important cyber incidents from 2006 to 2018, while the US was accused of nine. 

Just two countries were identified as having not been the source of cyber-attacks in the past 12 years: Japan and Australia.
"Cyber-attacks are a global-phenomena, and it's only growing." says Kurt Baumgartner, principal security researcher in the Global Research and Analysis Team at Kaspersky Lab. 

"There are hot spots in the world that both source cyber activity and attract that activity, and (this) is only growing to the point that more and more nations are budgeting offensive cyber-security operations."

The CSIS report found the "rest of world" category was the victim of no fewer than 165 incidents from 2006 to 2018, while US government agencies, defense and tech companies, and other entities were the target of 117 cyberattacks with losses of more than $1 million each. There have been 35 major cyber incidents targeting India and 34 targeting South Korea. China was attacked 25 times in major cyber incidents from 2006 to 2018, according to the report, including one involving an Indian group hacking Chinese government agencies and research institutions. 

The United Kingdom also reported 25 important cyberattacks, including one reported in May 2018 that had targeted its electric utility networks since 2017. In Israel, 24 important cyberattacks have occurred since 2006, while Ukraine saw 23. 
Russia was the victim 16 major cyberattacks in the past 12 years, the report said, with that figure including an attack by a state-sponsored Middle Eastern hacking group that targeted a Russian oil company with operations in Pakistan, Russia, Saudi Arabia, Turkey and North America.

Experts warn that regardless of the type, cyberattacks come at a great cost economically and in public regard. Organisations that expose users to such attacks are more likely to lose their customer's trust, while cyber-crimes may also deter those interested in investing in new technologies. 

"Over the past decade we've seen all sort of cybersecurity challenges and issues and they range anywhere from massive financial crime, sometimes performed on behalf of groups that are known to be sponsored and associated with state-owned groups, to events that affect people's daily lives," says Baumgartner. 

"It's a huge problem when money is just flushing around because of cybersecurity issues." 

USNews:          Mcafee:

You Might Also Read:

Australian Defence Chief Issues Cybercrime Warning:

Cyber Criminals Are Aiming At Business:

 

« Metro Bank Hacked
Please Login Or Sign Up »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Zymr

Zymr

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration.

INCIBE-CERT

INCIBE-CERT

INCIBE-CERT is the reference security incident response center for citizens and private law entities in Spain

Institute for Cyber Security Innovation - Royal Holloway

Institute for Cyber Security Innovation - Royal Holloway

The Institute for Cyber Security Innovation aims to bring together Academia, Industry and Government to be a catalyst for applied research and innovation in cyber security policy and solutions.

SolutionsPT

SolutionsPT

SolutionsPT enables customers to strengthen their Operational Technology (OT) network to meet the ever increasing demand for performance, availability, connectivity and security.

Ellipsis Technologies

Ellipsis Technologies

Ellipsis Technologies is a diversified technology company that develops innovative security software for websites and online applications.

3Elos

3Elos

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions.

Trustonic

Trustonic

Trustonic is a leader in the device security market. Our mission is to protect apps, secure devices & enable trust.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

The Cyber AB

The Cyber AB

The Cyber AB is the official accreditation body of the Cybersecurity Maturity Model Certification (CMMC) Ecosystem.

TalaTek

TalaTek

TalaTek is a full-service risk management firm providing expert services in risk management, cybersecurity, and compliance.

AutoSec

AutoSec

AutoSec supports the FFI program Electronics, Software and Communication by dissemination and exploitation of the results of projects related to automotive cybersecurity.

TrafficGuard

TrafficGuard

TrafficGuard is an award-winning digital ad verification and fraud prevention platform.

Eficens Systems

Eficens Systems

Eficens Systems is a global IT services and consulting company. We specialize in empowering businesses to harness the potential of Information Technology as a strategic asset.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.

Ark Infotech

Ark Infotech

Ark Infotech is a provider of cloud management services, selective support services, and technology solutions.