The Biggest International Cybercime Offenders

Cyber criminals at the top level are as technologically sophisticated as the most advanced IT companies and like them, have moved quickly to adopt cloud computing, artificial intelligence, Software-as-a-Service and encryption. 

Cybercrime remains far too easy, since many technology users fail to take the most basic protective measures, and many technology products lack adequate defenses. 

Cybercrime also leads in the risk-to-payoff ratio. It is a low risk crime that provides high payoffs. A smart cyber-criminal can make hundreds of thousands, even millions of dollars with almost no chance of arrest or jail. 

Criminal activity on the internet is much broader than cybercrime as essentially all elements of human criminal activity have moved into cyberspace. A senior British official reported, for example, that half of all reported crime in the UK is cyber-related. 

Over the last 20 years, we have seen cybercrime become professionalised and sophisticated. Cybercrime is a business with flourishing markets offering a range of tools and services for the criminally inclined. 

The most important area for the cost of cybercrime is in the theft of intellectual property and business confidential information. Internet connectivity has opened a vast terrain for cybercrime, and IP theft goes well beyond traditional areas of interest to governments, such as military technologies. One way to measure the cost of intellectual property theft is to look for competing products that take market share from the rightful owners. If hackers steal intellectual property, such as product designs, from a small or medium-size enterprise, it can be a fatal experience. 

For big companies, it can be an unexpected source of revenue lost as competing products enter the market. The theft of intellectual property accounts for at least a quarter of the cost of cybercrime and, when it involves military technology, creates risks to national security as well. 

These losses can often be invisible to the victim. They still have access to the IP that has been copied by the criminals and may attribute a decline in revenue to growing competition rather than theft. As much as $600 Billion is lost annually to cyber-crime as attackers are becoming increasingly sophisticated in their approach, adopting new technologies and leveraging black markets and digital currencies. 

A few countries, however, stand out as the most active sources of attacks in cyberspace. 
According to a Report produced by the Center for Strategic and International Studies (CSIS), a think tank based in Washington, 2018 was an active year for cyberattacks, with more than 100 significant incidents occurring in the past year. 

Looking at publicly available data on cyber-espionage and warfare but excluding cybercrime, the CSIS study reveals that China and Russia have been the largest source of attacks in cyberspace since 2006. In December of 2018 alone, four major incidents were reported involving China, while three involved Russia.

  • From 2006 to 2018, China was involved in 108 cyber incidents with losses of more than $1 million each, compromising communications across Europe, conducting cyber-espionage spying on 12 countries and stealing information from hundreds of millions of customers of a US hotel chain, according to the CSIS report. 

The CSIS report examined data on China, North Korea, Iran, India, Russia, the UK, the US, Germany, Australia, Japan, South Korea, Ukraine, Israel and France, with the rest of the world listed as a separate category. 

The study named the rest of the world as the third-worst offender, with 67 incidents. Next in the ranking came Iran with 44 incidents, and North Korea with 38. India was listed as guilty of 16 important cyber incidents from 2006 to 2018, while the US was accused of nine. 

Just two countries were identified as having not been the source of cyber-attacks in the past 12 years: Japan and Australia.
"Cyber-attacks are a global-phenomena, and it's only growing." says Kurt Baumgartner, principal security researcher in the Global Research and Analysis Team at Kaspersky Lab. 

"There are hot spots in the world that both source cyber activity and attract that activity, and (this) is only growing to the point that more and more nations are budgeting offensive cyber-security operations."

The CSIS report found the "rest of world" category was the victim of no fewer than 165 incidents from 2006 to 2018, while US government agencies, defense and tech companies, and other entities were the target of 117 cyberattacks with losses of more than $1 million each. There have been 35 major cyber incidents targeting India and 34 targeting South Korea. China was attacked 25 times in major cyber incidents from 2006 to 2018, according to the report, including one involving an Indian group hacking Chinese government agencies and research institutions. 

The United Kingdom also reported 25 important cyberattacks, including one reported in May 2018 that had targeted its electric utility networks since 2017. In Israel, 24 important cyberattacks have occurred since 2006, while Ukraine saw 23. 
Russia was the victim 16 major cyberattacks in the past 12 years, the report said, with that figure including an attack by a state-sponsored Middle Eastern hacking group that targeted a Russian oil company with operations in Pakistan, Russia, Saudi Arabia, Turkey and North America.

Experts warn that regardless of the type, cyberattacks come at a great cost economically and in public regard. Organisations that expose users to such attacks are more likely to lose their customer's trust, while cyber-crimes may also deter those interested in investing in new technologies. 

"Over the past decade we've seen all sort of cybersecurity challenges and issues and they range anywhere from massive financial crime, sometimes performed on behalf of groups that are known to be sponsored and associated with state-owned groups, to events that affect people's daily lives," says Baumgartner. 

"It's a huge problem when money is just flushing around because of cybersecurity issues." 

USNews:          Mcafee:

You Might Also Read:

Australian Defence Chief Issues Cybercrime Warning:

Cyber Criminals Are Aiming At Business:

 

« Metro Bank Hacked
Please Login Or Sign Up »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Law Enforcement Cyber Center (LECC)

Law Enforcement Cyber Center (LECC)

LECC is designed to assist police, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology.

KELA

KELA

KELA's powerful cybercrime intelligence platform uncovers and neutralizes the most relevant cybersecurity threats coming from the hardest-to-reach places on the internet.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

Recorded Future

Recorded Future

Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

HoxHunt

HoxHunt

HoxHunt is an automated cyber training program that transforms the way your employees react and respond to the growing amount of phishing emails.

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

Destel

Destel

Destel is a system integrator and provider of IT services focused on Advanced Network & Security Solutions.

S2S Group

S2S Group

S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle.

GlobalPass

GlobalPass

Covering 200+ countries with 78 000 databases, GlobalPass provides sophisticated facial biometrics verification and deep screening, delivering peace of mind to every client.

Knowledge Transfer Network (KTN)

Knowledge Transfer Network (KTN)

KTN links new ideas and opportunities with expertise, markets and finance through our network of businesses, universities, funders and investors.

Cyphra

Cyphra

Cyphra’s team provide cyber security consulting, technical and managed services expertise and experience to support your organisation.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

Daisy Corporate Services

Daisy Corporate Services

Daisy is one of the largest providers of communications and IT solutions across the UK, with a portfolio spanning unified communications, cloud, cyber security and resilience.

Saudi Information Technology Company (SITE)

Saudi Information Technology Company (SITE)

SITE is a forward-thinking enterprise, which aims at revitalizing Saudi Arabia’s digital infrastructure, cybersecurity, software development, and big data and analytics capabilities.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.