Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Fighting Cybercrime: We Are Stronger Together than We Are Individually
  • Cyber Attacks
  • Data Breach

Fighting Cybercrime: We Are Stronger Together than We Are Individually

5 years ago Stephen Wood
Fighting Cybercrime: We Are Stronger Together than We Are Individually

As a cybersecurity professional, how numb have you become to vendors who try to scare you with frightening statistics in an effort to sell you a new product? It is understandable that a vendor has to present as much information in a limited amount of attention-grabbing time, so their doomsday technique makes some sense. Perhaps the vendors’ approach is faulty, as the numbers are quite frightening indeed. There is definitely a larger point to be made.

The intention of this article is not just to put scary numbers out there. We have enough FUD in the industry. But some alarming numbers are worth sharing. In 2016, the National Institute of Standards and Technology (NIST) estimated that the United States lost up to $770 billion to cybercrime. To provide some sense of scale to that very large number, the entire 2019 U.S. Department of Defense had a total budget of $668 billion. Only 20 countries have a gross domestic product (GDP) this large. But that was 2016. The losses have been growing ever since. 

It’s on the rise. And it is expensive.

According to The Herjavec Group, worldwide losses from cybercrime will double between 2015 to 2021 form $3 trillion to $6 trillion worldwide. All these budget numbers, country designations, and accompanying statistics are a bit overwhelming. This is sort of like the vendor problem of too much information wrapped into one dire scenario.

Let’s shift the way we look at this by creating a fictional country named “Scamlandia.” If the entire worldwide cybercrime income was attributed to Scamlandia, only the United States, China, and the aggregated European Union’s GDP would be larger. To expand on this idea, if cybercrime were a tax, it would result in a 4.2% levy on the world’s GDP ($6 trillion to cybercrime / $142 trillion world GDP).

Cybersecurity Ventures notes that this sum represents the greatest transfer of economic wealth in history, creates risks of incentives for innovation and investment, and will be more profitable than the global trade of all major illegal drugs combined. This presents a very large problem. The money is not just evaporating; it’s being used to fund activities of which no law-abiding citizen would ever approve if anybody bothered to ask.  

A recent bank information security publication highlights how Russia has harnessed cybercrime. “Many security experts have long said that Russian authorities continue to look the other way when it comes to cybercrime, so long as criminals abstain from attacking Russian targets, and perhaps agree to occasionally assist the state’s security services with their hacking-related requirements.” One could easily posit that this illegal activity acts as a financial stimulus to the Russian economy that is paid for by Russia’s adversaries, making cybercrime a tool of state.

Beyond Russia, cybercriminals from around the world are specializing and collaborating to become more effective. According to research in the Journal of Offender Therapy and Comparative Criminology, “…organized cybercrime networks are made up of hackers coming together because of functional skills that allow them to collaborate to commit the specific crime.” They, like any good business operation, are investing their capital to increase their revenue, efficiency, and return on investment.

The efforts of drug cartels to buy and intimidate government officials exemplifies how an illegal business will attempt to decrease losses to create a more efficient operation. By extension, the negative and far-reaching effects of cybercrime should be expected to get much worse if it is allowed to continue. Imagine cybercrime cartels buying elections, manipulating markets and even conducting propaganda campaigns openly to persuade the public of their good intentions, just as the drug cartels once did.

While there is no definitive answer to all of these problems, there are ways to frame a solution. 

Helping solve the small issue of Cybercrime

Initially, there must be a mechanism to discourage nation-state actors that flaunt the rule of law. Countries are harboring bad actors for their own benefit. To get them to stop doing this, bad actions must generate negative outcomes. If honest governments identified countries known to be bad actors, registered white hat hackers could then attack authorized targets so long as the operations were overseen by the government. A share of the price would be used to subsidize cyber defenses. While the concept of “hacking back” is the subject of much debate, it is worth more exploration.

As with all businesses, working together, we are stronger than we are individually. A network of honey pots which are used to identify bad actors and their methods could be used as evidence to place countries on the “cyber enemies” list. Along with that collaborative endeavor, there could be the establishment of an international forum to name bad actors. In this way, small countries would be less likely to suffer retaliation.

Repudiation of bad actors should be a scaled response. If a country is behaving badly but all out cyber warfare is not warranted, there may be options to throw sand into the attacker’s business model. If an attacker enters a honey net (and the only way to do so is illegally), then their machines can be infected in a manner that renders them useless for their role. The bad actors must clean the machine in order to reuse it, delaying their ability to initiate new attacks and disrupting their business’s efficiency.

Of course, these ideas all have their shortcomings. On the one hand, what is the minimum threshold before a cyber defense activity is deemed a cyber war? Also, what is there to prevent a mercenary mindset, which could quickly degenerate into cyber disorder? 

I would be interested to hear your thoughts on the subject. Have you come up with interesting ideas about how to neutralize cybercrime? If so, send them to us on Twitter here.

The post ” Fighting Cybercrime: We Are Stronger Together than We Are Individually” appeared first on TripWire

Source:TripWire – Stephen Wood

Tags: Finance, Goverment, TripWire

Continue Reading

Previous Ransomware Gang Collects Data from Blood Testing Lab
Next Google Speech-to-Text API Can Help Attackers Easily Bypass Google reCAPTCHA

More Stories

  • Cyber Attacks
  • Data Breach

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

6 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

11 hours ago [email protected] (The Hacker News)
  • Data Breach

The Buyer’s Guide to AI Usage Control

12 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

13 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

17 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

19 hours ago [email protected] (The Hacker News)

Recent Posts

  • AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • The Buyer’s Guide to AI Usage Control
  • Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT