Think about large-scale heists and it’s normal to conjure an image of a group of thieves robbing a bank, whisking away cash in black duffel bags. While such crimes haven’t gone away, criminals in the modern age often conduct their business online.
Definition of cybercrime
The term cybercrime refers to illegal activity conducted on the internet for the purposes of financial extortion, data theft, identity theft, espionage, and more.
Recent examples of damaging cybercrime incidents include the Yahoo hack in 2017, which impacted nearly 3 billion users, the Equifax breach with almost 150 million affected customers, as well as the WannaCry ransomware bug.
While the popular image of a cybercriminal is of a loner in a hoodie hunched over a keyboard, cybercrimes can also be conducted by gangs of hackers, companies, and even governments. North Korea was famously determined to be behind the hack that siphoned 81 million USD from Bangladesh’s central bank, as well as at least 1 billion USD more from various other entities.
Similarly, the Sony Pictures hack and the numerous daily hacking attempts on the Pentagon aren’t the work of a single individual. While we can’t say for sure, the degree of sophistication required to carry out these attacks suggests the culprits have significant resources at their disposal.
Cybercrime is projected to cost upwards of 6 trillion USD by 2021, with the figure nearly doubling from 2015 estimates. The complexity of cyberattacks coupled with mass proliferation of internet-connected devices means we are likely to witness a growing trend of cybercrime across the world.
5 examples of cybercrime
Malware
Malware, or malicious software, is one of the oldest tricks in the book to carry out cybercrime. Malware comes in the form of viruses, zero-day vulnerabilities, adware, and other threats that infect computer systems, tamper with the integrity of data, and steal proprietary information.
Malware includes ransomware, which prevents users from accessing their computer files unless the user pays a ransom.
Identity theft
Hackers often aim to steal personal details of individuals and sell them. These details in turn help criminals steal money by, for instance, opening credit cards in the victim’s name.
When hackers successfully enter the confidential systems of large companies, they’re able to glean tons of sensitive customer information. This information, valuable on the Dark Web, includes personal health information, credit card details, and even video streaming accounts. Personal data for a single individual can fetch about 45 USD, so when you add that up across hundreds of thousands of accounts, you’re looking at a significant amount of cash.
The Equifax hack mentioned above is a form of identity theft, as it’s possible that a large number of the stolen credit cards and personally identifiable information ended up on the Dark Web.
Phishing
Phishing, also known as social engineering attacks, occurs when hackers gain access to computer systems by impersonating someone you would trust.
For instance, you might get an email which seems like it’s from a work colleague or a high school friend. The email might ask you to take a certain action such as signing up for a new service or joining a referral program. Since you trust the person it’s purportedly from, you proceed to click on a provided link.
However, either the email address is fake, or it’s real but has been compromised. Meanwhile, the link in question may be infected or lead you to give up sensitive information. That’s how phishing attacks unleash worms and generally cause material losses.
Cryptojacking
Ever since cryptocurrencies hit the mainstream, hackers have looked for ways to hijack system resources in order to mine cryptocurrency at the expense of unsuspecting users.
Cryptojacking has increased in prominence over the years. It’s hard to detect and ends up costing users hard cash in the form of higher electricity bills, without any of the monetary benefits.
Cyber espionage
Cyber espionage is a type of cybercrime that doesn’t involve the theft of personal or financial information. Rather, the objective here is to gain a competitive advantage over a government or company by hacking into their systems and obtaining secrets.
Activities conducted during cyber espionage include accessing confidential documents, monitoring emails and text messages, and hacking CCTV cameras.
How can I prevent cybercrime?
It’s impossible to eliminate cybercrime entirely, but there are certainly strategies you can deploy to reduce the risk of falling victim.
It’s important to note here that both individuals and businesses are equally at risk of cybercrime. And the approach to mitigating this risk will vary.
How can enterprises prevent cybercrime?
For companies, the most common attack vector comes via their staff. Employees are generally the weakest link in the security chain and hackers know that. This makes an internal cybersecurity strategy extremely important, in particular the training of employees on best practices.
An effective cybersecurity strategy takes into consideration a defense-in-depth approach. Some measures include using two-factor authentication whenever possible, a disaster and data recovery plan, effective penetration testing, endpoint security, regular backups, and updated software.
How can individuals protect themselves from cybercrime?
The best way for individuals to avoid cybercrime is to carefully scrutinize the emails asking you to navigate to a new website and set up an account. Make sure you verify that the sender is someone you know and trust, otherwise you may fall prey to a phishing campaign.
As a general rule of thumb, we recommend that you avoid using public Wi-Fi networks (such as those found in cafes, airports, and malls) unless you’re guarded with a VPN. Similarly, always keep your devices updated. In fact, turn on automatic updates so you don’t have to keep checking. When it comes to your personal devices, only download apps from the official app stores. Don’t trust third-party sites or rooted apps, as they can ship with unknown vulnerabilities.
Comments
It was really helpful and with detailed information.
Thanks
I’m fairly new to ExpessVPN and only a few months previous to that did I start using VPN’s. Undoubtedly I have been a victim of cyber crime for several years now (I found out about it only around two years ago) by people very close to me who I considered friends. I have been mostly unsuccessful in preventing their attacks until after I installed and started using ExpressVPN. It’s a rather complex situation I’m in but I can tell you that the attacks are very personal in nature and I doubt I will ever find out to the extent that my privacy has been invaded, money digitally stolen without my knowledge, and how much money that I have and will have to continue to shell out to protect myself from these attacks. One example of this is that I spent a few hundred to purchase wireless security cameras for my home. Now with wireless cameras one must hook it up to one’s personal or home wifi in order to access and control the system. Well They have been always successful with hacking my router before (I have had to reset and change router ID/password) and it was no different after I installed the camera. After three or four months of feeling as if they have been in control of the cameras, I figured out a way to test to verify if my fears were correct or not and sure enough, I found out that I was not the only one in control of my cameras. Currently I have bought new wired security cameras and hopefully will have it up and running in a couple of weeks. Anyway I apologize for the way long comment but thank you for your product. I have noticed a marked improvement and feel a lot more secure to go online and do what I need to do now. I hope to learn much more on how to keep my devices safe from this blog so keep up the good work.
You do an excellent of providing technical information on an understandable form. Good on you!
When possible could you provide links to more intense information.
Please carry on, you all do a splendid job. Thank you much
thanks for reading, Bart!
Found this informative. You hear of many of these things but very few are explained. Thank you.
thanks Keith!