Security Market Segment LS
Friday, 29 December 2017 20:54

Warning: Global cyber crime reaches new highs and worse to come Featured

Warning: Global cyber crime reaches new highs and worse to come Image courtesy of Stuart Miles at

There has been an unprecedented level of new cyber crime attacks worldwide in 2017 — both in number and intensity — and next year is expected to be even worse, according to global security firm MailGuard.

The security firm says there were hundreds of online-fraud and hacking incidents this year and its data shows that cyber crime is “more profitable than the global trade in marijuana, cocaine and heroin combined”.

To support its claim, MailGuard points to a new report by European Union cyber intelligence agency, Europol, which says that the steep upward trend in cyber crime points to 2018 being worse still, with cyber crime now the most economically damaging crime category worldwide.

“From the recent revelations about the Uber data-breach scandal to the Netflix scam, this was a busy year for the cyber security industry,” says MailGuard’s Emmanuel Marshall  in a newly posted blog.

“History may well remember the 20-teens as the decade of cyber crime.

"Cyber security experts and policymakers alike are predicting that 2018 will see a cyber-crime-wave. There’s been explosive growth in online fraud, hacking and data theft in recent years and the trend looks set to continue. The FBI has estimated that the cost of email fraud alone could be as much as US$9 billion in 2018.  

"Cyber criminals utilise sophisticated AI technology to monitor business and social networks and they exploit the data they collect to infiltrate organisations. All criminals need to break into your business is a cleverly worded email; if they can trick one person in your company into clicking on a malicious link they can gain access to your data."

Marshall warns that the steep upward trend in cybercrime points to 2018 being worse still, with cyber crime now the most economically damaging crime category worldwide.

And MailGuard lists the four biggest cyber crime stories that it says dominated the headlines in 2017:


When the WannaCry ransomware appeared in May it spread across the globe like wildfire, eventually infecting an estimated 200,000 computers in 150 countries.

WannaCry attacked a security loophole in older versions of Windows operating systems using an exploit known as EternalBlue. Once it infected computers it would then replicate itself across networks, spreading quickly and invisibly.

The shock and awe factor of WannaCry came from the serious impact it had on big industry and essential infrastructure. Hospitals in the UK running older computers were forced to shut their doors to patients when their systems went offline. FedEx distribution centres were locked out of their inventory systems. The Spanish telephone network was seriously disrupted. Car factories owned by Renault had to cease production.

Estimates of the financial harm caused by WannaCry are still a topic of debate, but it is generally agreed that the outbreak did damage in excess of US$4 billion.


On 27 June, just weeks after WannaCry, there was another EternalBlue-based ransomware attack.

NotPetya appeared simultaneously in France, Germany, Italy, Poland, the UK, the US, Russia and Ukraine.

Ukraine was especially badly impacted by NotPetya. Eighty companies and organisations were attacked by the virus, including the National Bank of Ukraine.

Like WannaCry, NotPetya displayed a ransom message on infected computers demanding money to unlock the system, but analysts working on the outbreak quickly realised that extortion was not the true objective of the virus. NotPetya activates a disk wiper that overwrites an infected computer's boot files.

Because NotPetya mainly targeted Ukranian companies and infrastructure, a theory emerged that the attack was initiated by a Russian government agency as part of ongoing hostility stemming from the 2014 conflict. This theory was strengthened by the timing of the outbreak. Many cyber security experts speculate that NotPetya was a politically-motivated attack because the outbreak started on the eve of Ukraine’s Constitution Day holiday.


In October, Mathy Vanhoef and Frank Piessens, security researchers at the University of Leuven in Belgium, revealed critical vulnerabilities that exist in all standard Wi-Fi devices. The weakness in the Wi-Fi protocols makes it possible for hackers to read encrypted data on Wi-Fi devices and use them to break into networks.

The newly discovered hacking vulnerability was named KRACK; which stands for ‘Key Reinstallation AttaCKs.’

Upon discovering the KRACK problem, Vanhoef and Piessens immediately notified manufacturers of WiFi devices, who began implementing patches to close the gap in the security of their systems.

The scale of the KRACK problem is huge because Wi-Fi is such a ubiquitous technology in commercial and industrial environments. The issue is exacerbated by the fact that there are many companies still manufacturing devices with unpatched firmware, and countless unpatched devices already in use.

The threat posed by KRACK is twofold; it allows cyber criminals to access supposedly secure data networks and steal information, but it also makes it possible for them to inject viruses or malware that creates botnets.


IoT is the 2017 buzzword of the year but the Internet of Things has also given us the latest and most disturbing cyber security threat of the year.

Along with the explosive growth of wireless technology and the rapid uptake of IoT technology it has become clear that IOT is turning into a security nightmare.

There are security weaknesses baked into the firmware on IOT and Bluetooth devices — from high-end surveillance cameras to wireless headphones — that permit exploits like KRACK. These security weaknesses can be used by hackers to remotely seize control of wireless devices, thereby giving them access to computers and phones on those networks as well.

Cyber criminals can assemble massive groups of compromised wireless devices into botnets and use them to launch denial-of-service attacks. A large scale DoS attack can be devastating. Cyber criminals use the computers in their botnets to send massive volumes of Web traffic to clog up their victim’s network and such attacks can effectively shut down the targeted organisation. In 2016 a DoS attack seriously disrupted Amazon, Twitter and Netflix services.

Cyber security experts know that criminal organisations are amassing huge Botnet resources, but are not sure yet what purpose they will be put to. A surge in DoS attacks is predicted for 2018, enabled by botnets built through IoT network hacking.

Read 8529 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Peter Dinham

Peter Dinham - retired in 2020. He is a veteran journalist and corporate communications consultant. He has worked as a journalist in all forms of media – newspapers/magazines, radio, television, press agency and now, online – including with the Canberra Times, The Examiner (Tasmania), the ABC and AAP-Reuters. As a freelance journalist he also had articles published in Australian and overseas magazines. He worked in the corporate communications/public relations sector, in-house with an airline, and as a senior executive in Australia of the world’s largest communications consultancy, Burson-Marsteller. He also ran his own communications consultancy and was a co-founder in Australia of the global photographic agency, the Image Bank (now Getty Images).

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News