• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   What does global cyber crime look like?

What does global cyber crime look like?

  • Posted on:April 11, 2016
  • Posted in:Industry News
  • Posted by:
    Noah Gamer
0
Hacking communities are actually quite distinct in their cultures.

Anyone who's ever been hit by a cyber attack knows how unnerving it is to have a complete stranger violate their digital life from behind a computer screen. Getting robbed by a physical mugger obviously carries its own problems, but there's something especially chilling about having to deal with a faceless entity that makes getting hacked a uniquely terrible experience. 

This level of anonymity is something that cyber criminals work hard to maintain, as the entirety of their "job" relies on their ability to never get caught. However, hackers aren't just lines of code or pieces of malware. These are living, breathing human beings, and they don't always act alone. What's more, the cyber criminal underground isn't a singular being. There are multiple, fragmented collectives out there working constantly to make a profit off of illicit online activities.

What are the specifics that differentiate these groups from each other and what are some larger global cyber crime trends currently affecting the worldwide economy? Let's take a look:

Different locations, different cyber criminals

Although the Internet allows for communication on a scale never before seen in human history, it would appear that cyber criminals like to deal with individuals from within their own borders. Japanese hackers, for example, are extremely exclusive. Trend Micro researcher have found that these groups stay on forums that aren't accessible by the public, often using Japanese slang as passwords. 

This kind of exclusivity isn't found in other cyber criminal undergrounds, especially within North America. Trend Micro has observed that hackers in this region tend to keep their communications on the Surface Web, which is the part of the internet that everyone has access to and is the opposite of the more nefarious Deep Web. 

On top of that, hackers from separate parts of the world focus on different modes of illegal money making. While Brazilian cyber criminals like to work on bank fraud schemes, Japanese hackers tend to make a lot of their money on child pornography. North Americans tend to offer more physical goods and services, like drugs and hit men. China also stays within the physical spectrum, although these hackers tend to focus more on hardware that can be used to commit cyber crime. 

Clearly, hackers have unique cultures that depend upon their physical location. However, this is only half of the equation. What kind of impact does cyber crime have on different parts of the world, and for that matter, how does hacking affect each industry?

Your industry and location don't matter, hackers can find you

Hackers may work with people from within their home countries, but countless international incidents prove that they don't stay there when looking for a target. That said, specific areas and business sectors suffer from different types and effects of cyber crime To understand why this is, it might be easier to imagine cyber crime as armed robbery: Liquor stores and gas stations may be held up more often than financial institutions, but a bank robbery is going to involve a lot more money and even more bad press. 

A global survey conducted by PricewaterhouseCoopers found that worldwide cyber attacks are now the second most-common variety of financial crime. However, the survey found that disparate sections of the world have their own distinct point of view when it comes to data breaches. 

The Middle East, for example, apparently doesn't hold much pity for companies that become victims of cyber crime. The PwC study found that 20 percent of surveyed organizations felt there was a "high" impact on their businesses' reputation following such an event. In Western Europe, on the other hand, only 9 percent of companies had a "high" impact, while 75 percent had "low/none." 

What's truly enlightening about this research is the fact that different industries are also affected by cyber crime in distinct ways. As one might guess, the tech industry sees a clear effect on reputation following a cyber attack, with 25 percent of organizations feeling a "high" level of impact. These companies are supposed to be technologically advanced, and customers expect them to be able to fend off hackers. 

However, a surprising bit of this research has to do with the level of information that makes its way to the board room following an attack. According to the study, nearly 30 percent of government executives either never requested information about the incidents or only asked for it once a year. Considering how massively important federal data breaches can be, this shows that government agencies might want to change how they prepare for and react to a cyber attack. 

Cyber crime is a worldwide phenomenon and yet each country has its own unique style. That said, the overall goal of making money off the misfortunes of others remains the same. The only way organizations can protect themselves is to study these differences, find out what local hackers are doing and take every available precaution to avoid these specific crimes. 

Related posts:

  1. Cyber crime: The $2 trillion problem (Part 1)
  2. Within cyber crime realm, big growth of malware
  3. When cyber crime isn’t just about money
  4. The state of cyber crime in the U.K.

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.