Internet crime costs global economy £2.3m a minute
The cost of internet-based cybercrime cost the global economy a total of £1.2tn in the past year, more than double the cost in 2017, according to the latest annual Evil Internet Minute report by cybersecurity firm RiskIQ.
The report is based on an analysis of malicious activity on the internet using proprietary global intelligence and third-party research.
The analysis also reveals that every minute, top companies pay £20 because of security breaches, hacks on cryptocurrency exchanges cost £1,550, and phishing attacks cost £14,200.
Every minute, 2.4 phishing sites went live and seven malicious redirectors, 0.32 blacklisted apps, and 0.21 Magecart attacks were detected.
Looking ahead, the report predicts that ransomware will cost the global economy £17,817 a minute in 2019.
The report coincides with another by security firm SonicWall that shows ransomware was up 15% in the first half of the year, with the UK worst-hit with a 195% increase compared with the same period a year ago.
“As the scale of the internet continues to proliferate, so does the threat landscape,” said Lou Manousos, CEO of RiskIQ.
“By compiling the vast numbers associated with cybercrime in the past year, we made the research more accessible by framing it in the context of an ‘internet minute’.
“We are entering our third year defining the sheer scale of attacks that take place across the internet using the latest third-party research and our own global threat intelligence so that businesses can better understand what they are up against on the open web.”
The report shows that popular cybercriminal tactics include malvertising, phishing and supply chain attacks that target e-commerce, such as the Magecart hacks that have increased by 20% in the past year.
The motives of cybercriminals include monetary gain, large-scale reputational damage, political motivations and espionage.
“Without greater awareness and an increased effort to implement necessary security controls, there will be more attacks using an ever-expanding range of technologies and strategies,” said Manousos.
“With the recent explosion of web and browser-based threats, organisations should look to what can happen in a matter of minutes and evaluate their current security strategy. Businesses must realise that they are vulnerable beyond the firewall, all the way across the open internet.”
source computerweekly
Industry: Cyber Security

Latest Jobs
-
- Security Auditor / 3rd Party Assurance. London. End user
- London
- 60000
-
Security Auditor / 3rd Party Assurance. London. End user The Security Auditor / 3rd Party Assurance role has two key functions. Manage the ongoing assessment of new and existing 3rd party suppliers to ensure they meet the internal policies / controls. (Reassessment etc) Internal Auditing across business to ensure various departemnt / operations are compliant and inline with internal ISMS etc. ISO 27001 internal audit experience, creation of audit reports experinece essential. This is an internal business so broad experience across a multiple technology environment (cloud and on prem) is highly desirable. MUST be able to engage and work with senior stakeholders in an often faced pace environment. ISO27001, NIST, CISSP, CISA Risk assessment experinece needed This is a permanent role.. Blend of technical and consultative approach needed. This role will require someone to travel to London a few days a week once lock down permits and their offices fully reopen. All details kept in confidence. Apply today to find out more.
-
- Security Auditor / 3rd Party Assurance. London. End user
- London
- 60000
-
Security Auditor / 3rd Party Assurance. London. End user The Security Auditor / 3rd Party Assurance role has two key functions. Manage the ongoing assessment of new and existing 3rd party suppliers to ensure they meet the internal policies / controls. (Reassessment etc) Internal Auditing across business to ensure various departemnt / operations are compliant and inline with internal ISMS etc. ISO 27001 internal audit experience, creation of audit reports experinece essential. This is an internal business so broad experience across a multiple technology environment (cloud and on prem) is highly desirable. MUST be able to engage and work with senior stakeholders in an often faced pace environment. ISO27001, NIST, CISSP, CISA Risk assessment experinece needed This is a permanent role.. Blend of technical and consultative approach needed. This role will require someone to travel to London a few days a week once lock down permits and their offices fully reopen. All details kept in confidence. Apply today to find out more.
-
- Head of Penetration Testing, UK based, Flexible location.
- United Kingdom
- Upto £100,000 plus excellent benefits
-
Head of Penetration Testing needed to join a security consultancy that are delivering client facing penetration testing services around Web app and Infrastructure. Looking for someone hands on that is able to manage a highly skilled technical team of testers. 50-60% of the time is expected to be hands on, other duties will include, but not be limited to; leading and managing the day to day running of the team, mentoring, team upskill, recruitment, reporting, escalation, process improvement etc. Flexible location although south east is preferred. Anyone with Check / CREST experience is highly desirable. MUST be able to achieve SC clearance. UK based role. All details kept in confidence.
-
- Technical Security Analyst. Immediate opportunity,
- Newcastle upon Tyne
- 48000
-
Technical Security Analyst. Immediate opportunity, Technical Security Analyst needed to join a specialist security team. This role will require travel into the office in a hybrid model once industry returns back to the working environment. The Security Analyst must be commutable to Newcastle upon Tyne. This is an Immediate opportunity. An essential requirement of the role is to be able to engage with internal stakeholders so a blend off technical hands on analytical and consultative communication skills. The role will include, but not be limited to; managing and handling incidents end to end, log review, incident analysis, escalation, vulnerability assessment, Automation, Malware Analysis, Threat intelligence, etc All details kept in confidence. https://calendly.com/chris-holt/call-with-chris-holt-dcl-search