• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Are Cyber-Criminals Really Getting Better At Monetizing Their Attacks?

Contributor by Contributor
November 11, 2019
in Security
Share on FacebookShare on Twitter

A new report titled “Cyber Incident & Breach Trends Report” revealed just how cyber-criminals are getting better at monetizing their every attack.

This report from the Internet Society’s OTA or Online Trust Alliance— a group that identifies and promotes privacy and security best practices to build consumer confidence on the Internet— revealed that cyber-attacks cost global organizations $45 billionlast year alone in 2 million incidents. And this is just an estimate, with the actual numbers expected to be much higher since numerous cyber-attacks are never reported.

Despite the fact that overall exposed records and breaches were down last year, the report established that the financial effect of ransomware increased by 60 percent, losses from BEC have doubled and cryptojacking incidents getting tripled.

Here are some of the top trends from the report that shows just how cyber-criminals are getting better in monetizing their attacks.

  1. Deceptive Emails

Also known as an attack vendor, BEC or business email compromise has doubled last year which results in $1.3 billion losses as company employees were deceived into transferring funds and sending gift cards to attackers using email to impersonate executives or vendors.

Most companies are reacting by clearly labeling all emails which originate outside the company’s network as well as implementing strict workplace security.

  1. Cryptocurrency Breeds New Cyber Crimes

With the ever-increasing occurrence of cryptocurrency, also comes new cyber-crimes such as cryptojacking, which tripled last year.

https://flickr.com/photos/coinscapturecom/48012281503

This type of attack hijacks devices in order to harness computer power to efficiently mine cryptocurrency. These incidents are believed to be increasingly attractive since they provide a direct path from infiltration to monetization and are quite difficult to detect.

  1. Third-Party Attacks

Supply chain attacks are not new, however, they continue to multiply and change. This is when attackers infiltrate through 3rd party website content, vendors’ third-parties credential or software.

The most notable third party attack was Magecart in 2018, infecting the payment forms of over 6,400 e-commerce websites globally. External sources estimated a 78 percent increase with these attacks last year, with 2/3 of companies having an average of $1.1 million loss.

  1. Cloud Controversies

While also not new, the year 2018 also brought sensitive data being left open to the Internet because of misconfigured cloud services.

Given that the number of organizations rely on companies such as Microsoft, Google, and Amazon for their cloud needs, it is increasingly crucial to ensure that cloud storage is secure.

The report said that one common issue with cloud computing is not even a true “attack”, but rather a user error. Configuring the data storage correctly is the responsibility of the user and not of the cloud service. And more often than not, it is improperly done.

  1. Governments Under Attack

Although the total number of ransomware attacks was down last year, the report revealed a troubling rise in reposted ransomware attacks against local and state governments from 2018 to early 2019.

https://flickr.com/photos/149551385@N08/34497816710/

For instance, breaches targeting the cities of Atlanta and Baltimore led to the interruptions of government services and rebuilding of whole network structures.

  1. Increased in Credentials Stuffing

Credential stuffing also increased last year. With over 2.2 billion breached credentials currently in play and users usually relying on similar logins across websites and services, attackers are taking advantage of ultra-fast computers and well-known username and password pairs or more commonly used passwords in order to gain direct access to account across a broad range of industries. 

Numerous high-profile attacks happened last year, and although most were first believed to be just simple breaches, they turned out to be some of the brute-force credential attacks causing huge losses on companies and organizations.

Related Posts:

  • 3500
    FBI Reports $12.5 Billion American Losses in 2023 To…
  • GettyImages-472423454-scaled
    Data Of Over 40 Million UK Voters Exposed To Year-Long Hack
  • FILE PHOTO: A computer keyboard lit by a displayed cyber code is seen in this illustration picture
    Hackers Sabotaged Several Senegalese Government…
  • Data_security
    GladeFinance Data Breach Records The Highest Loot So Far
  • Robotics
    Nigeria Ranked As Africa’s Second Most Cyber-secure…
  • cyber-security-istock
    African SMEs Face a Host of Cybersecurity Challenges
  • 2c818459-8300-4b62-98fe-46b047389c6c_4afcd4d4
    Hong Kong Probes Louis Vuitton over 419,000-customer…
  • Nigeria Bureau of Statistics Data breach
    Hackers Compromised The NBS Sever, But No Ransomware Yet

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cyberattackcybersecurityhackerssecurity
Contributor

Contributor

Posts by contributors. You can send in a post to be reviewed and published to info@techbooky.com

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Breaking: Google Keeps Chrome, But Judge Orders Search Data Sharing September 2, 2025
  • YouTube Premium Targets Account Sharing, Netflix-Style September 2, 2025
  • Microsoft Fixes Windows Certificate Enrolment Bug September 1, 2025
  • Microsoft to Enforce MFA on Azure Resource Management in October September 1, 2025
  • How to Read Faster: 10 Best Speed Reading Apps in 2025 (Ranked & Reviewed) August 31, 2025
  • WhatsApp Working On Shorter Disappearing Message Timers August 29, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.