• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • April 19th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Cyber Crime
Phishing Scam

6 billion records hacked in 2017 so far; ransomware victims paid $25 million

July 26th, 2017 Waqas Security, Hacking News, Malware, Phishing Scam 0 comments
6 billion records hacked in 2017 so far; ransomware victims paid $25 million
Share on FacebookShare on Twitter

With every passing day, hackers and cyber criminals are becoming more sophisticated in their attacks. Resultantly, they are getting their hands on highly critical and sensitive data from almost every institution around the world.

According to a mid-year report by Risk Based Security (RBS), a Richmond Virginia based company who keeps an eye on data breaches, there have been 2,227 incidents of data breaches as of June 2017 allowing hackers to steal 6 billion records.

This means that in last six months hackers have stolen more data than the total number of medical and financial records stolen in the whole of 2016.

According to Executive Vice President for Risk Based Security Inga Goddijn, “It is stunning to see the steady increase in the number of breaches impacting one million or more records. In the first six months of 2013, 2014 and 2015, the number of these large breaches hovered in the mid-teens. Last year we saw that number jump to 28, and now, for the first six months of this year, we’re tracking 50 such incidents.”

The report further states that hackers are increasingly using phishing techniques against US citizens to steal employment and tax related data. In 2016 around 160 phishing attacks were responsible for stealing W-2 information (wage and salary information for employees). However, things have gone worse in the first six months of 2017 since there has been a 25% increase in these attacks.

“While news of politically motivated foreign interference in election systems continues to dominate the headlines, the breach activity we are tracking this year is a stark reminder of just how many data compromise financial gain motivates incidents. As long as information can be quickly monetized and systems remain vulnerable to attack, we should not expect to see any slowdown in breach activity,” said Goddijn.

Ransomware victims have paid $25 million to cyber criminals

It is a fact that there has been a sudden surge in ransomware attacks against unsuspecting users, educational institutions, government bodies businesses, medical centers, and hospitals. The WannaCry ransomware and Petya wiper malware attack are the best example of the increasing ransomware campaigns.

In a separate study conducted by researchers from University of California San Diego, New York University Tandon School of Engineering, Chainalysis, and Google have found out that victims are paying a massive amount of ransom to cyber criminals.

In their study, researchers analyzed 34 families of ransomware discovering that only a few of them have made a lot of profit. One of them was Locky that earned $8.85 million and was the “patient zero” of this recent problem.

Locky was one of the first and most sophisticated ransomware programs which targeted users and kept its encryption and payment system separate from the groups spreading the malware. This allowed the ransomware to spread faster around the world.

NYU professor Damon McCoy told The Verge that  Locky’s big advantage was the decoupling of the people who maintain the ransomware from the people who are infecting machines. “Locky just focused on building the malware and support infrastructure. Then they had other botnets spread and distribute the malware, which was much better at that end of the business.”

Other ransomware programs like Cerber and CryptXXX followed the same pattern and made $6.9 million and $1.9 million respectively the report reveals.

It was three months ago when Samyntec, a cyber security giant reported that not only Americans are number one target of ransomware attacks but also most likely to pay ransom to cyber criminals.

A targeted user pays ransom due to lack of knowledge of ransomware decryption programs. Also, there’s not much out there for a layman to go through to decrypt their data without the help of a specialist which is not easy to get in touch with. Most importantly, FBI encourages users to pay ransom whenever their system is infected with a ransomware malware.

However, it is highly advised not to pay ransom to cyber criminals and don’t feed them. Last year, cyber security giants started No More Ransomware initiative aiming at unlocking and decrypting user data for absolutely free. 

In case you are looking for how one can prevent the growing issue of ransomware following this link.

  • Tags
  • Cyber Crime
  • hacking
  • internet
  • Malware
  • Phishing
  • Privacy
  • Ransomware
  • security
Facebook Twitter LinkedIn Pinterest
Previous article CowerSnail Backdoor Targeting Windows Devices
Next article Italian Banking Giant UniCredit Hacked; 400,000 Customers Impacted
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
WhatsApp Pink is malware spreading through group chats

WhatsApp Pink is malware spreading through group chats

A hacker claims to be selling sensitive data from OTP generating firm

A hacker claims to be selling sensitive data from OTP generating firm

2021 and Emerging Cybersecurity Threats

2021 and Emerging Cybersecurity Threats

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
WhatsApp Pink is malware spreading through group chats
Security

WhatsApp Pink is malware spreading through group chats

A hacker claims to be selling sensitive data from OTP generating firm
Hacking News

A hacker claims to be selling sensitive data from OTP generating firm

1-click code execution vulnerabilities in popular software apps
News

1-click code execution vulnerabilities in popular software apps

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us