Posts

State of Internet Crime Banner

State of Cyber Attacks 2018 – A big Overview about Cybercrime [Infographic]

Phishing, Trojans, Ransomware and Viruses: Hardly a day goes by without hacker attacks against companies or private individuals.  This huge LUCY Infographic shows the explosion of internet crime

 

 

State of Cyber Crime 2018 – Numbers in detail

 

  • In the United States by Internet crime caused damage in 2001:17.8 million USD.
  • In the United States by Internet crime caused damage in 2016: 1.45 billion USD.

 

The most frequently attacked applications are the browser and Android devices with a total of 75 %.

Number of infected devices by selected malicious programs:

  • IloveYou” (2000): 50 million
  • “Sasser” (2004): 1 million
  • “Storm” (2007): 10 million
  • “Conficker” (2009): 2.9 million

 

  • Number of all detected malware by 2005: 1.7 million
  • Number of all detected malware by 2017: 600 million

 

Budget of Microsoft’s bounty fund to seize malware programmers: 5 million

 

Distribution of attacks on Windows by malware type in 2016:

  • Viruses 49,2 Precedent
  • Trojan generally 30.3 percent
  • Worms 11.5 percent
  • Scripts 4.32 percent
  • Backdoors 0.87 percent
  • Ransomware 0.87 percent

 

Strength of a DDoS attack of the malware Mirai of 2016: 620 Gbit / s

Daily new malicious programs: 390,000

 

The computer worm MyDoom holds the record for the fastest spreading rate to date, it was in every twelfth e-mail in 2004, slowing down the world’s Internet access by 10 percent.

 

Estimated number of civilian Red Hacker Alliance in China: 100,000

 

  • Malware detection rate Windows devices: 77.22%
  • Malware detection rate for Android devices: 5.83%

 

52 percent of all malicious programs are distributed via “.com” domains

The smallest virus family to date is called “Mini” or “Trivial” and is, in some variants, only 13 byte (big)

Booty generated by tthe Ransomware WannaCry: 70,000 Dollars

Paid ransom by a South Korean Web Hoster in June 2016 after a Ransomware attack: 1 million US dollars

Share of Ransomware victims who pay ransom but do not retain access to their data: 20 percent

 

Average amount victims are willing to pay after a Ransomware attack by Country

  • Great Britain 568 USD
  • Denmark 446 USD
  • USA 350 USD
  • Germany 227 USD
  • France 203 USD

 

Globally registered phishing attacks 2016: 1.22 million

Globally registered phishing attacks 2015: 0.43 million

 —

Phishing simulation campaigns sent by the LUCY server by S1 / 2017 for training purposes: 7200

43% of spear phishing attacks target small businesses

Small businesses lose an average of $41,000 per cyber security incident

Social Engineering like Phishing are key to successful cybercrime. Of the bad guys…

  • 3% try to exploit a technical flaw
  • 97% try to trick a user with some social engineering scheme
  • 91% of cyberattacks and the resulting data breach begin with a spear phishing email

Global ransomware damage 2015: 325,000,000 USD (345 M)
Global ransomware damage 2017: 5,000,000,000 USD ( 5B)

 

Connected devices infected with malware, top 3 countries:

  1. China 47%
  2. Turkey 43%
  3. Taiwan 39%

 

Top 5 countries in Q2 / 17 sending spam mails:

  1. Vietnam 12.4%
  2. USA 10.1%
  3. China 9%
  4. India 8.8%
  5. Germany 5.1%

Top 5 countries in Q2 / 17 receiving spam mails

  1. Germany 12.7%
  2. China 12.1%
  3. Russia 9.1%
  4. Japan 5.87%
  5. Russia 5.67%

 

Sources: BitDefender, APWG.org, Kaspersky Lab Report 2017, LUCY Security, Symantec ISTR 2016, 2016 Phishme Enterprise Phishing Susceptability and Resiliency Report, Cybersecurity Ventures Ransomware Damage Report 2017

www.lucysecurity.com/state-of-cyber-2018

This information contained herein has been obtained from sources believed to be reliable. LUCY Security disclaims all warranties as to the accuracy, completenesss or adequacy of such information. LUCY Security shall have no liablility for errors, omissions or inadequacies in the information contained herein or for the interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results.

Simulated Cyber Attacks

Simulated Cyber Attacks [Infographic] – 2/3 of Customers willing to Testify and more than 8 out 10 are Recommending LUCY!

In Spring 2017 customers of LUCY Security were asked to reply to a survey. We have summarized the results of the detailed report (here) in an infographic.

Simulated Cyber Attacks -LUCY Customer Survey 2017

 

  • The LUCY Customer Survey 2017 got a response rate of 28.4%
  • More than 8 out of 10 customers would recommend LUCY to a third party
  • 2/3 of the respondents are willing to act as reference customers
  • 70% of the respondends were interested in a LUCY User Group

eFax Phishing rocks: The most popular Phishing Attack Template was the

  • eFax-Scenario
  • Other popular scenarios:
    • Encrypted Mail
    • WebEx(e)
    • Virus Scanner
    • Password Assessment
  • 50+ Suggestions for Improvment were submitted
  • Close to half of the suggestions for improvement were already available as feature in LUCY!

The high response rate and the great willingness to stand as a reference customer are amazing, because the IT security industry is known for its secrecy. The high popularity rates for a public user group suggest a rethinking in the market that cyber crime can only be fight and confined together. Secrecy is detrimental to the security of the company on the Internet!

LUCY Server enables companies to be able to implement realistic simulated cyber attacks for educational purposes. At the same time, customized security awareness programs and early warning systems for security incidents can be used to increase cyber security for employees. The LUCY Server also provides the first-time cyber prevention in the form of a product (instead of services) that is affordable for everyone. In addition customers are given the opportunity to test and improve their IT security, even without special know-how using wizards and templates.

 

 

 

There’s no better Solution for Simulated Cyber Attacks!