Cybersecurity

Cyber crime cost organizations $2.7 billion in 2018

shutterstock image id ID: 186823331 by DD Images

Cyber crime cost businesses a collective $2.7 billion in 2018, according to the FBI's latest annual Internet Crime Report.

The bureau received more than 20,000 complaints from organizations about business email compromise, a catch-all phrase for a number of crimes that leverage tactics -- like phishing, targeted email spoofing and other forms of credential theft -- to facilitate the fraudulent transfer of funds. While more sophisticated tools and attack vectors tend to garner sexier headlines, the report made clear that many hackers are still able to make a good living, exploiting common social engineering methods like BEC to the tune of $1.2 billion in lost or stolen profits.

In one instance, a New Jersey town victimized by a BEC scam ended up transferring more than $1 million to a fraudulent account. The FBI said its Newark field office worked with the town's financial institution to freeze and eventually return the stolen funds.

Extortion schemes dangling stolen or sensitive data in exchange for money saw an explosion of growth in 2018, with 51,146 complaints and $83 million in adjusted losses. That represents a 242% increase from 2017. Cyber criminals are more frequently using those schemes in conjunction with high-profile data breaches, denial-of-service attacks and government impersonation schemes.

As with previous years, the report illustrated how susceptible older Americans are to internet crime. Approximately $1.15 billion and more half the total victims in 2018 were over the age of 50, and Americans over 60 were the most likely to fall prey to such scams.

The FBI received more than 351,000 complaints from businesses and organizations in 2018, or about 50,000 more than it received the year before. That continues what has been a steady trend of increased reporting over the past five years, something officials have said is the result of constant outreach efforts and engagement by FBI officials with the private sector.

"Our No. 1 piece of advice [to companies] would be to have an incident response plan … and No. 2, and probably very close second if not tied, is to notify us," said Amy Hess, executive director of the FBI's Criminal, Cyber, Response and Services branch at an April 16 public event.

FBI leaders have emphasized just how much of the bureau's work has shifted in recent years to rely on digital forensics and evidence for virtually every type of crime or counterintelligence area it works on. A big part of the new model for success involves building trust in the private sector so companies that are victims of cyber crime aren't reluctant to share what they know with investigators.

"I understand of course the mindset in the past of, 'Hey wait a minute that brings risk to me because now I'm exposed, and what are you going to do with that information?'" Hess said. "We're not going to then 'out' you to the world and say, 'Hey this is what happened to them,' she said. "We do want to strive for two things. One: attribution, to try to figure out who did it and hold them accountable. In the meantime, we also want to try to share that information out there, non-attributable … to put it in such a way that other consumers can defend themselves."

About the Author

Derek B. Johnson is a former senior staff writer at FCW.

Featured

  • IT Modernization
    shutterstock image By enzozo; photo ID: 319763930

    OMB provides key guidance for TMF proposals amid surge in submissions

    Deputy Federal CIO Maria Roat details what makes for a winning Technology Modernization Fund proposal as agencies continue to submit major IT projects for potential funding.

  • gears and money (zaozaa19/Shutterstock.com)

    Worries from a Democrat about the Biden administration and federal procurement

    Steve Kelman is concerned that the push for more spending with small disadvantaged businesses will detract from the goal of getting the best deal for agencies and taxpayers.