Understand your needs
Improve our services
Deliver personalised content
Save your preferences
Analyse visitor interactions
Your consent is voluntary – you can always change you cookie settings here.
Cyber attacks are not a hoax. Online crimes are steadily growing every year with millions of people falling victim to hackers, losing their personal data, and money. More than ever it begins to look like a game of cat and mouse. While the cybersecurity cat is getting smarter and agile, the hacking mouse still finds news ways to escape. We’ve gathered various data breach and hacking statistics to draw a detailed picture of just how prevalent cybercrime is.
Oct 09, 2020 · 9 min read
A startling 15.1 billion records were exposed in 2019, and that’s 284% growth compared with 2018. However, the number of data breaches only grew by 1%, which suggests that they may be becoming more effective (Risk Based Security).
The stats for 2019 may still change, as perpetrators sometimes put breached data up for sale on the dark web only months or years later. This makes it much harder for authorities to reveal the source of the hack and find the wrongdoers. It’s possible that a service you’re using has already been hacked and that the attackers are just waiting for the right time to cash in.
The biggest breach of 2019 affected 1.2 billion people. This vast collection of data, the majority of which was allegedly harvested by People Data Labs and Oxydata, was discovered on an unsecured server. It contained names, email addresses, phone numbers, and LinkedIn, and Facebook profile information — 4 billion records in total.
Other major leaks of 2019:
10 years ago, there were only 986 reported breaches with 103 million records exposed. The decade of growth in data breaches is incredible and it’s not slowing down.
The average cost of a data breach is $3.86 million, however, this varies from country to country. Companies from the US suffer the most as the expenses can reach up to $8.64 million (IBM). However, everything depends on the scale of the hack and the size of the company.
In 2018, the personal details of about 500,000 British Airways customers were exposed, including names, email addresses, credit card numbers, their expiration dates, and CCV codes. For failing to comply with GDPR (General Data Protection Regulation) and to secure its customers, British Airways faces a record £183 million fine. They’re still fighting legal battles to this day and expect to reduce the final penalty to £22 million.
According to the IBM report, it takes 280 days on average to identify and contain a breach. Time is the most crucial factor in hacking incidents. Companies that were able to detect a breach in less than 200 days spent, on average, $1.1 million less on recovery.
However, the consequences of data breaches can chase companies for years, as only 61% of the cost comes in the first year. 24% comes in the next year, and the final 15% comes two years later. Not to mention the damaged reputation and loss of customers and revenue.
According to NordVPN’s Cyber Risk Index, developed countries are more likely to fall victim to cyber criminals. Countries like Denmark, Norway, or Sweden are popular among hackers not because of their poor digital security. High incomes, widespread smartphone usage, constant travelling, and frequent e-shopping makes the Nordics appealing targets.
India is considered to be the least risky country on the list as only 1 of 3 Indians use the internet. But that’s not the whole picture. If you look at Indians who use the internet, the risk of them getting hacked might be even higher than in some developed countries as they are very active online.
It is estimated that 20% of the global population have fallen victims to cyber criminals in some way.
While the world was coming together to fight the most vicious virus since the Spanish flu, cyber criminals used COVID-19 as an opportunity to scam the vulnerable. With an unprecedented amount of people working from home and public panic, it was woefully easy.
In March 2020, online scams increased by over 400% compared with previous months, making the virus one of the biggest cybersecurity threats ever. The cyber attacks have come in various forms, such as phishing, malicious links, email compromise, malware, ransomware, and fake landing pages (ReedSmith).
In April, Google announced that they were blocking 18 million phishing and malware emails every day related to COVID-19. The scams impersonated various government and health organizations such as the World Health Organization (WHO). While 99,9% of these emails never reached their recipients, many people still fell into the hackers’ traps.
With the rise of remote work during national quarantines, Zoom, an enterprise communication service, saw a spike in new users. However, Zoom was also criticized for its weak security. Around 530,000 Zoom user accounts were found for sale on the dark web, containing usernames, passwords, email addresses, host keys, and personal meeting URLs.
Researchers analyzed 1.2 million newly observed host names in March and April and found out that 86,600 were high-risk or malicious (Palo Alto’s Unit 42). The United States made it to the top of the list (29,007), followed by Italy (2,877), Germany (2,564), and Russia (2,456). “In every crisis, there is an opportunity” — a famous proverb says. Hackers are clearly familiar with the concept.
Ransomware occurs when hackers encrypt your data and demand a ransom to get it back. It’s nasty business, but business is good. While cybersecurity experts discourage people from paying the criminals, many still do.
A report says that 1 out of 4 organizations have paid their ransom and the majority got their data back. However, there are always some cases when hackers refuse to unlock the files even after being paid (Sophos).
Differences between countries are also significant. In India, 66% of organizations paid the ransom, while in Spain only 4% chose to meet hackers’ demands. 56% of companies worldwide restored their data using backups. This only proves how important it is to be prepared for the worst.
Ransomware attack techniques:
Windows users should be worried the most as they faced 87% of all ransomware attacks, with macOS facing just 7%. One of the most notorious ransomware attacks, WannaCry, infected 200,000 Windows OS computers in 150 countries. Users were asked to pay $300-$600-worth in Bitcoin to get their data back. National Health Service hospitals in England and Scotland were hit the hardest, with 70,000 devices affected. As of today, WannaCry is still active and running.
In 2019, the Baltimore City government was hit by ransomware and was demanded to pay $76,000 in Bitcoin. The attack crippled public services and the estimated recovery cost is believed to be around $18 million.
However, FedEx, a delivery company, suffered even more. In 2017, FedEX was hit by a ransomware attack called NotPetya. It disrupted the company's operations and caused $300 million in losses.
Phishing is a scam technique to obtain sensitive information from people by sending fake emails or text messages. Hackers pretend to be from reputable companies and try to manipulate you to click on malicious links.
Reports say that 88% of organizations around the world experienced phishing attacks in 2019 with healthcare and manufacturing being among the highest-risk industries (Verizon). However, phishing attacks also target individuals. The more phishing emails a hacker sends, the more likely somebody will click on a malicious link and download their malware.
Here’s a list of the most frequently impersonated brands (Check Point):
When you receive an email from Amazon or Facebook asking to change your password or renew credit card details, you hardly expect it to be a phishing attempt. But this is what hackers do. In the surge of COVID-19, hackers changed their targets and Zoom became the most impersonated brand.
Some hackers, however, like to get more personal. 65% of perpetrators used spear phishing (Symantec), which means that they research their target before conducting their attack. This might include information extracted from data breaches, social media accounts, or anything they can find online.
While many internet users believe they will never fall for a phishing attack, one study paints a different picture — 38% of users who don’t undergo cyber awareness training fail phishing tests (KnowBe4).
The FBI’s report says that, between June 2016 and July 2019, there were over 166,000 phishing incidents. The victims lost $26 billion worldwide, with US citizens leading the list with $10 billion in losses across 69,000 victims.
It is believed that a new phishing site launches every 20 seconds, which just proves the scale of these attacks.
Even tech giants can fall victim. Between 2013 and 2015, scammers stole over $100 million from Google and Facebook. They impersonated a company from Taiwan, created fake email accounts, and sent invoices to Google and Facebook’s employees. While it seems like a simple scheme, nobody raised an eyebrow when they made money transfers to the fake company.
Malware is malicious software that can serve different purposes: to steal your data, monitor your browsing activity, or damage your device. Virus, worms, spyware, adware, ransomware — all of these are examples of malicious software.
94% of malware is delivered by email (Verizon). For many years, macOS was considered to be resistant to malware, but things are changing. With the growing popularity of Apple devices, macOS dedicated malware cases have increased by 400% in the last few years. Windows still holds the biggest piece of malware pie, however, with 84% of all reported cases.
With the growing popularity of IoT devices, hackers have shifted their focus. Computer crime statistics show that there were 25 million IoT malware attacks in 2019, with 75% of them targeting routers. Experts predict that, by the end of 2025, a staggering 75 million IoT devices will be operating worldwide, which will attract hackers even more.
Countries with the most malware attacks, in millions (Statista):
To understand how quickly malware can spread, look no further than ILOVEYOU. In 2000, this virus spread like wildfire, sending itself to everyone in the victim’s email list, overwriting files, and causing systems to crash. Estimates say that 10% of the world’s computers were infected, including the CIA, Pentagon, the British Parliament, and large corporations.
Malicious apps can mask their intentions and even make it to official stores like Google Play or the App Store. In March 2020, 56 malicious applications were discovered on Google Play with 1.7 million downloads altogether. They were masking themselves as calculators, recipes, translation apps, and racing games.
Cyberattack statistics by year (the amount of malware infections in millions):
The average cost of a malware attack for a company is $2.6 million (Accenture), making it the most expensive type of cybercrime. The cost involves:
What can you do with an IP address? Launch a DDoS attack against it, for one thing. DDoS (distributed denial of service) attacks occur when hackers clog the victim’s network or device with traffic, slowing down services they’re targeting or even making them crash. Experts predict that DDoS attacks will double from 7.9 million in 2018 to 15.4 million by 2023 (CISCO).
During a DDoS attack, it can be responsible for as much as ¼ of a country’s internet traffic.
Industries most often targeted by DDOS attacks (Imperva):
In 2015, a British hacker left all of Liberia without internet access after a successful DDoS attack. He was hired by Cellcom, a Liberian telecom operator, to launch a series of attacks on a rival telecom company called Lonestar. Lonestar lost tens of millions of dollars in revenue as a result.
DDoS attacks could cost up to $120,000 for a small company and $2 million or more for an enterprise. You can buy a week-long DDoS attack on the dark web for as little as $150. Considering the damage it creates, this is a real bargain!
Don’t become another statistic. Enhance your security with a top-notch VPN.