Mcafee Looks Back On A Decade Of Cybercrime

For Internet users, it has been a decade of exciting online advances that allow people to communicate, share information and conduct business in ways that were never before possible.

However, cybercrime has also flourished over the last decade, growing by double digits year after year, and costing consumers hundreds of millions of dollars every year. The latest report from McAfee, “A Good Decade for Cybercrime,” examines the past 10 years of cybercriminal tactics and online threats, an era that dramatically changed the face of crime.

“Cybercrime is one of the fastest growing and lucrative industries of our time,” said Dave Marcus, director of security research for McAfee Labs. “From the ‘I Love You Worm’ of 2000, to today’s ever-evolving threats on social media sites, we’ve watched these cybercriminals and their tactics grow in sophistication. The days of destruction purely for bragging rights are over -- now it’s all about making money and not getting caught.”

Over the past 10 years, Internet use has exploded, growing over five-fold from the 361 million users in 2000 to nearly two billion users in 2010, according to InternetWorldStats.com. With a new onslaught of e-commerce sites and revenue opportunities, the Internet has become a trove of money and information that has proven irresistible to cybercrooks.

Snapshot of a Decade

Top exploits representing different eras of cybercrime:

1) “I LOVE YOU” Worm’s False Affection: Estimated damage $15 billion.

The “I love you” worm (named after the subject line of the email it came in) proved irresistible in 2000 as millions of users opened the spam message and downloaded the attached “love letter” file and a bitter virus. This infamous worm cost companies and government agencies $15 billion to shut down their computers and remove the infection.

2) MyDoom’s Mass Infection: Estimated damage $38 billion.

This fast-moving worm first struck in 2004 and tops McAfee’s list in terms of monetary damage. Due to all the spam it sent, it slowed down global Internet access by 10% and reduced access to some websites by 50 percent, causing billions in dollars of lost productivity and online sales.

3) Conficker’s Stealthy Destruction: Estimated damage $9.1 billion.

This 2007 worm infected millions of computers and then took its infections further than the last two worms on our list, as cybercrooks moved from notoriety to professionalism. Conficker was designed to download and install malware from sites controlled by the virus writers.

Top Scams:

1) Fake Anti-Virus Software -- Selling fake antivirus software is one of the most insidious and successful scams of recent years. Cybercrooks play on users’ fear that their computer and information is at-risk by displaying misleading pop-ups that prompt the victim to "purchase" antivirus software to fix the problem. When the victim agrees to purchase, their credit card information is stolen and they wind up downloading malware instead of security software.

2) Phishing Scams -- Phishing, or trying to trick users into giving up personal information, is one of the most common and persistent online threats. Phishing can come in spam emails, spam instant messages, fake friend requests or social networking posts.

3) Phony Websites -- In recent years, cybercrooks have become adept at creating fake websites that look like the real deal. From phony banking sites, to auction sites and e-commerce pages, crooks are constantly laying online traps hoping you will be fooled into entering your credit card or personal information.

Looking ahead to future cybercrime trends, McAfee Labs predicts the continuation of social networking scams and tricks, such as malicious links, phony friend requests and phishing attempts. The scams are likely to get more sophisticated and personalized, especially if users continue to share a great deal of information.

Featured

  • Securing the Future

    Two security experts sit down with Security Today’s editor in chief Ralph C. Jensen to discuss what they see emerging and changing over the next several years along with how security stakeholders can harness these innovations into opportunities. Read Now

  • Collaboration Made Easy Using a Work Management Platform

    Effective collaboration between security operators, teams and other departments is critical to the smooth functioning of organizations. Yet, as organizations grow in complexity, it becomes more difficult for teams to coordinate with each other. This is compounded by staffing shortages, turnover and ineffective collaboration tools. Read Now

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

  • Report: 78 Percent of CISOs Seeing Significant Impact from AI-Powered Cyber Threats

    Darktrace recently unveiled its 2025 State of AI Cybersecurity report. The findings reveal that 78% of Chief Information Security Officers (CISOs) surveyed say that AI-powered threats are having a significant impact on their organizations, a 5% increase1 from 2024. While an increasing number of CISOs report feeling a significant impact from AI threats, more than 60% now say that they are adequately prepared to defend against these threats, an increase of nearly 15% year-over-year. However, insufficient AI knowledge and skills and a shortage of personnel and talent continue to be listed as the two top inhibitors to a successful defense. Read Now

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.