Mcafee Looks Back On A Decade Of Cybercrime

For Internet users, it has been a decade of exciting online advances that allow people to communicate, share information and conduct business in ways that were never before possible.

However, cybercrime has also flourished over the last decade, growing by double digits year after year, and costing consumers hundreds of millions of dollars every year. The latest report from McAfee, “A Good Decade for Cybercrime,” examines the past 10 years of cybercriminal tactics and online threats, an era that dramatically changed the face of crime.

“Cybercrime is one of the fastest growing and lucrative industries of our time,” said Dave Marcus, director of security research for McAfee Labs. “From the ‘I Love You Worm’ of 2000, to today’s ever-evolving threats on social media sites, we’ve watched these cybercriminals and their tactics grow in sophistication. The days of destruction purely for bragging rights are over -- now it’s all about making money and not getting caught.”

Over the past 10 years, Internet use has exploded, growing over five-fold from the 361 million users in 2000 to nearly two billion users in 2010, according to InternetWorldStats.com. With a new onslaught of e-commerce sites and revenue opportunities, the Internet has become a trove of money and information that has proven irresistible to cybercrooks.

Snapshot of a Decade

Top exploits representing different eras of cybercrime:

1) “I LOVE YOU” Worm’s False Affection: Estimated damage $15 billion.

The “I love you” worm (named after the subject line of the email it came in) proved irresistible in 2000 as millions of users opened the spam message and downloaded the attached “love letter” file and a bitter virus. This infamous worm cost companies and government agencies $15 billion to shut down their computers and remove the infection.

2) MyDoom’s Mass Infection: Estimated damage $38 billion.

This fast-moving worm first struck in 2004 and tops McAfee’s list in terms of monetary damage. Due to all the spam it sent, it slowed down global Internet access by 10% and reduced access to some websites by 50 percent, causing billions in dollars of lost productivity and online sales.

3) Conficker’s Stealthy Destruction: Estimated damage $9.1 billion.

This 2007 worm infected millions of computers and then took its infections further than the last two worms on our list, as cybercrooks moved from notoriety to professionalism. Conficker was designed to download and install malware from sites controlled by the virus writers.

Top Scams:

1) Fake Anti-Virus Software -- Selling fake antivirus software is one of the most insidious and successful scams of recent years. Cybercrooks play on users’ fear that their computer and information is at-risk by displaying misleading pop-ups that prompt the victim to "purchase" antivirus software to fix the problem. When the victim agrees to purchase, their credit card information is stolen and they wind up downloading malware instead of security software.

2) Phishing Scams -- Phishing, or trying to trick users into giving up personal information, is one of the most common and persistent online threats. Phishing can come in spam emails, spam instant messages, fake friend requests or social networking posts.

3) Phony Websites -- In recent years, cybercrooks have become adept at creating fake websites that look like the real deal. From phony banking sites, to auction sites and e-commerce pages, crooks are constantly laying online traps hoping you will be fooled into entering your credit card or personal information.

Looking ahead to future cybercrime trends, McAfee Labs predicts the continuation of social networking scams and tricks, such as malicious links, phony friend requests and phishing attempts. The scams are likely to get more sophisticated and personalized, especially if users continue to share a great deal of information.

Featured

  • Ransomware Attacks Rise for the First Time in Six Months

    Ransomware attacks have risen for the first time in six months, increasing by 28% month-on-month to 421 attacks. While overall attack volume remained below 500, the uptick may signal a renewed escalation heading into the year’s most active period for cyber criminals. Read Now

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.