New BlackBerry Report Shows How Cyber Criminals Are Becoming More Effective and Dangerous

A common trend that has emerged these past few years is that cyber criminals tend to adapt to the various security protocols that are put in place to keep them at bay. This has resulted in a bit of an arms race, and it turns out that the cybercriminal of today is a great deal more devious and effective at their malicious actions than they would have been just a decade or so ago.

A new report that has been released by BlackBerry highlights the changes that have occurred within the cybercriminal ecosystem. With all of that having been said and now out of the way, it is important to note that this report revealed that small businesses are among the most common victims of these kinds of malicious actors. Another thing to note about this data is that it shows how cybercriminals are starting to work together because of the fact that this is the sort of thing that could potentially end up making their success more likely.

One way in which criminals are collaborating can be seen with ransomware. Oftentimes the cybercriminal that is behind a ransomware attack will have purchased the ransomware from a different individual entirely, and there are entire marketplaces that are devoted to the facilitation of these kinds of products and services.

What’s more is that the digital transformation that is occurring which often involves shifting various databases to the cloud is making it easier for cybercriminals to do whatever it is that they are trying to do. Malicious actors are leveraging cloud computing tech to disseminate their malware, and this has also reduced the costs that are often associated with this type of endeavor with all things having been considered and taken into account.

The collaboration of cybercriminals is something that should have been stopped, but now that it is well under way there is nothing that can be done except to build up better security that can prevent them from doing their criminal activities. Most people will have an uphill battle to face if they want to protect themselves to any extent.


Illustration Via: Freepik / pikisuperstar
Read next: An Android Trojan named Xenomorph can target over 56 banking, finance applications
Previous Post Next Post