Silence on Cyber Crimes Endangers Critical Infrastructure | #cybercrime | #infosec


Second-Place Winner in 2025 The Cyber Edge Writing Award.

Improving trust in the cyber crime reporting process is paramount to the cyber defense of our nation’s critical infrastructure, as it allows law enforcement to disrupt and capture the criminal groups responsible for the attacks. By engaging in simple policy and procedure changes, law enforcement agencies can remove doubts about the victim’s privacy when reporting and encourage future victims to come forward at a minimal cost.

In their annual report published in April 2024, the Internet Crime Complaint Center (IC3) found that 14 of the 16 critical infrastructure sectors were affected by ransomware. Each of these sectors is considered so vital that their incapacitation could cause debilitating ripples throughout the economy, national public health and safety, and the security of our nation. In this same report, the IC3 estimates that crimes of this nature could be even more prevalent than what is currently known due to businesses underreporting crimes to enforcement agencies. The underreporting of cybersecurity crimes is not surprising, as public disclosure of these attacks damages the victimized company’s brand image to the public, directly affecting its bottom line.

Businesses typically communicate successes and failures in terms of profit and loss rather than vulnerabilities mitigated. In 2023, the IC3 reported $12.5 billion in losses due to cyber crime—a statistic with the weight to demand the attention of anyone involved. In addition to the findings from the IC3, a study was conducted by Comparitech, a cybersecurity research company, and found that publicly traded companies affected by a cybersecurity breach had stock prices that underperformed in stock market expectations by -3.2% on average for six months following a breach disclosure. To put that into perspective, the Change Healthcare breach is projected to have cost between $2.3 and $2.45 billion combined in upfront costs and lost stock gains. This does not include other secondary effects, such as the impacts of the Health Insurance Portability and Accountability Act (HIPAA) violations. According to the study, health care companies had the most severe impacts, while also having the highest number of reported ransomware incidents to the IC3 among critical infrastructure sectors. These companies have significant financial motivation to keep any cyber attacks under wraps. Unfortunately, this is counter to their interests and the benefit of others in their industry, as these reports contribute to the disruption of the criminals executing such attacks. 

One of the challenges beyond getting cyber-attack victims to participate in reporting, in many cases, is that these criminals are located abroad. By abusing the global reach of cyberspace, they can commit crimes in countries that do not have extradition agreements or that do not criminalize cyber attacks as harshly. While global cooperation in the pursuit of criminals is the ideal, it may not always be a reality. In cases where we do not have the cooperation of the nation where they reside, we should continue to make every effort to impact their ability to operate. Then, by following up and publicly demonstrating that inhibiting Cybercrime-as-a-Service groups benefits both the United States and the nations in which the criminals reside, negotiations on further cooperation can be encouraged. The United Nations adopted a treaty toward this goal of international cooperation against cyber crime in late December. This convention is the first international criminal justice treaty negotiated in more than 20 years and provides the means to fortify international efforts to protect the public online. This kind of international cooperative effort to improve proactive preventative action against cyber crime is vital to protecting our critical infrastructure. One such example of these proactive efforts came earlier this year when the FBI seized the website of Lockbit, a Russian-based Cybercrime-as-a-Service group, no doubt in part due to information gathered from the incident reports of its victims. Part of that seizure included the keys needed to decrypt the information of ransomware victims, meaning those who reported through official channels may have had the opportunity to recover their operations. This group was by far the highest reported executor of ransomware attacks according to the IC3 annual report, making this a significant victory.



 

 

 

 



Source link

——————————————————–


Click Here For The Original Source.

.........................

National Cyber Security

FREE
VIEW