
What is cybercrime?
Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money. However, occasionally cybercrime aims to damage computers or networks for reasons other than profit. These could be political or personal.
Cybercrime can be carried out by individuals or organizations. Some cybercriminals are organized, use advanced techniques and are highly technically skilled. Others are novice hackers.
What are the types of cybercrime?
Cybercrime, often referred to as cyber offenses in legal contexts, includes a wide range of malicious activities such as:
- Email and internet fraud.
- Identity fraud (where personal information is stolen and used).
- Cyber theft, including the unauthorized acquisition of financial or card payment data.
- Theft and sale of corporate data.
- Cyberextortion (demanding money to prevent a threatened attack).
- Ransomware attacks (a type of cyberextortion).
- Cryptojacking (where hackers mine cryptocurrency using resources they do not own).
- Cyberespionage (where hackers access government or company data).
- Interfering with systems in a way that compromises a network.
- Infringing copyright.
- Illegal gambling.
- Selling illegal items online.
- Soliciting, producing, or possessing child pornography.
These are some of the most common types of cybercrime, but new threats continue to emerge as technology evolves. Cybercrime involves one or both of the following:
- Criminal activity targeting computers using viruses and other types of malware.
- Criminal activity using computers to commit other crimes.
Cybercriminals that target computers may infect them with malware to damage devices or stop them working. They may also use malware to delete or steal data. Or cybercriminals may stop users from using a website or network or prevent a business providing a software service to its customers, which is called a Denial-of-Service (DoS) attack.
Cybercrime that uses computers to commit other crimes may involve using computers or networks to spread malware, illegal information or illegal images.
Cybercriminals are often doing both at once. They may target computers with viruses first and then use them to spread malware to other machines or throughout a network. Some jurisdictions recognize a third category of cybercrime which is where a computer is used as an accessory to crime. An example of this is using a computer to store stolen data.
Examples of cybercrime
Here are some famous examples of different types of cybercrime attack used by cybercriminals:
1. Malware attacks
A malware attack is where a computer system or network is infected with a computer virus or other type of malware. A computer compromised by malware could be used by cybercriminals for several purposes. These include stealing confidential data, using the computer to carry out other criminal acts, or causing damage to data.
A famous example of a malware attack was the WannaCry ransomware attack, a global cybercrime committed in May 2017. WannaCry is a type of ransomware, malware used to extort money by holding the victim’s data or device to ransom. The ransomware targeted a vulnerability in computers running Microsoft Windows.
When the WannaCry ransomware attack hit, 230,000 computers were affected across 150 countries. Users were locked out of their files and sent a message demanding that they pay a Bitcoin ransom to regain access.
Worldwide, the WannaCry cybercrime is estimated to have caused $4 billion in financial losses. To this day, the attack stands out for its sheer size and impact.
2. Double extortion ransomware attacks
In recent years, ransomware has evolved into a more aggressive form known as double extortion. In these attacks, cybercriminals not only encrypt a victim's data but also exfiltrate it before the encryption process. This stolen data is then used as leverage: if the ransom isn't paid, the attackers threaten to publish the sensitive information. A notable example is the Cl0p ransomware group, which targeted multinational corporations and government bodies by exploiting vulnerabilities in widely used file transfer tools. Victims were faced with the dual threat of data leaks and operational disruption — a powerful tactic that significantly increased ransom compliance rates.
3. Phishing
A phishing campaign is when spam emails, or other forms of communication, are sent with the intention of tricking recipients into doing something that undermines their security. Phishing campaign messages may contain infected attachments or links to malicious sites, or they may ask the receiver to respond with confidential information.
A famous example of a phishing scam took place during the World Cup in 2018. According to our report, 2018 Fraud World Cup , the World Cup phishing scam involved emails that were sent to football fans. These spam emails tried to entice fans with fake free trips to Moscow, where the World Cup was being hosted. People who opened and clicked on the links contained in these emails had their personal data stolen.
Another type of phishing campaign is known as spear-phishing. These are targeted phishing campaigns which try to trick specific individuals into jeopardizing the security of the organization they work for.
Unlike mass phishing campaigns, which are very general in style, spear-phishing messages are typically crafted to look like messages from a trusted source. For example, they are made to look like they have come from the CEO or the IT manager. They may not contain any visual clues that they are fake.
Cybercriminals are also beginning to leverage AI tools to craft more convincing phishing messages. These tools can imitate writing styles, generate flawless grammar, and even mimic familiar communication patterns. Combined with data collected from social media, this enables highly personalized attacks that are difficult to detect.
In addition, attackers use AI to automate and scale attacks — such as scanning for vulnerabilities or deploying malware across multiple targets — reducing effort while increasing reach.
4. Smishing and vishing attacks
Smishing (SMS phishing) and vishing (voice phishing) are on the rise, targeting users through text messages and phone calls instead of email. These scams often impersonate banks, delivery services, or government agencies to trick recipients into revealing sensitive data or clicking malicious links.
One example involves SMS messages claiming a package delivery requires customs payment, leading to a fake payment form that harvests credit card details. In vishing, attackers may pose as tech support or law enforcement, pressuring victims to share login credentials or transfer funds.
5. Attacks on critical infrastructure
Cybercriminals increasingly target essential services such as healthcare, energy, and transportation systems. These attacks can cause widespread disruption and put lives at risk. A prominent example is the Colonial Pipeline attack in 2021, where ransomware crippled fuel delivery across the southeastern United States, prompting emergency responses and temporary fuel shortages. Hospitals, water treatment facilities, and public transit networks have also been affected by similar threats, underlining the societal impact of cybercrime beyond financial loss.
6. Crime-as-a-Service (CaaS)
A major development in the cybercrime ecosystem is the emergence of Crime-as-a-Service (CaaS) platforms. These dark web marketplaces allow anyone — regardless of technical skill — to purchase ready-made tools and services such as ransomware kits, phishing campaigns, credential dumps, and DDoS-for-hire. This “cybercrime economy” has dramatically lowered the barrier to entry for aspiring attackers and is fueling the rapid growth and professionalization of cybercrime networks.
7. Distributed DoS attacks
Distributed DoS attacks (DDoS) are a type of cybercrime attack that cybercriminals use to bring down a system or network. Sometimes connected IoT (Internet of Things) devices are used to launch DDoS attacks. A DDoS attack overwhelms a system by using one of the standard communication protocols it uses to spam the system with connection requests. Cybercriminals who are carrying out cyberextortion may use the threat of a DDoS attack to demand money. Alternatively, a DDoS may be used as a distraction tactic while another type of cybercrime takes place. A famous example of this type of attack is the 2017 DDoS attack on the UK National Lottery website. This brought the lottery’s website and mobile app offline, preventing UK citizens from playing. The reason behind the attack remains unknown, however, it is suspected that the attack was an attempt to blackmail the National Lottery.
Defend Against Cybercrime – Get Kaspersky Premium Free Trial
Don’t let cybercriminals win. Protect your identity, data, and finances with Kaspersky’s powerful antivirus solution.
Try Kaspersky PremiumImpact of cybercrime
Generally, cybercrime and cyberattacks have continued to rise in the last years. According to a study by Cybersecurity Ventures, in 2023, a cyberattack occurred every 39 seconds, equating to over 2,200 incidents per day. This represents an increase from 2022, when an incident occurred every 44 seconds.
The "State of Cybersecurity Resilience 2023" report by Accenture, based on a survey of 3,000 security and business executives from large organizations, also confirms the persistent threat of cyberattacks. Particularly concerning is the rise in ransomware attacks, which, according to a report by WatchGuard, saw a 95% increase in 2023 compared to the previous year. This surge in attacks affects not only businesses but also individuals, as many companies store sensitive data and personal information from customers.
Financial, operational, and reputational damage
A single cyberattack — whether a data breach, malware infection, ransomware, or DDoS attack — can have devastating financial and reputational consequences.
Based on the latest data from the Hiscox Cyber Readiness Report 2024, the impact of cyberattacks on businesses has significantly increased. The report reveals that 67% of companies experienced a cyberattack in the past 12 months, with the same percentage reporting an increase in cyber incidents compared to the previous year.
The impact often extends beyond direct financial loss. Nearly 47% of affected businesses struggled to attract new customers, 43% lost existing ones, and 38% suffered reputational damage through negative media coverage.
Cybercrime doesn’t only harm companies — individuals can also face serious consequences, including identity fraud, financial loss, and erosion of trust.
Targeting of SMEs and supply chain vulnerabilities
Small and medium-sized businesses (SMEs) and remote infrastructures have become key targets, especially since the shift to widespread remote work during the COVID-19 pandemic. Many of these organizations lack robust cybersecurity defenses, making them vulnerable to ransomware, phishing, and supply chain attacks.
Cybercriminals increasingly exploit trusted third-party vendors to infiltrate multiple victims at once — a tactic known as supply chain attacks. Incidents like the SolarWinds and Kaseya breaches demonstrate how a single compromised provider can impact thousands of downstream businesses. According to Hiscox, nearly one in five SMEs believe that a successful cyberattack would likely force them to shut down entirely, highlighting the urgent need for stronger cybersecurity across the supply chain.
Global response and cybersecurity legislation
As cyber threats grow in scale and sophistication, international cooperation and regulation have become essential. Organizations like Europol, Interpol, and the United Nations now play an active role in coordinating cross-border cybercrime investigations. Countries have also introduced new legislation to strengthen digital defenses. The EU's NIS2 Directive, the U.S. Cyber Incident Reporting for Critical Infrastructure Act, and global frameworks like the Budapest Convention on Cybercrime are examples of evolving legal structures aimed at improving response and resilience. These efforts also place greater responsibility on companies to protect data and report breaches quickly.
How to report a cybercrime
Australia:
The Australian Cyber Security Centre has information about how to report a cybercrime here.
Europe:
Europol has a useful website here which collates the relevant cybercrime reporting links for each EU member state.
Hong Kong:
Anti-Deception Coordination Centre (Hong Kong)
India:
Visit Cyber Crime Portal
New Zealand:
Report cybercrime on Netsafe (New Zealand)
South Africa:
Report a Cybercrime in South Africa
Saudi Arabia:
Visit https://nca.gov.sa/en/ and report cybercrime in Saudi Arabia
Thailand:
Contact Thai Hotline in Thailand
UAE:
You can find information about how to report cybercrime in the UAE on this official website here.
United States:
File a report with the Internet Crime Complaint Center (IC3) as soon as possible. Visit ic3.gov for
more information.
United Kingdom:
Contact Action Fraud as soon as possible – find out more on their website here.
How to protect yourself against cybercrime
Given its prevalence, you may be wondering how to stop cybercrime? Here are some sensible tips to protect your computer and your personal data from cybercrime:
1. Keep software and operating system updated
Keeping your software and operating system up to date ensures that you benefit from the latest
security patches to protect your computer.
2. Use anti-virus software and keep it updated
Using anti-virus or a comprehensive internet security solution like Kaspersky Premium is a smart way to protect your system from attacks. Anti-virus software allows you to scan, detect and remove threats before they become a problem. Having this protection in place helps to protect your computer and your data from cybercrime, giving you piece of mind. Keep your antivirus updated to receive the best level of protection.
3. Use strong passwords
Be sure to use strong passwords that people will not guess and do not record them anywhere. Or use a reputable password manager to generate strong passwords randomly to make this easier.
4. Never open attachments in spam emails
A classic way that computers get infected by malware attacks and other forms of cybercrime is via email attachments in spam emails. Never open an attachment from a sender you do not know.
5. Do not click on links in spam emails or untrusted websites
Another way people become victims of cybercrime is by clicking on links in spam emails or other messages, or unfamiliar websites. Avoid doing this to stay safe online.
6. Do not give out personal information unless secure
Never give out personal data over the phone or via email unless you are completely sure the line or email is secure. Make certain that you are speaking to the person you think you are.
7. Contact companies directly about suspicious requests
If you are asked for personal information or data from a company who has called you, hang up. Call them back using the number on their official website to ensure you are speaking to them and not a cybercriminal. Ideally, use a different phone because cybercriminals can hold the line open. When you think you’ve re-dialed, they can pretend to be from the bank or other organization that you think you are speaking to.
8. Be mindful of which website URLs you visit
Keep an eye on the URLs you are clicking on. Do they look legitimate? Avoid clicking on links with unfamiliar or URLs that look like spam. If your internet security product includes functionality to secure online transactions, ensure it is enabled before carrying out financial transactions online.
9. Keep an eye on your bank statements
Spotting that you have become a victim of cybercrime quickly is important. Keep an eye on your bank statements and query any unfamiliar transactions with the bank. The bank can investigate whether they are fraudulent.
A good antivirus will protect you from the threat of cybercrime. Learn more about Kaspersky Premium.