March 21, 2018 By David Bisson < 1 min read

Illegal cybercrime profits total as much as $200 billion each year, according to an academic study into cybercriminals’ money laundering schemes.

Virtualization-based security firm Bromium announced some of the findings from its nine-month “Into the Web of Profit” study into how cybercriminal launder money online. The report revealed that cybercrime funds make up between 8 and 10 percent of illegal profits laundered across the world. Those figures place global ill-gotten proceeds at $80 billion to $200 billion annually.

Digital Currencies Driving Cybercrime Profits

Virtual currencies have become the primary tools threat actors use to launder money. They could play an even bigger role in future illicit transactions. According to the study, cybercriminals are increasingly using digital money to purchase real estate, with cryptocurrencies expected to account for 25 percent of total property sales in the next few years.

Even so, law enforcement is more intent on monitoring bitcoin, which is driving cybercriminals to look for alternatives, the study found. Some bad actors could turn to Litecoin, the second-most popular cryptocurrency on the Dark Web. Others are expected to embrace in-game currency and goods from “Grand Theft Auto V,” “Minecraft” and other computer games.

The Cybercrime Economy

Dr. Mike McGuire, senior lecturer in criminology at Surrey University in England, conducted the study under Bromium’s sponsorship. His research revealed that cybercrime is more than just a business.

“It’s like an economy which mirrors the legitimate economy,” said McGuire, as quoted by Dark Reading. “The problem here is the cyber economy and the legitimate economy is so intertwined that some laundering is going on in cyber, then back to the real world, then back to cyber.”

McGuire will present further findings from “Into the Web of Profit” during his speaker slot at the RSA Conference 2018 in San Francisco on April 20.

More from

Government cybersecurity in 2025: Former Principal Deputy National Cyber Director weighs in

4 min read - As 2024 comes to an end, it’s time to look ahead to the state of public cybersecurity in 2025.The good news is this: Cybersecurity will be an ongoing concern for the government regardless of the party in power, as many current cybersecurity initiatives are bipartisan. But what will government cybersecurity look like in 2025?Will the country be better off than they are today? What are the positive signs that could signal a good year for national cybersecurity? And what threats should…

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

2024 trends: Were they accurate?

4 min read - The new year always kicks off with a flood of prediction articles; then, 12 months later, our newsfeed is filled with wrap-up articles. But we are often left to wonder if experts got it right in January about how the year would unfold. As we close out 2024, let’s take a moment to go back and see if the crystal balls were working about how the year would play out in cybersecurity.Here are five trends that were often predicted for…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today