Cybercrime as a Global threat to the World Economy

Page created by Andrew Myers
 
CONTINUE READING
Monographic Section

DOI: 10.25115/eea.v39i9.5739
                                                                        Volume 39-9, September 2021 // ISSN: 1133-3197

                   Cybercrime as a Global threat to the World Economy
                          OLEKSIY S. OMELYAN1, DMYTRO S. MELNYK2, YEVHEN V. YUDENKO3,
                                VALENTINA M. FORNOLIAK4, OLEKSANDR YU. KOSHEL5
               1
                 Department of Postgraduate and Doctoral Studies, NATIONAL ACADEMY OF THE SECURITY SERVICE OF
                                        UKRAINE, UKRAINE. E-mail: omelyan33@sci-univ.com
             2
              Research and Organization Centre, NATIONAL ACADEMY OF THE SECURITY SERVICE OF UKRAINE, UKRAINE
               3
                Cycle Comission of Economics and Management, KREMENCHUK FLIGHT COLLEGE OF KHARKIV NATIONAL
                                             UNIVERSITY OF INTERNAL AFFAIRS, UKRAINE
              4
                Department of Fight Against Terrorism and Protection of Participants in Criminal Proceedings, NATIONAL
                                     ACADEMY OF THE SECURITY SERVICE OF UKRAINE, UKRAINE
           5
            UKRAINIAN SCIENTIFIC AND RESEARCH INSTITUTE OF SPECIAL EQUIPMENT AND FORENSIC EXPERTISE OF THE
                                              SECURITY SERVICE OF UKRAINE, UKRAINE

                                                            ABSTRACT

          The purpose of the article is to consider the phenomenon of cybercrime, which causes significant economic
          losses worldwide, to explore the problems of calculating losses through cybercrime, to identify opportunities to
          improve the system of combating cybercrime. The paper concluded that the growing number of cybercrimes in
          enterprises, the constant improvement of information technology and, as a consequence, new opportunities to
          "improve" the tools of their implementation pose global threats to the world economy.
          Keywords: Cyberattack; Economic security; Data protection; Cyber threats to business; Cyber incidents.
          JEL Classification: O33, O34

            Received: June 06, 2021
            Accepted: August 21, 2021
Sección Monográfica

DOI: 10.25115/eea.v39i9.5739
                                                                      Volumen 39-9, Septiembre 2021 // ISSN: 1133-3197

                   El Ciberdelito como Amenaza Global para la Economía
                                         Mundial
                          OLEKSIY S. OMELYAN1, DMYTRO S. MELNYK2, YEVHEN V. YUDENKO3,
                                VALENTINA M. FORNOLIAK4, OLEKSANDR YU. KOSHEL5
               1
                 Department of Postgraduate and Doctoral Studies, NATIONAL ACADEMY OF THE SECURITY SERVICE OF
                                        UKRAINE, UKRAINE. E-mail: omelyan33@sci-univ.com
             2
              Research and Organization Centre, NATIONAL ACADEMY OF THE SECURITY SERVICE OF UKRAINE, UKRAINE
               3
                Cycle Comission of Economics and Management, KREMENCHUK FLIGHT COLLEGE OF KHARKIV NATIONAL
                                             UNIVERSITY OF INTERNAL AFFAIRS, UKRAINE
              4
                Department of Fight Against Terrorism and Protection of Participants in Criminal Proceedings, NATIONAL
                                     ACADEMY OF THE SECURITY SERVICE OF UKRAINE, UKRAINE
           5
            UKRAINIAN SCIENTIFIC AND RESEARCH INSTITUTE OF SPECIAL EQUIPMENT AND FORENSIC EXPERTISE OF THE
                                              SECURITY SERVICE OF UKRAINE, UKRAINE

                                                            RESUMEN

          El propósito del artículo es considerar el fenómeno de la ciberdelincuencia, que causa importantes pérdidas
          económicas a nivel mundial, explorar los problemas de cálculo de pérdidas por ciberdelincuencia, identificar
          oportunidades para mejorar el sistema de lucha contra la ciberdelincuencia. El documento concluyó que el
          creciente número de delitos cibernéticos en las empresas, la mejora constante de la tecnología de la información
          y, como consecuencia, las nuevas oportunidades para "mejorar" las herramientas de su implementación
          plantean amenazas globales para la economía mundial.
          Palabras clave: Ciberataque; Seguridad economica; Protección de Datos; Amenazas cibernéticas a las empresas;
          Incidentes cibernéticos.
          Clasificación JEL: O33, O34

            Recibido: 06 de Junio de 2021
            Aceptado: 21 de Agosto de 2021
Oleksiy S. Omelyan, Dmytro S. Melnyk, Yevhen V. Yudenko, Valentina M. Fornoliak, Oleksandr Yu. Koshel

1. Introduction

    Cybercrime in recent years has become one of the most dangerous problems facing humanity,
negatively affecting both the economic potential of individual states and the stable development of
the world economy. Modern information technologies and technical solutions continue to occupy all
new areas in public life. New information technologies that appear on the market are immediately
integrated with existing ones and implemented into use. On the one hand, such progress increases the
productivity of human labor and opens up new ways of leisure and recreation. On the other hand, all
this significantly expands the scope of cybercriminals' activity and creates conditions for increasing the
effectiveness of hacker attacks. Therefore, cybercrime is growing faster than all other types of
economic crime combined (Cherniavskyi et al., 2019). According to Cybersecurity Ventures, over the
next five years, global cybercrime spending will grow 15 percent a year, reaching $ 10.5 trillion a year
in 2025, compared to $ 3 trillion in 2015. This dangerous phenomenon exponentially exceeds the
damage caused by natural disasters to mankind in a year and will be more profitable than world trade
in all major illicit drugs combined (Morgan & Calif, 2020; Kozlovskyi et al., 2019).
    The active introduction and use of digital technologies and global computer networks in all spheres
of life, including international financial and banking activities, create the preconditions for the use of
these technologies for illegal purposes, thus facilitating the commission of criminal acts in cyberspace,
which mostly go unpunished. Today it is quite problematic to detect and prevent existing cybercrimes,
due to their extreme latency and complexity (Nizovtsev et al., 2021). It is necessary to note the
appearance of the third factor - scale. In particular, in recent years, experts have identified dozens of
types of cybercrimes, both against individuals and their rights, and against the state, including: hacker
attacks, development and distribution of computer viruses, cyberterrorism and cybersabotage, fraud
with plastic payment cards, theft of funds from bank accounts and etc.
    Today, almost all information technology professionals, law enforcement officials around the
world, and the international organization Interpol acknowledge that the cybercrime situation in the
world is deteriorating day by day (Interpol, 2017). Organized crime groups and lone criminals are
increasingly using the global network for illegal purposes. A typical example is the Darknet (a hidden
part of the Internet that only a limited number of people have access to), through which attackers have
effectively created an illegal market for weapons, drugs, sex services, stolen goods, and so on. Thanks
to technologies that provide network anonymity (BitBlinde, I2P, TOR, VPN and others), this part of the
Internet remains almost uncontrolled, and therefore safe and conducive to any type of criminal
activity. However, the growth of the world economy also directly depends on the spread and
integration of information and communication technologies (ICT) in the production process,
transformation of existing and creation of new sectors of the economy through digitalization of
industry and trade, development of the Internet of Things (IoT) (Korolova et al., 2020; Novikovas et al.,
2017).
    Research methods was selected with consideration of the goals and objectives of the scientific
article. Methods of analysis and synthesis have been used to study the types and methods of
committing cybercrimes. With the help of classification and systematization methods, modern
scientific literature on the problems of studying the mechanisms of the impact of cybersecurity on the
development of the world economy was analyzed. The economic and statistical method was applied
to study the economic component of cybercrime, to identify trends in the spread of this antisocial
phenomenon and to substantiate the patterns of its development. It also made it possible to establish
the quantitative influence of individual factors on the object of research, to identify the main factors
that caused changes in the course of economic processes in the illegal cybersphere sector and to
determine direct and indirect losses for businesses from cybercrime.
    Using the abstract-logical method, the logical relationship between the dynamics of cybercrime
growth and information-technological progress is revealed. Thanks to the use of the method, the main
drawback in predicting the quantitative characteristics of committed cybercrimes is revealed and this
is an underestimation of the actual level of cybersecurity due to the victim's unwillingness to contact

                                                                                                           3
Cybercrime as a global threat to the world economy

with law enforcement agencies or due to the impossibility of quickly identifying the signs and
consequences of the crime due to its latency. Also, the abstract-logical method was applied in the
study of the causes of the large-scale cyberattacks appearance, which are currently observed both in
Ukraine and other countries of the world. The publication analyzes a number of international legal acts
regulating cooperation between states in the field of combating cybercrime, including preventing their
economic consequences. Empirical sources of the study were the scientific works of domestic and
foreign scientists, as well as analytical studies of leading IT companies. Through the use of the above-
mentioned methods and materials, the problems of the influence of cybercrime on the legal economic
activity of both the private and public sectors of the world economy were comprehensively analyzed.
    It should be noted that during the study of analytical and prognostic materials, it was concluded
that cybercrime has finished being something local and disorganized. It has penetrated into all spheres
of the economy and is quickly turning into a full-fledged industry. One of the most interesting aspects
of the economic component of cybercrime is how it is stratified. The preparation and implementation
of large-scale cyber incidents is carried out almost according to the scenario of business plans of
multinational corporations, and smaller - as small businesses. Large-scale cyber operations can bring
in profits totaling more than $ 1 billion dollars per year, while the smaller ones are 30-50 thousand
dollars.

2. General characteristics of cybercrime in the economic sphere

    Cybercrime is defined in the recommendations of UN experts as any crime that may be committed
through a computer system or network, in a frame of a computer system or network, or against a
computer system or network (United Nations Congress, 2000). According to the Convention on
Cybercrime of the Council of Europe, adopted on November 21, 2001 in Budapest and the Additional
Protocol (Council of Europe, 2003), cybercrime is divided into the following categories:
    1) offenses against the confidentiality, integrity and availability of computer data and systems (so-
called «CIA crimes»), including:
    • illegal access, for example, by hacking, deception and other means;
    • illegal interception of computer data;
    • interference with data, including deliberate damage, destruction, deterioration, alteration or
concealment of computer information without the right to do so;
    • Interference with the system, including deliberately creating serious obstacles to the functioning
of the computer system, for example, through distributed attacks on critical information
infrastructure;
    • misuse of devices, that is, the manufacture, sale, purchase for use, distribution of devices,
computer programs, computer passwords or access codes in order to carry out «CIA-crimes»;
    2) computer-related offenses, including counterfeiting and fraud, committed using computers;
    3) information-related offenses, including child pornography, racism and xenophobia;
    4) offenses related to violation of copyright and related rights, for example, illegal reproduction and
use of computer programs, audio / video and other types of digital products, as well as databases and
literature (Council of Europe, 2001).
    Crimes committed using the global information network Internet have no borders, that is, they are
transnational in nature. In particular, as the scientists note: «within the framework of one committed
crime, the location of equipment (server), location of data, location of the person who committed the
crime, and location of the consequences may relate to completely different states» (Nizovtsev et al.,
2021). Such offenses may be committed without leaving the office or apartment, from a computer
located in the territory of one state in relation to the subjects of another state, and the data contained
in computer systems are usually short-lived, which means may be promptly destroyed, which will allow
criminals to escape punishment.

                                                                                                         4
Oleksiy S. Omelyan, Dmytro S. Melnyk, Yevhen V. Yudenko, Valentina M. Fornoliak, Oleksandr Yu. Koshel

    Forms of cybercrime are changing and extending to all new achievements of scientific and
technological progress. Given the total introduction of computer systems in all spheres of life, including
trade, finance, banking and manufacturing, insurance and real estate, illicit enrichment through
cyberattacks is quite attractive to criminals. At the same time, various variants of illegal actions are
used, both simple in nature and complex, which are a combination of different methods and
technologies. For example, by gaining control of an accountant's computer, attackers transfer funds
from the company's accounts to their own accounts. However, in order to avoid detecting a shortage,
attackers can transfer money in small amounts regularly for a long time. Although they can withdraw
the maximum possible amount at once. An alternative option for committing a crime is to steal the
accountant's credentials for the client-bank system and then connect to the specified system from the
cybercriminals' computer.
    Extortion of money is not uncommon. Most often, this is done with the help of ransomware, which
secretly encrypts the contents of computer storage media, either all information is encrypted, or
certain types of files or folders. After encryption is complete, access to the encrypted information is
excluded, and the ransomware displays a message on the screen demanding that a certain amount be
transferred to the attackers' account. Usually, payment is accepted in cryptocurrency on anonymous
electronic wallets, which greatly complicates or completely excludes the identification of criminals by
law enforcement agencies. It is calculated that the loss of critical information will cost more expensive
than paying criminals to decipher this information. Crimes related to the theft of payment card data
have already become a classic (Korolova et al., 2020). Using this data, attackers typically make card
clones and withdraw cash at ATMs. In addition, there are options with the transfer of funds from bank
cards to the accounts of cybercriminals. This is also done by buying cryptocurrency and transferring it
to anonymous electronic wallets. It is quite rare for cybercriminals to buy goods or services directly
using stolen payment card data, since in such cases the likelihood of being detained by law
enforcement agencies significantly increases.
    A relatively new method of cybercrime in Ukraine concerns illegal gaining access to computers of
notaries. Having gained such access, attackers can steal personal data and other sensitive information
of notaries' clients. This information can be sold or used in the future for illegal actions against these
customers. More often control over computers of notaries is used to access state registries of real
estate. On behalf of notaries, changes are made to state registers in order to transfer ownership of
certain objects to third parties under the guise of making fictitious transactions. These items are usually
resold several times in the future, making it very difficult to return them to their owners. In case of
detection of illegal re-registration in the state register, the suspicion first falls on the notary on whose
behalf the changes were made to the register.
    There are other ways to enrich themselves illegally by committing cybercrimes. But they all have
one thing in common - attackers receive funds directly from their victims. At the same time, recently
at the interstate level, fundamentally new types of crimes have appeared, which in their totality can
be called cyberwar. A growing trend in the world is the use of cyberattacks against critical information
infrastructure and strategic sectors of the economy, where cyber sabotage and cyber terrorism are
becoming the main weapons.

3. Analysis of some cyber incidents that have occurred in recent years

    The first documented case of cyber diversion can be considered a cyberattack on a uranium
enrichment plant in Natanz (Iran). Although Iran has been a member of the International Atomic
Energy Agency (IAEA) since 1958 and joined the Treaty on the Prohibition of Nuclear Weapons Tests
in the Atmosphere, Outer Space and Underwater since 1963, Iran has sought to have its own nuclear
weapons. To this end, a number of nuclear facilities were built throughout the country - uranium
mines, design bureaus, a research reactor, uranium processing plants, etc. One of the key facilities is
the uranium enrichment plant in the city of Natanz (Iran, Isfahan province).

                                                                                                           5
Cybercrime as a global threat to the world economy

    Of course, such aspirations of Iran could not go unnoticed by the advanced states of the world and
the IAEA. For a long time, attempts were made to resolve the situation through negotiations,
occasionally imposing sanctions and offering Iran favorable terms to pay for the curtailment of its
nuclear program. When once again the negotiations did not achieve the desired result, a cyberattack
was carried out using the malicious software Stuxnet. This malicious software implemented a rather
unusual method of distribution, namely through flash drives, using four 0-day vulnerabilities of the
operating system and carefully checking which automated system it got. If the pest found that it was
not in the target SCADA (Supervisory Control and Data Acquisition) - Siemens Step 7, under the control
of which the uranium enrichment centrifuges functioned, it immediately removed itself from the
system. Instead, entering the target SCADA system, Stuxnet intercepted the control of the centrifuges
and, unnoticed by the operator, began to accelerate and brake them sharply. This extreme mode of
operation led to the failure of 1368 out of 5,000 centrifuges. Iran's nuclear program was rejected a few
years ago. Although no exact estimates of the damage from this cyberattack have been found in open
sources, a number of authors have compared the effects of the software pest to an air force attack on
an object (Cherniavskyi et al., 2019).
    The next illustrative case that should be considered in this publication is a series of cyberattacks on
energy supply companies in Ukraine in late 2015 and early 2016. This is the first documented case in
the world where a significant number of consumers have been cut off as a result of a cyberattack. The
complexity and multistage nature of the attack is striking. First, the cybercriminals carried out a
phishing campaign: an e-mail message containing Microsoft Word documents containing macros was
sent to employees of energy supply companies, primarily IT personnel. When the sent document was
opened, a standard window opened, namely a request to run macros. If the user agreed, the script
downloaded and installed the BlackEnergy3 malware. One of the functions of this malicious software
is hidden remote control of an infected computer, the so-called backdoor.
    Thus, cybercriminals gained control over a number of computers in the corporate networks of
electricity suppliers. The next step was to penetrate the SCADA system. It also took some time, as it
was necessary to examine the network from the inside and identify vulnerabilities that would allow
access to the industrial control system. Then there was a reconfiguration of the uninterruptible power
supply systems of the two power distribution centers in order to ensure that after a general blackout,
these centers would also be left without electricity (Ovcharenko et al., 2020). Also, was provided the
replacement of the embedded software («firmware») of the serial Ethernet interface converters at a
number of substations with the modified software is a malicious software. These converters provided
command processing from the SCADA system to the substation control systems. The modified
firmware not only allowed the converters to be turned off remotely, but also made it impossible to
turn on the electricity remotely after it was turned off.
    On December 23, 2015 criminals turned off the system of uninterrupted power supply and started
turning off power supply through substations. At this time call centers of the power suppliers received
thousands of fake phone calls from Russian phone numbers. In fact, a phone distributed denial of
service (DDoS) attack was carried out. Piles of fake phone calls made impossible to accept calls from
de-energized users. At the end of the attack the criminals applied the malicious software KillDisk in
order to delete all the files from operator’s stations and disable them. It is worth mentioning, that
criminals also attempted to conduct a cyber-attack on the airport “Boryspil”, where malicious software
BlackEnergy3 was detected on one of the computers. However, that time the attackers did not manage
to intervene in the work of the airport.
    The consumers of “Prykarpattiaoblenergo” have suffered from the cyber-attack the most: about 30
substations were turned off, nearly 230 thousand residents have been cut off from the electricity for
about 1 - 6 hours. “Chernivtsioblenergo” and “Kyivoblenergo” were also under attack, but the
consequences have proved to be much less. In general, the break in power supply has amounted from
1 to 3,5 hours. The overall shortage – 73 MWt*h (0.015 % from the amount of daily consumption in
Ukraine) (Zetter, 2016). A mass cyber-attack on organizations, entrepreneurships and establishments
of Ukraine in summer 2017 is also worth attention. This attack also had a long term of thorough

                                                                                                         6
Oleksiy S. Omelyan, Dmytro S. Melnyk, Yevhen V. Yudenko, Valentina M. Fornoliak, Oleksandr Yu. Koshel

preparation. Around 80% of affected computers were in Ukraine, but information systems of other
countries have also fallen under effect of the cyber-attack.
    The first stage was penetration of the software distribution services “M.E.doc.”, which was widely
used for document circulation and reporting in Ukraine. It is worth noting, that law-enforcing agencies
warned the authority of the company-developer of “M.E.doc.” about low levels of their informational
infrastructure protection. Besides, the “M.E.doc.” update server was on the hosting of WNet Internet
provider, which shortly before the described events was accused of cooperating with Russian
intelligence services by the Security service of Ukraine.
    In general, the cyber-attack was carried out in the following way. Having access to “M.E.doc.”
update server hosting, the criminals (Russian intelligence agencies or cyber-criminals, which acted on
request of Russian intelligence agencies) implemented another update pack malicious software
NotPetya (also known as Petya.A, Petya.C, SortaPetya, Petna, ExPetr, Petya.2017, Nyetya). During the
automatic update of the program “M.E.doc.” the wrecker NotPetya hit the computers which were
being updated. NotPetya has coded the information carriers (hard drives) on the affected computers
and blocked access to them. After that a message with the ransom demand on the Blockchain
appeared on the screen of the affected computer.
    At first glance, a cyberattack by the malicious software NotPetya looked like an attack by "ordinary"
cybercriminals with selfish motives, that is, in order to make money by extortion. And only during
thorough investigation involving both domestic and foreign experts it was established that this
cyberattack was in fact planned and carried out by the Russian intelligence agencies as a cybersabotage
or cyberattack. Such conclusions were due, in particular, to the fact that NotPetya did not in fact leave
the possibility to decrypt the media even if the attackers were paid a ransom. In other words, NotPetya
was not a cryptographer (Ransomware), but a viper (Wiper).
    An unusual feature of the wrecker NotPetya is its collection of USREOU numbers (Unified State
Register of Enterprises and Organizations of Ukraine). Each registered organization in Ukraine has a
unique USREOU number. According to cybersecurity experts, using USREOU, it is possible to conduct
targeted cyberattacks against a specific legal entity (company or organization). In particular, it is
possible to try to direct a cyberattack only on the computers of Ukrainian organizations, filtering out
foreign ones (although, if the attackers had such a task, they failed to limit the attack to Ukrainian
companies only). The Maersk Group estimates that the company's losses, especially those of its Maersk
Line, Damco and APM Terminals divisions, will total $200-300 million (Leovy, 2017). The American
logistic and postal company FedEx estimated losses in its subsidiary in the Netherlands TNT Express in
about the same amount ($300 million). А The American pharmaceutical company Merck stated that it
did not receive revenue of up to $240 million. According to experts, the damage from the attack of the
NotPetya virus reaches 10 billion US dollars in the world as a whole (Greenburg, 2018).
    Malware distribution tactics have proved to be successful. It was used again during a recent
cyberattack on SolarWinds, a company that develops software to manage companies' IT infrastructure.
The attackers gained access to the SolarWinds Orion build system and added a malicious remote
hidden control software (a backdoor already described, something like BlackEnergy3) to the program
update file. This file was then distributed to SolarWinds customers through an automatic update
platform. After booting, the backdoor connected to a remote server to receive "tasks" to run on the
affected computer. Dozens of US companies and state institutions have have suffered the cyberattack.
As in the case of the NotPetya cyberattack, Russian "government hackers" (that is, hackers who work
for the intelligence services or are their staff) were accused of the cyberattack.

4. The difference between cyberattacks and "ordinary" cybercrimes

   It is much more difficult to plan, prepare and implement a cyberattack. This applies in particular to
the malware used: the above-described Stuxnet proved to be a unique malware at the time in its
complexity and perfection, and NotPetya collected and used it during the distribution of the USREOU.
In addition, there is the involvement of "non-computer" means (massive phone calls to call centers

                                                                                                           7
Cybercrime as a global threat to the world economy

during the attack on the Ukrainian energy sector). Cyberattacks are carried out in many stages,
stretched over time, which is also generally uncharacteristic of "ordinary" criminals who need to make
a profit as soon as possible. The cost of preparing and implementing such cyberattacks is very high,
unattainable for "ordinary" cybercriminals.
    The attacker does not receive material benefits directly from the victim (although the attack may
be disguised as a ransom). The benefit for the attacker is the greatest possible losses for the victims of
a cyberattack, its weakening, provocation of panic, etc. Such targets are more common in combat, but
in cyberspace, where cyber-terrorism is analogous to conventional terrorist attack, and cyber-sabotage
is analogous to conventional sabotage. After all, in war, the warring parties also try to weaken each
other and sow panic in the ranks of the enemy. It should be noted that during a cyberattack it is
possible to implement an "ordinary" cybercrime. For example, let's remember the above-mentioned
cyberattacks on notaries' computers for the purpose of making illegal changes to state registers. If such
illegal changes are large-scale (affecting hundreds of thousands or even millions of real estate, mostly
housing), it will cause mass panic, significant social tensions and loss of trust in public authorities.
Provoking panic itself is a good achievement during hostilities. But in addition, panic and distraction
from law enforcement can be used to prepare for and implement another cyberattack.
    At present, we can already talk about the cyber war between Russia and Ukraine, which is taking
place in parallel with Russia's armed invasion of Ukraine, as well as some cyber operations of Russia
against Western countries. The danger of cyberattacks can be illustrated by the recent attack on the
Colonial Pipeline. This pipeline transports 45% of diesel fuel, gasoline and aviation fuel on the east
coast of the United States (Russon, 2021). The attack shut down all pipelines in the system for five
days, and US President Joseph Biden was forced to declare a state of emergency.
    Extremely informative is the case that occurred in the United States with the then well-known
company Yahoo Inc. On September 22, 2016, Yahoo reported the theft of information related to at
least 500 million user accounts at the end of 2014 (Perlroth, 2016). The stolen information included
information about usernames, email addresses, phone numbers, encrypted or unencrypted security
questions and answers, dates of birth, and encrypted passwords.
    As a result of this hacking and disclosure, Yahoo's stock price fell 3 percent, resulting in a loss of
about $1.3 billion in market capitalization. In addition, the company, which at the time was negotiating
the sale of its business to Verizon, was forced to agree to a discount of 7.25 percent on the proposed
purchase price, which reduced its value by $350 million. Yahoo was also fined $35 million by the US
Securities and Exchange Commission for late disclosure. In addition, Yahoo had to face a nationwide
lawsuit initiated on behalf of more than one billion users who claimed that their personal information
had been compromised as a result of data leaks from the company. Yahoo's management even had to
answer to the US Senate for leaks. The two-year lag between the breach occurring and Yahoo warning
customers, however, isn't that unusual. According to cybersecurity firm FireEye's Mandiant division,
organizations require on average 146 days to discover they've been breached. Also, 53 percent of
compromised organizations first learn that they were breached only thanks to an external entity
(Schwartz, 2016).
    Steve Grobman, senior vice president and technical director of McAfee, drew attention to the
important problem of hidden losses from cybercrime. According to him, "the seriousness and
frequency of cyber threats to business are constantly increasing with the creation of new technologies
and the development of existing ones, which significantly increases the number of objects to attack.
In addition, criminals are taking advantage of the fact that people are increasingly working remotely
at home as a result of the COVID-19 pandemic (McAfee, 2020). After all, remote work often requires
remote access to the company's servers. But if the server is under the supervision and protection of a
qualified system administrator, the employee's home computer may be vulnerable to cyberattacks.
After accessing an employee's home computer, attackers automatically gain access to the company's
server using employee authentication, VPN settings, etc.

                                                                                                        8
Oleksiy S. Omelyan, Dmytro S. Melnyk, Yevhen V. Yudenko, Valentina M. Fornoliak, Oleksandr Yu. Koshel

    Experts from the IT company McAfee and the Center for Strategic and International Studies (CSIS)
say: “While industry and government are aware of the financial and national security implications of
cyberattacks, unplanned downtime, the cost of investigating breaches and disruption to productivity
represent less appreciated high impact costs. We need a greater understanding of the comprehensive
impact of cyber risk and effective plans in place to respond and prevent cyber incidents given the
hundreds of billions of dollars of global financial impact.” (McAfee, 2020). The theft of intellectual
property and money causes significant damage to companies. The least obvious losses from
cybercrime are related to reduced efficiency of companies. According to the study, 92% of
corporations reported other negative business consequences of cyberattacks in addition to financial
losses and loss of working hours. The McAfee report details the following hidden costs and long-term
effects of cybercrime on businesses, namely:
    - system downtime (such downtime proved to be a common problem for two-thirds of respondent
organizations. The average loss for the longest downtime in 2019 was $ 762,231. A third (33%) of study
participants reported that security incidents caused IT-systems downtime, which cost them in the
amount of 100 to 500 thousand US dollars);
    - reduced efficiency (due to system downtime, companies lost an average of nine working hours
per week, which led to a decrease in the efficiency of their work. The average suspension time was 18
hours);
    - incident response costs (according to the report, in most companies the average response time to
a cyberthreat from detection to resolution is 19 hours. Most problems can be solved on their own, but
large-scale incidents often require external consultants. Costs of their services are a significant share
of the costs associated with responding to a large-scale cyberattack);
    - damage to the brand and reputation (the cost of restoring the brand image with external
consultants or new employees to prevent future incidents is also included in the negative results of
cybercrime. 26% of respondents reported that downtime caused by a simple cyberattack resulted in
significant damage to their brand) (McAfee, 2020).
    In this regard, the decisions made during the meeting of the Group of Experts to conduct a
comprehensive study of cybercrime, which took place on April 6-8, 2021 in Vienna, are noteworthy.
This group of experts was formed as part of the Commission on Crime Prevention and Criminal Justice
(CCPCJ), as the main policy-making body of the United Nations, to conduct a comprehensive study of
cybercrime and develop responses.
    States should undertake surveys to measure the impact of cybercrime on businesses, including
measures implemented, employee training, types of cyberincidents that affect them and the costs
associated with recovering from and preventing cyber-incidents. States should support businesses and
communities in raising awareness of cybercrime risks, mitigation strategies and enhancing
cyberpractices, as these can have significant downstream preventive benefits (Seventh session…,
2021).

5. Conclusions

   First, it should be noted that both large and small businesses can now become victims of
cyberattacks by highly qualified so-called "government" hackers, who enjoy the support of the
intelligence services of individual states. The purpose of the attack will not be enrichment, but inflicting
as much damage as possible. Secondly, it can be stated that resisting targeted cyberattacks is much
more difficult than conventional cybercrime. This necessitates paying more attention to cybersecurity.
However, the cost of security will in any case be less than the financial damage and reputational
damage in case of a successful cyberattack. Third, if previously ensuring their own cybersecurity was
the business of the firms themselves, in modern realities, effective countering of cyber threats is no
longer possible alone. We need close cooperation between companies and cooperation with
government institutions responsible for cybersecurity.

                                                                                                           9
Cybercrime as a global threat to the world economy

    It should be emphasized, that if cyber wars are currently taking place between states, in the long
run this way of eliminating competitors can be adopted by the firms themselves, especially large
corporations. Of course, such cyber wars of corporations will be conducted covertly, but the
consequences of cyberattacks can be felt not only by a particular business, but also by the entire
economy of the world. Attention should also be paid to the reports of McAfee-CSIS analysts, who claim
that most of the damage from cybercrime is directly related to what experts call the "cost of data
recovery", i.e. the operation of deleting, modifying or restoring personal data. Even given the fact that
after such procedures, criminals could no longer benefit from the stolen data, their victims were forced
to spend significant funds on the recovery of personal information.
    Therefore, it is important for all businesses in the world to have the same mandatory security
measures, ensure economic and financial transparency of companies and government agencies,
standardize cybersecurity requirements and create a multilevel cybersecurity system, increase
knowledge about cybersecurity through organized training of employees and officials development
and implementation of plans to prevent and respond to cyberattacks, ensuring the protection of
critical infrastructure from cyberattacks.

References

1. Cherniavskyi, S.S., Golovkin, B.N., Chornous, Y.M., Bodnar, V.Y., & Zhuk, I.V. (2019). International
    cooperation in the field of fighting crime: directions, levels and forms of realization. Journal of
    Legal, Ethical and Regulatory Issues, 22(3), 1-11.
2. Council of Europe. (2001). Convention on Cybercrime. Retrieved from
    https://zakon.rada.gov.ua/laws/show/994_575#Text
3. Council of Europe. (2003). Additional Protocol to the Convention on Cybercrime, concerning the
    criminalisation of acts of a racist and xenophobic nature committed through computer systems.
    Retrieved from https://rm.coe.int/168008160f
4. Greenburg, A. (2018). The untold story of NotPetya, the most devastating cyberattack in history.
    Retrieved      from      https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-
    crashed-the-world/
5. Interpol. (2017). Global Cybercrime Strategy. Retrieved from
    https://www.interpol.int/content/download/5586/file/Summary_CYBER_Strategy_2017_01_EN
    %20LR.pdf
6. Korolova, V. V., Dolianovska, I. M., Hryhorchuk, M. V., & Vyshnevska, Y. V. (2020). Theoretical and
    practical aspects of counteracting unfair competition and violation of antimononpoly laws.
    International Journal of Criminology and Sociology, 9, 1533-1541.
7. Kozlovskyi, S., Butyrskyi, A., Poliakov, B., Bobkova, A., Lavrov, R., & Ivanyuta, N. (2019).
    Management and comprehensive assessment of the probability of bankruptcy of Ukrainian
    enterprises based on the methods of fuzzy sets theory. Problems and Perspectives in Management,
    17(3), 370-381. DOI: 10.21511/ppm.17(3).2019.30
8. Leovy, J. (2017). Cyberattack cost maersk as much as $300 million and disrupted operations for 2
    weeks. Retrieved from https://www.latimes.com/business/la-fi-maersk-cyberattack-20170817-
    story.html
9. McAfee. (2020). New McAfee Report Estimates Global Cybercrime Losses to Exceed $1 Trillion.
    Retrieved from
    https://www.mcafee.com/enterprise/en-us/about/newsroom/press-releases/press-
    release.html?news_id=6859bd8c-9304-4147-bdab-
    32b35457e629&utm_source=twitter_mcafee&utm_medium=social_organic&utm_term&utm_co
    ntent&utm_campaign&sf240838844=1
10. Morgan, S., & Calif, S. (2020). Cybercrime to cost the world $10.5 trillion annually by 2025.
    Retrieved from https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/

                                                                                                      10
Oleksiy S. Omelyan, Dmytro S. Melnyk, Yevhen V. Yudenko, Valentina M. Fornoliak, Oleksandr Yu. Koshel

11. Nizovtsev, Yu. Yu., Parfylo O. A., Barabash O. O., Kyrenko S. G. & Smetanina N. V. (2021).
    Mechanisms of money laundering obtained from cybercrime: the legal aspect Journal of Money
    Laundering Control. Retrieved from https://doi.org/10.1108/JMLC-02-2021-0015
12. Novikovas, A., Novikoviene, L., Shapoval, R., & Solntseva, K. (2017). The peculiarities of motivation
    and organization of civil defence service in Lithuania and Ukraine. Journal of Security and
    Sustainability Issues, 7(2), 369-380.
13. Ovcharenko, M.O., Tavolzhanskyi, O.V., Radchenko, T.M., Kulyk, K.D., & Smetanina, N.V. (2020).
    Combating illegal drugs trafficking using the internet by means of the profiling method. Journal of
    Advanced Research in Law and Economics, 11(4), 1296–1304.
14. Perlroth, N. (2016). Yahoo says hackers stole data on 500 million users in 2014. Retrieved from
    https://www.nytimes.com/2016/09/23/technology/yahoo-hackers.html
15. Russon, M.-A. (2021). US fuel pipeline hackers 'didn't mean to create problems'. Retrieved from
    https://www.bbc.com/news/business-57050690
16. Schwartz, M. J. (2016). Yahoo Hacked by Cybercrime Gang, Security Firm Reports. Retrieved from
    https://www.bankinfosecurity.com/yahoo-hacked-by-cybercrime-gang-security-firm-reports-a-
    9428
17. Seventh session of the of the Open-ended intergovernmental Expert Group to Conduct a
    Comprehensive Study on Cybercrime, 6-8 April 2021. (2021) Retrieved from
    https://www.unodc.org/documents/organized-crime/cybercrime/Cybercrime-April-
    2021/Working-documents/EGM_Cybercrime_Agreed_paragraphs_Status_7_April_6_PM.pdf
18. United Nations Congress. (2000). Crimes related to computer networks. Tenth United Nations
    Congress on the Prevention of Crime and the Treatment of Offenders Vienna, 10-17 April 2000 //
    A/CONF.             187/10.            Retrieved            from            https://documents-dds-
    ny.un.org/doc/UNDOC/GEN/V99/909/56/PDF/V9990956.pdf?OpenElement
19. Zetter, K. (2016). Everything we know about Ukraine's power plant hack. Retrieved from
    https://www.wired.com/2016/01/everything-we-know-about-ukraines-power-plant-hack/

                                                                                                           11
You can also read