{"id":10466,"date":"2025-04-07T20:39:17","date_gmt":"2025-04-07T20:39:17","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=10466"},"modified":"2025-04-18T15:24:15","modified_gmt":"2025-04-18T15:24:15","slug":"cybercrime-out-of-control","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/","title":{"rendered":"Escalating Cyber Threats: Why Cybercrime is Out of Control and How to Fight Back"},"content":{"rendered":"\n<p>In 2019, reports of cybercrime to the IC3 reached a new high of 467,361 reports after a gradual upward trajectory. The next year, that total leaped to 791,790 and has not dropped below 800,000 since<sup>(<\/sup><sup>1)<\/sup>.&nbsp;<\/p>\n\n\n\n<p>Needless to say, the threat of cybercrime has increased drastically in recent years. The annual losses to cybercrime have nearly tripled since 2020<sup>(2)<\/sup>. Because of this, it\u2019s never been more of a priority to take your online security and threat intelligence seriously.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-common-cyber-threats-and-attack-vectors-nbsp\"><span class=\"ez-toc-section\" id=\"Common_Cyber_Threats_and_Attack_Vectors\"><\/span>Common Cyber Threats and Attack Vectors&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>New technology has presented cybercriminals with the ability to reach large quantities with high efficiency and minimal effort. However, many scams still rely on the same strategies that have worked for years. This has led to the current cyber threat landscape where perpetrators meticulously manipulate and blackmail their targets, both electronically and emotionally.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-phishing-and-social-engineering-nbsp\"><span class=\"ez-toc-section\" id=\"Phishing_and_Social_Engineering\"><\/span>Phishing and Social Engineering:&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/phishing-attack-repsonse\/\" target=\"_blank\" rel=\"noreferrer noopener\">Phishing attacks<\/a> were far and away the largest threat to cybersecurity in 2023 with nearly 300,000 victim<sup>(3)<\/sup>. With virtually endless communication methods, perpetrators can target their victims through every outlet of their online occupancy.&nbsp;<\/p>\n\n\n\n<p>These scams play on the human aspect of their victims by posing as a trusted entity and extracting personal data or monetary assets. Even large companies can fall prey. This was seen with Change Healthcare, who lost an estimated $1.6 billion dollars in a combination phishing-ransomware attack in 2024<sup>(<\/sup><sup>4<\/sup><sup>)<\/sup>.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Is Cybercrime Getting Out of Control? The Alarming Rise of Cybercrime &amp; Understanding Common Threats\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/D40JlrFcE8Q?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-ransomware-amp-malware-nbsp\"><span class=\"ez-toc-section\" id=\"Ransomware_Malware\"><\/span>Ransomware &amp; Malware:&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Speaking of malicious programs, <a href=\"https:\/\/www.digitalforensics.com\/cyber-security\/ransomware-attack\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware<\/a> and <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/malware-prevention\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware attack<\/a>s are of the largest growing cybersecurity threats facing companies. In 2023, over 72%<sup>(5)<\/sup> of business worldwide succumbed to ransomware attacks, with the average cost per attack sitting at $5.13 million<sup>(6)<\/sup>.&nbsp;<\/p>\n\n\n\n<p>Different types of malware attacks include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Viruses: <\/strong>A malicious program that can duplicate and spread throughout your entire system when running on your device&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Worms: <\/strong>These operate similarly to a virus, except this malware does not need an active host application for it to spread&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Trojans: <\/strong>These programs disguise themselves as useful software to infiltrate a network, getting their name from the Greek myth&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ransomware: <\/strong>A software that encrypts network data and provides the perpetrator with blackmail leverage to demand a ransom to resume access&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Rootkits: <\/strong>A sophisticated software that gives unauthorized parties remote access to your network and goes largely undetected by security systems&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Keyloggers: <\/strong>A program which tracks each keystroke on a device to harvest log-in credentials and other confidential data&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-data-breaches-amp-identity-theft-nbsp\"><span class=\"ez-toc-section\" id=\"Data_Breaches_Identity_Theft\"><\/span>Data Breaches &amp; Identity Theft:&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Data breaches pose a cyber threat to both companies and their consumer base. Even the government isn\u2019t without risk, with 137 cases of government data breaches in 2023<sup>(7)<\/sup>. This results in obvious reputational damage and financial loss for the organizations, while also leading to additional cyber threats like identity theft, financial fraud, <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/avoid-online-blackmail\/\">online blackmail<\/a>, and sextortion targeting patrons.&nbsp;<\/p>\n\n\n\n<p>These attacks often utilize an amalgamation of a few of the other strategies we\u2019ve discussed, commonly beginning with a phishing email that contains malware that compromises the targeted system or deceives the recipient through social engineering. In fact, roughly 90% of data breaches begin with a phishing attack<sup>(<\/sup><sup>8)<\/sup>.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-sextortion-nbsp\"><span class=\"ez-toc-section\" id=\"Sextortion\"><\/span>Sextortion:&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/different-types-of-sextortion\/\">Sextortion<\/a> is one of the fastest-escalating cyber threats in recent years. NCMEC\u2019s CyberTipline received an average of 812 reports per week in 2023, an increase of roughly 250 compared to the prior year<sup>(9)<\/sup>.&nbsp;<\/p>\n\n\n\n<p>These scams utilize social engineering to wear down the victim\u2019s safeguards and gain enough trust to initiate the exchange of intimate content. Sextortionists attack both their victims mentally and monetarily, with fear and shame being the driving factors.&nbsp;<\/p>\n\n\n\n<p>Some tips for avoiding sextortion schemes and red flags to look out for include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Don\u2019t exchange any sensitive data with online strangers&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Avoid oversharing and use increased privacy settings on online platforms&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Be wary of individuals who try to coerce you into any action online&nbsp;<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Is Cybercrime Getting Out of Control? Part 2 | Solutions and Proactive Measures\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/UicaQMfToiU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-rise-of-ai-assisted-cybercrime-nbsp\"><span class=\"ez-toc-section\" id=\"The_Rise_of_AI_assisted_Cybercrime\"><\/span>The Rise of AI assisted Cybercrime.&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The previously mentioned cyber threats are being fast-tracked thanks in large part to the development of AI. So much so that in 2024, the FBI released a warning in regard to the increase in speed, scale, and automation of cyber threats due to AI technology<sup>(<\/sup><sup>10)<\/sup>.&nbsp;<\/p>\n\n\n\n<p>This technology can be used to scan security systems for vulnerabilities, generate and translate phishing messages, and create <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-role-of-deepfakes-in-sextortion\/\">deepfake <\/a><a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-role-of-deepfakes-in-sextortion\/\" target=\"_blank\" rel=\"noreferrer noopener\">c<\/a><a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-role-of-deepfakes-in-sextortion\/\">ontent <\/a>that increases the validity of their deception. Deepfake content has also expedited blackmail and sextortion with perpetrators manufacturing explicit or compromising media of their victims.&nbsp;<\/p>\n\n\n\n<p>Deepfakes were used to facilitate cyber threats at a 3,000% higher rate in 2023 than in 2022<sup>(11)<\/sup>, displaying the rapid explosion of the technology\u2019s use in the criminal circle. The technology led to threats of violence and nearly cost a Maryland High School principal his job after a deepfake audio clip of him making racist remarks about students was created<sup>(<\/sup><sup>1<\/sup><sup>2<\/sup><sup>)<\/sup>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-cybercrime-is-getting-out-of-control-nbsp\"><span class=\"ez-toc-section\" id=\"Why_Cybercrime_is_Getting_Out_of_Control\"><\/span>Why Cybercrime is Getting Out of Control.&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>There are numerous factors at play when it comes to the constantly rising prevalence of cyber threats. As already discussed, the development of new technologies and their corresponding nefarious uses has expanded the volume and volatility of online criminal activity.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Another driving force is our expanding reliance on Internet of Things (IoT) devices in both the personal and professional partitions of our lives. While these devices allow for unparallelled connectivity between devices on a network, they also facilitate the compromission of those very networks through the infiltration of a singular point.&nbsp;&nbsp;<\/p>\n\n\n\n<p>This is compounded with a rapid increase in online operations within businesses that is not matched with heightened threat intelligence. A large contributor is a lack of proper employee training, with roughly 95% of all breaches tied back to human error<sup>(<\/sup><sup>1<\/sup><sup>3<\/sup><sup>)<\/sup>. This shows just how crucial threat analysis is for both electronic systems and those operating them.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-implementing-appropriate-measures-nbsp\"><span class=\"ez-toc-section\" id=\"Implementing_Appropriate_Measures\"><\/span>Implementing Appropriate Measures.&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The escalation of cybercrime is an issue that impacts the entire world. Therefore, a collective effort between individuals, businesses, sectors, and nations is needed in order to combat cyber threats effectively.&nbsp;<\/p>\n\n\n\n<p>It is necessary for national governments to prioritize protection and prevention practices. While laws have been passed around the world in a global effort to deter cybercriminals, there is a dire demand to allocate resources for creating better public awareness and threat intelligence.&nbsp;<\/p>\n\n\n\n<p>These efforts must also be met by the private sector. Organizations must move beyond basic defense and adopt a formal <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/cybersecurity-strategy\/\">cybersecurity strategy<\/a> that integrates risk management with proactive technical controls. Businesses like social media platforms need to continue implementing tools such as Take It Down and perform hasher enforcement of policies against cybercrime. Additionally, cybersecurity firms must continue to evolve to stay ahead of cyber threats.\u00a0<\/p>\n\n\n\n<p>However, the most important contributor to our concerted cybersecurity is you. We all need to individually make a committed effort to improving our online awareness by researching current cybercrime trends and implementing safe online habits.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-taking-proactive-steps-to-combat-cybercrime-nbsp\"><span class=\"ez-toc-section\" id=\"Taking_Proactive_Steps_to_Combat_Cybercrime\"><\/span>Taking Proactive Steps to Combat Cybercrime.&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The data would suggest that cyber threats are not just here to stay; they\u2019re expanding. Even so, this doesn\u2019t mean you can\u2019t safely spend time online. Educating yourself on cybersecurity may feel daunting, but <a href=\".\">DFC<\/a> has a library of free informational resources available online.&nbsp;&nbsp;<\/p>\n\n\n\n<p>We\u2019ve got information on safe online practices, strong security system software, common cybercrimes, and everything in between. If you are currently navigating a threat and need a <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/report-cybercrime-private-investigator\/\">cybercrime helpline<\/a>, check out our <a href=\"\/blog\/\">online blogs<\/a> and start taking a proactive approach to your online safety today.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-source\"><span class=\"ez-toc-section\" id=\"Source\"><\/span>Source:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.statista.com\/statistics\/267546\/number-of-complaints-about-us-internet-crime\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Complaints on internet crime annual 2023 | Statista<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.statista.com\/statistics\/267132\/total-damage-caused-by-by-cybercrime-in-the-us\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cybercrime: monetary damage United States 2023 | Statista<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.statista.com\/statistics\/184083\/commonly-reported-types-of-cyber-crime-us\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">U.S. most reported cybercrime by victim number 2023 | Statista<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.hornetsecurity.com\/en\/blog\/change-healthcare-cyber-attack\/#:~:text=Bad%20actors%20entered%20a%20software,the%20dark%20web%2C%20he%20said.\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">What the Change Healthcare Cyber Attack Means for the US Healthcare Industry<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.statista.com\/statistics\/204457\/businesses-ransomware-attack-rate\/\" target=\"_blank\" rel=\"noreferrer noopener\">Global firms targeted by ransomware 2023 | <\/a><a href=\"https:\/\/www.statista.com\/statistics\/204457\/businesses-ransomware-attack-rate\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">S<\/a><a href=\"https:\/\/www.statista.com\/statistics\/204457\/businesses-ransomware-attack-rate\/\" target=\"_blank\" rel=\"noreferrer noopener\">tatista<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.usatoday.com\/money\/blueprint\/business\/vpn\/cybersecurity-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cybersecurity Statistics in 2024<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.statista.com\/statistics\/1455591\/us-gov-data-breaches-by-state\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">U.S. government data breaches by state 2023 | Statista<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/shieldbyteinfosec.com\/the-silent-threat-how-data-breaches-start-with-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Silent Threat: How 90% of Data Breaches Start with Phishing ?<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/info.thorn.org\/hubfs\/Research\/Thorn_TrendsInFinancialSextortion_June2024.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Thorn_TrendsInFinancialSextortion_June2024.pdf<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\/sanfrancisco\/news\/fbi-warns-of-increasing-threat-of-cyber-criminals-utilizing-artificial-intelligence\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">FBI Warns of Increasing Threat of Cyber Criminals Utilizing Artificial Intelligence \u2014 FBI<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/thenextweb.com\/news\/deepfake-fraud-rise-amid-cheap-generative-ai-boom\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Deepfake fraud attempts are up 3000% in 2023 \u2014 here\u2019s why<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.bbc.com\/news\/articles\/ckg9k5dv1zdo\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The AI clip that convinced &#8211; and divided &#8211; a Baltimore suburb<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.mimecast.com\/resources\/ebooks\/state-of-human-risk-2025\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The State of Human Risk 2025 | Mimecast<\/a>&nbsp;<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"In 2019, reports of cybercrime to the IC3 reached a new high of 467,361 reports after a gradual&hellip;","protected":false},"author":131,"featured_media":10467,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-10466","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why Cybercrime is Out of Control and How to Fight Back<\/title>\n<meta name=\"description\" content=\"What is causing the rise of cybercrime in 2025. We examine the factors that are leading to cybercrime getting out of control.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Escalating Cyber Threats: Why Cybercrime is Out of Control and How to Fight Back\" \/>\n<meta property=\"og:description\" content=\"What is causing the rise of cybercrime in 2025. We examine the factors that are leading to cybercrime getting out of control.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-07T20:39:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-18T15:24:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250405_-_Is_Cybercrime_Out_of_Control-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jack Gillespie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jack Gillespie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/cybercrime-out-of-control\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/cybercrime-out-of-control\\\/\"},\"author\":{\"name\":\"Jack Gillespie\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\"},\"headline\":\"Escalating Cyber Threats: Why Cybercrime is Out of Control and How to Fight Back\",\"datePublished\":\"2025-04-07T20:39:17+00:00\",\"dateModified\":\"2025-04-18T15:24:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/cybercrime-out-of-control\\\/\"},\"wordCount\":1380,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/cybercrime-out-of-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/20250405_-_Is_Cybercrime_Out_of_Control-1.png\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/cybercrime-out-of-control\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/cybercrime-out-of-control\\\/\",\"name\":\"Why Cybercrime is Out of Control and How to Fight Back\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/cybercrime-out-of-control\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/cybercrime-out-of-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/20250405_-_Is_Cybercrime_Out_of_Control-1.png\",\"datePublished\":\"2025-04-07T20:39:17+00:00\",\"dateModified\":\"2025-04-18T15:24:15+00:00\",\"description\":\"What is causing the rise of cybercrime in 2025. We examine the factors that are leading to cybercrime getting out of control.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/cybercrime-out-of-control\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/cybercrime-out-of-control\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/cybercrime-out-of-control\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/20250405_-_Is_Cybercrime_Out_of_Control-1.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/20250405_-_Is_Cybercrime_Out_of_Control-1.png\",\"width\":1080,\"height\":1080,\"caption\":\"What is causing cybercrime to get so out of control? We explore.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/cybercrime-out-of-control\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Escalating Cyber Threats: Why Cybercrime is Out of Control and How to Fight Back\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\",\"name\":\"Jack Gillespie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"caption\":\"Jack Gillespie\"},\"description\":\"Cybercrime Writer & Awareness Advocate \\\"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\\\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \\\"Sextortion Awareness for Children\\\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/jack-gillespie-21aa85222\\\/\"],\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/jack-gillespie\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why Cybercrime is Out of Control and How to Fight Back","description":"What is causing the rise of cybercrime in 2025. We examine the factors that are leading to cybercrime getting out of control.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/","og_locale":"en_US","og_type":"article","og_title":"Escalating Cyber Threats: Why Cybercrime is Out of Control and How to Fight Back","og_description":"What is causing the rise of cybercrime in 2025. We examine the factors that are leading to cybercrime getting out of control.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2025-04-07T20:39:17+00:00","article_modified_time":"2025-04-18T15:24:15+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250405_-_Is_Cybercrime_Out_of_Control-1.png","type":"image\/png"}],"author":"Jack Gillespie","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Jack Gillespie","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/"},"author":{"name":"Jack Gillespie","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba"},"headline":"Escalating Cyber Threats: Why Cybercrime is Out of Control and How to Fight Back","datePublished":"2025-04-07T20:39:17+00:00","dateModified":"2025-04-18T15:24:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/"},"wordCount":1380,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250405_-_Is_Cybercrime_Out_of_Control-1.png","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/","name":"Why Cybercrime is Out of Control and How to Fight Back","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250405_-_Is_Cybercrime_Out_of_Control-1.png","datePublished":"2025-04-07T20:39:17+00:00","dateModified":"2025-04-18T15:24:15+00:00","description":"What is causing the rise of cybercrime in 2025. We examine the factors that are leading to cybercrime getting out of control.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250405_-_Is_Cybercrime_Out_of_Control-1.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/04\/20250405_-_Is_Cybercrime_Out_of_Control-1.png","width":1080,"height":1080,"caption":"What is causing cybercrime to get so out of control? We explore."},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/cybercrime-out-of-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Escalating Cyber Threats: Why Cybercrime is Out of Control and How to Fight Back"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba","name":"Jack Gillespie","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","caption":"Jack Gillespie"},"description":"Cybercrime Writer & Awareness Advocate \"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \"Sextortion Awareness for Children\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.","sameAs":["https:\/\/www.linkedin.com\/in\/jack-gillespie-21aa85222\/"],"url":"https:\/\/www.digitalforensics.com\/blog\/author\/jack-gillespie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/10466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=10466"}],"version-history":[{"count":12,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/10466\/revisions"}],"predecessor-version":[{"id":14401,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/10466\/revisions\/14401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/10467"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=10466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=10466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=10466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}