Connect with us

Tech

As long as the cybercriminals’ business model works, companies are vulnerable to attack

Published

on

As long as the cybercriminals’ business model works, companies are vulnerable to attack


Credit: Pixabay/CC0 Public Domain

When cybercriminals targeted the UK nursery chain Kido, it represented a disturbing new low for the hackers. They threatened to expose personal data about young children and their families, shocking parents and cybersecurity experts alike.

The Kido hack is far from an isolated incident. Cyberattacks have struck organizations across many sectors in the last year, disrupting businesses from retail to manufacturing.

These recurring attacks highlight an important reality—cybercrime has become a very profitable activity. While the official advice is not to pay hackers, the frequency of these attacks suggests that many companies do. They will want to avoid losing their data or having their business and reputation damaged. But most will never admit to paying up.

Whenever there is money involved, more criminals want to participate—which has led to cybercrime becoming an organized industry. Cybercrime has shifted from individual and uncoordinated group attacks to an established business model that generates revenue and mirrors genuine companies.

This model has its own supply chains, affiliates (for example, criminals who use the malware rather than developing it) and even customer support.

The cybercrime ecosystem has evolved to run using the “as-a-service” model. For legitimate businesses, this is an efficiency model that lets them pay to use something “as a service,” rather than purchasing it. Just as businesses use software or security as a service, criminals have mirrored this model into a similar underground economy of cybercrime.

In this underground market, hackers sell ready-made malware, rent out botnets (networks of infected devices), and run payment platforms. They even go as far as providing and help pages for the criminals they serve.

Their customers may shop for ransomware as a service when looking to extort ransoms from victims. Others, looking to cause disruption rather than , rent botnets to conduct “denial of service” attacks that flood the victim’s systems with traffic and disable them.

In the cybercrime economy, criminals known as “initial access brokers” act as middlemen. These are skilled cybercriminals who break into systems, providing the initial access and selling it as a package for others to use.

The packages often include stolen data, usernames and passwords, or even direct access to compromised networks. This essentially opens the door for cybercriminals with fewer skills to compromise businesses.

Business is booming

This business model is not only thriving right now—it will also persist. That’s just simple economics—everyone involved in the “business” benefits. This includes the experienced hackers and malware developers who take their cut, the brokers selling bundled services and the service-hosting and payment-platform providers taking their share. It also includes the affiliate criminals carrying out attacks and collecting their profits.

This makes it low-risk and profitable, effectively the definition of a successful business. Societal attitudes towards hackers often glamorize them as genius outsiders, while hacking itself—particularly when large corporations are the target—can mistakenly be seen as a lesser crime.

But the truth is that when the cybercrime business model succeeds, it has a lasting impact on the wider economy. Trust in businesses in the UK and beyond is damaged.

The attacks on UK retailers such as M&S and Co-op were carried out using a cybercrime service called DragonForce. This is available for a fee, reportedly set at 20% of the ransom payment. In the case of M&S and Co-op, it caused major disruption to their operations, and millions of pounds in losses.

Meanwhile, the attack on the Jaguar Land Rover (JLR) caused production at the carmaker to be halted for weeks, resulting in a huge loss.

The JLR attack caused a ripple effect on sales, deliveries, the workforce and smaller businesses in the supply chain. These companies may face bankruptcy if proceeds from the loan underwritten by the government do not reach them all.

To interrupt this recurrence of attacks, it’s vital to break the cybercriminals’ model by addressing the two fundamentals that make it successful.

First, businesses should stop paying the criminals. As long as they pay, criminals will try their luck. But it is reported that nearly 50% of companies do pay up. This is money that will fuel this crime and encourage the hackers.

Second, companies must build better resilience into their infrastructure and operations. While companies’ security has improved greatly, they are still not investing enough in things such as AI to improve their resilience to attack and their ability to keep operating (or at least to minimize disruption).

This was evident in the attacks on UK businesses. It took M&S four months to restore all of its services, while JLR’s production will not be at full capacity for several weeks.

Both Harrods and Co-op maintained operations during their incidents. This minimized interruptions, prevented large data losses and reduced the financial hit to the businesses.

There are no quick fixes, but there are steps businesses can take to make cybercrime less profitable for criminals and less disruptive for victims. The UK government is heading in the right direction with the Cyber Security and Resilience Bill and its consultations on ransomware payments.

But the real change must come from companies themselves. Without commitment, the strongest policy and legislation will remain words on paper. While prevention remains critical for a company, resilience if the worst happens is what really decides how much damage an attack can cause.

If companies can maintain operations and refuse to pay ransoms, cybercriminals lose their extortion power. And without that power there will be less profit and so less interest. But maybe most importantly, fewer families like those affected by the Kido attack will worry about their children’s data being held hostage.

Provided by
The Conversation


This article is republished from The Conversation under a Creative Commons license. Read the original article.The Conversation

Citation:
As long as the cybercriminals’ business model works, companies are vulnerable to attack (2025, October 7)
retrieved 7 October 2025
from https://techxplore.com/news/2025-10-cybercriminals-business-companies-vulnerable.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Tech

Attacks on GPS Spike Amid US and Israeli War on Iran

Published

on

Attacks on GPS Spike Amid US and Israeli War on Iran


Shipping through the Strait of Hormuz—the narrow but vital oil trade route in the Middle East—has almost ground to a halt since the start of the United States and Israel’s war against Iran. Tankers in the region have faced military strikes and a spike in GPS jamming attacks, a new analysis says.

Since the first US-Israeli strikes against Iran on February 28, more than 1,100 ships operating across the Gulf region have had their GPS or automatic identification system (AIS) communications technology disrupted, says Ami Daniel, the CEO of maritime intelligence firm Windward. Ships have been made to appear as if they were inland on maps, including at a nuclear power plant, the firm says.

The analysis comes as maritime officials have warned of a “critical” risk to ships operating in the region and as the initial conflict has quickly expanded to involve countries across the Middle East. At least three tankers in the region have been damaged in the conflict.

“We’re seeing a lot of GPS jamming,” Daniel says of shipping in the Strait of Hormuz and surrounding areas. The levels of electronic interference are “way above the baseline” of usual interference, he says. “It’s becoming very dangerous to go in and out.”

Over the last few years, attacks against GPS and navigation systems have been on the rise—largely driven by the wars in Ukraine and Gaza. They can impact people’s phones or devices, but also disrupt the safety and navigation systems in planes and ships. The electronic interference largely comes in two forms: jamming and spoofing. During jamming attacks, satellite signals are overwhelmed so that positioning data isn’t available. Whereas spoofing can create false signals that make an object appear incorrectly on a map—for instance, making ships appear as if they are inland at airports.

Inaccurate location data can lead to ships running off course, potentially increasing the chances of them crashing into other tankers, running aground, or causing damaging oil spills. In warzones, electronic interference is often used to try and disrupt the navigation systems of drones or missiles, which can rely on location data to find and hit their targets.

Analysis of shipping data by Windward found that there has been an “escalating” level of electronic interference across Iranian, United Arab Emirates, Qatari, and Omani waters since the initial strikes on February 28. Daniel says that the majority of the activity the company has identified so far has been jamming rather than spoofing. The company’s analysis says it has identified around 21 “new clusters” where ships have had their AIS data jammed in recent days.

“Ships were falsely positioned at airports, a nuclear power plant, and on Iranian land, creating navigation and compliance risks,” a report from the firm says. “AIS signals have also been diverted to the Barakah Nuclear Power Plant and nearby waters, while hundreds of other vessels are creating circle-like patterns off UAE, Qatari, and Omani waters.”

GPS and AIS interference within the Strait of Hormuz and the surrounding area is not new. In June 2025, as Israel and Iran exchanged missile fire, significant jamming in the region was reported.

While almost all commercial air travel has been grounded around the Middle East, there have been signs of electronic interference on aircraft flying ahead of and around the strikes. “There are at least six new spoofing signatures in the Middle East,” says Jeremy Bennington, vice president of positioning, navigation, and timing strategy and innovation at technology firm Spirent Communications. “Hundreds of flights have been impacted. However, that decreased significantly over the weekend as flights have been canceled.”



Source link

Continue Reading

Tech

War in Iran Spiked Oil Prices. Trump Will Decide How High They Go

Published

on

War in Iran Spiked Oil Prices. Trump Will Decide How High They Go


Oil prices surged on Monday following the United States and Israel’s attacks on Iran this weekend, as some analysts predict that it could soon reach over $100 a barrel. Amid escalating attacks on oil and gas infrastructure in the region and stopped traffic in a crucial shipping route, experts tell WIRED that how the White House directs the conflict over the coming week—as well as Iran’s and other oil producers’ responses—will be key in determining just how high prices eventually climb.

The price of Brent crude jumped to almost $80 a barrel—a nearly 13 percent increase over Friday’s prices—when markets opened Sunday evening. The market has been pricing in the risk of the US’s aggressive stance toward Iran for months, says Tyson Slocum, the director of the energy program at the progressive think tank Public Citizen, insulating prices from an even more severe jump. But the disorganized US follow-through to the initial attack—which killed Ayatollah Ali Khamenei, Iran’s supreme leader—is introducing much more uncertainty.

“For all of Trump saying, ‘Hey, you know, we took out Khamenei, we knew exactly where he was,’—apparently we didn’t do the same for Iran’s attack capabilities,” Slocum says. “It seems like our plan was to take out Khamenei and then hope for the best.”

Iran controls the Strait of Hormuz, one of the most important shipping routes in the world. One out of every five barrels of oil travels through the strait. Major members of the Organization of the Petroleum Exporting Countries (OPEC), the world’s dominant oil and gas cartel, rely almost entirely on the strait to get their product out of the region.

“As long as I have been in the oil market, Iran and the closure of the Strait of Hormuz has been kind of the ultimate risk scenario for prices,” says Canadian oil market researcher Rory Johnston. Usually, he says, OPEC would respond to an international crisis that involves oil by increasing production. “But if OPEC’s emergency production is on the other side of the problem area, it doesn’t do as much good.” Johnston compares the region to a garden hose, where a kink in one section can decrease output.

Throughout the weekend, while Iranian officials sent mixed messages on whether the strait is formally closed, traffic through the strait dropped to near zero. Insurance companies have jacked up policies on ships traveling through the strait, while some ships have been hit by drone strikes. What seems to be happening, Johnston says, is more of a “voluntary closure” than an official one.

There are worse scenarios for oil prices that could unfold in the coming days than just the closure of the strait. In September of 2019, drones hit major oil production facilities east of the Saudi Arabian capital of Riyadh. While the Houthi rebel movement in Yemen publicly claimed responsibility for the attack, US officials blamed Iran. The attack temporarily shot oil prices up 15 percent.

On Monday, Saudi officials said that they had closed a major domestic refinery following drone strikes, while a few other oil and gas fields across the region were also shut down. Qatar LNG, the country’s state-run liquefied natural gas producer, said Monday it was shutting down production due to drone strikes, sending gas prices in Europe spiking. Johnston says that continued, serious strikes like these could have a massive impact on prices.

“Going back to the garden hose thing … [that would be] more like taking a gun and blasting off the faucet,” Johnston says.

Clayton Seigle, a senior fellow at the Center for Strategic and International Studies, a think tank based in Washington, DC, agrees. “The more desperate Iran becomes, the greater likelihood for it to use energy as leverage to advance its interests,” he says. “If tankers abandon the Gulf trade in large numbers, and certainly if major oil infrastructure is damaged, we’re likely to see triple-digit crude prices again.”



Source link

Continue Reading

Tech

Apple’s Price-Friendly iPhone 17e Gets a MagSafe Upgrade

Published

on

Apple’s Price-Friendly iPhone 17e Gets a MagSafe Upgrade


Apple’s first hardware launch of 2026—not counting the second-generation AirTag it debuted at the end of January—is the next iteration of the price-friendly iPhone: the iPhone 17e. The company announced the handset via an online press release, ahead of its “Special Apple Experience” in New York City this Wednesday.

While last year’s iPhone 16e was widely criticized for its questionable value—it replaced the iPhone “SE” models from yesteryear and jacked the price up from $429 to $599—the newer model in the series has some notable features that were missing in its predecessor, like Apple’s MagSafe technology and the Dynamic Island. The price remains firm at $599 despite the challenging economic environment and the memory shortage.

The iPhone 17e opens for preorder today and will be widely available on March 11.

E for Effort

Apple has stuck with the same 6.1-inch OLED display as the iPhone 16e, down to the same old-school notch design. That means you won’t get the sleek look of the Dynamic Island, which also doubles as a live notifications display. Thankfully, if you’re worried about durability, this iPhone has the same Ceramic Shield 2 front glass protecting the display as its pricier siblings, giving it a nice strength boost from the previous generation.

Apple did not upgrade the screen with its ProMotion refresh rate tech, as it’s stuck at 60 Hz. This capability is the number of times the screen refreshes with images—the higher the better, as your display will appear smoother, with interactions feeling more fluid. It’s something the company has offered in the iPhone Pro models, and finally enabled in 2025 with its entire iPhone 17 range, but you’ll have to upgrade for the luxury. It’s a shame, as most budget Android phones offer 120 Hz as standard, even devices as cheap as $200. That also means the iPhone 17e doesn’t have the option to enable an always-on display.

Arguably, the best upgrade is the addition of MagSafe, the magnetic ring that has been embedded in the back of mainline iPhones since the iPhone 12. Apple confusingly didn’t include it with the iPhone 16e despite a healthy accessory market that would have made the iPhone 16e a little more versatile. While the 16e still had basic wireless charging, with the iPhone 17e, you can take advantage of faster magnetic wireless charging at 15 watts (plus access to MagSafe accessories).

This iPhone is powered by the A19 chipset, which debuted on the iPhone 17, though there’s one less graphics core, so graphics performance is a small step below. That’s in line with what Apple did with the iPhone 16e and the iPhone 16 that came before. Apple didn’t share RAM details yet, but it’s likely that the iPhone 17e has 8 GB of RAM like its predecessor, whereas the rest of the iPhone 17 lineup has 12 GB.

Courtesy of Apple



Source link

Continue Reading

Trending