Tech
As long as the cybercriminals’ business model works, companies are vulnerable to attack

When cybercriminals targeted the UK nursery chain Kido, it represented a disturbing new low for the hackers. They threatened to expose personal data about young children and their families, shocking parents and cybersecurity experts alike.
The Kido hack is far from an isolated incident. Cyberattacks have struck organizations across many sectors in the last year, disrupting businesses from retail to manufacturing.
These recurring attacks highlight an important reality—cybercrime has become a very profitable activity. While the official advice is not to pay hackers, the frequency of these attacks suggests that many companies do. They will want to avoid losing their data or having their business and reputation damaged. But most will never admit to paying up.
Whenever there is money involved, more criminals want to participate—which has led to cybercrime becoming an organized industry. Cybercrime has shifted from individual and uncoordinated group attacks to an established business model that generates revenue and mirrors genuine companies.
This model has its own supply chains, affiliates (for example, criminals who use the malware rather than developing it) and even customer support.
The cybercrime ecosystem has evolved to run using the “as-a-service” model. For legitimate businesses, this is an efficiency model that lets them pay to use something “as a service,” rather than purchasing it. Just as businesses use software or security as a service, criminals have mirrored this model into a similar underground economy of cybercrime.
In this underground market, hackers sell ready-made malware, rent out botnets (networks of infected devices), and run payment platforms. They even go as far as providing customer support and help pages for the criminals they serve.
Their customers may shop for ransomware as a service when looking to extort ransoms from victims. Others, looking to cause disruption rather than financial gain, rent botnets to conduct “denial of service” attacks that flood the victim’s systems with traffic and disable them.
In the cybercrime economy, criminals known as “initial access brokers” act as middlemen. These are skilled cybercriminals who break into systems, providing the initial access and selling it as a package for others to use.
The packages often include stolen data, usernames and passwords, or even direct access to compromised networks. This essentially opens the door for cybercriminals with fewer skills to compromise businesses.
Business is booming
This business model is not only thriving right now—it will also persist. That’s just simple economics—everyone involved in the “business” benefits. This includes the experienced hackers and malware developers who take their cut, the brokers selling bundled services and the service-hosting and payment-platform providers taking their share. It also includes the affiliate criminals carrying out attacks and collecting their profits.
This makes it low-risk and profitable, effectively the definition of a successful business. Societal attitudes towards hackers often glamorize them as genius outsiders, while hacking itself—particularly when large corporations are the target—can mistakenly be seen as a lesser crime.
But the truth is that when the cybercrime business model succeeds, it has a lasting impact on the wider economy. Trust in businesses in the UK and beyond is damaged.
The attacks on UK retailers such as M&S and Co-op were carried out using a cybercrime service called DragonForce. This is available for a fee, reportedly set at 20% of the ransom payment. In the case of M&S and Co-op, it caused major disruption to their operations, and millions of pounds in losses.
Meanwhile, the attack on the Jaguar Land Rover (JLR) caused production at the carmaker to be halted for weeks, resulting in a huge loss.
The JLR attack caused a ripple effect on sales, deliveries, the workforce and smaller businesses in the supply chain. These companies may face bankruptcy if proceeds from the loan underwritten by the government do not reach them all.
To interrupt this recurrence of attacks, it’s vital to break the cybercriminals’ model by addressing the two fundamentals that make it successful.
First, businesses should stop paying the criminals. As long as they pay, criminals will try their luck. But it is reported that nearly 50% of companies do pay up. This is money that will fuel this crime and encourage the hackers.
Second, companies must build better resilience into their infrastructure and operations. While companies’ security has improved greatly, they are still not investing enough in things such as AI to improve their resilience to attack and their ability to keep operating (or at least to minimize disruption).
This was evident in the attacks on UK businesses. It took M&S four months to restore all of its services, while JLR’s production will not be at full capacity for several weeks.
Both Harrods and Co-op maintained operations during their incidents. This minimized interruptions, prevented large data losses and reduced the financial hit to the businesses.
There are no quick fixes, but there are steps businesses can take to make cybercrime less profitable for criminals and less disruptive for victims. The UK government is heading in the right direction with the Cyber Security and Resilience Bill and its consultations on ransomware payments.
But the real change must come from companies themselves. Without commitment, the strongest policy and legislation will remain words on paper. While prevention remains critical for a company, resilience if the worst happens is what really decides how much damage an attack can cause.
If companies can maintain operations and refuse to pay ransoms, cybercriminals lose their extortion power. And without that power there will be less profit and so less interest. But maybe most importantly, fewer families like those affected by the Kido attack will worry about their children’s data being held hostage.
This article is republished from The Conversation under a Creative Commons license. Read the original article.
Citation:
As long as the cybercriminals’ business model works, companies are vulnerable to attack (2025, October 7)
retrieved 7 October 2025
from https://techxplore.com/news/2025-10-cybercriminals-business-companies-vulnerable.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.
Tech
Scientists develop end-to-end encryption for git services

From large technology corporations to startups, from computer science students to indie developers, using git services is as common as opening a word document is for most of the rest of us. Git services are online repositories, indispensable in the IT industry, that manage and store projects that may contain sensitive information or trade secrets such as emerging artificial intelligence models.
However, this makes git services vulnerable to frequent cybersecurity threats. There is also the risk of malicious code being inserted into existing projects without the developer’s knowledge.
University of Sydney researchers are part of a team that have developed end-to-end encryption that can be deployed to protect git services. The encryption is compatible with existing git platforms such as Github and Bitbucket. When it is deployed, the researchers say, it will align seamlessly for storage and the time it takes for data to be synchronized among devices and git servers.
Initial testing on existing git services and public repositories (data sources available for researchers to test algorithms) has been successful.
“Privacy and security of software code has long been a concern for industry and individual users that rely on git services,” said one of the lead developers Associate Professor Qiang Tang, from the School of Computer Science, Faculty of Engineering. “Just like we want our messages to be private and safe, the IT industry also wants their code to be protected. End-to-end encryption is currently the gold standard to protect data.”
End-to-End encryption works by securing data from start to finish, meaning the data sent is protected from the source to the destination, even if the service platform is hacked. It is currently used in messaging services such as WhatsApp.
The researchers say the threat of security breaches to git services is becoming more commonplace. Earlier in the year cryptocurrency exchange CoinBase was a target. In 2022 Okta had source code stolen.
But Associate Professor Tang says current efforts on git security are not strong enough and with large overheads, which means when a significant amount of computational resources such as processing time, bandwidth, or storage is being used.
The researchers hope to introduce the code to git services for widespread use or intend to make it open source. The results will be presented at the ACM Conference on Computer and Communications Security in October.
Collaborator Moti Yung, distinguished research scientist from Google, said that this was an excellent opportunity to protect the git services system and its users.
“The evolution of computing ecosystems always start with a new utility designed for trusted entities: the internet, the mobile networks, chat apps, and so on.
“Therefore, due to these utilities maturing and expanding, one has then to deal with less trusted and malicious players within the ecosystem. git services, enabling collaborations and version control among participants also started without thoroughly taking care of potential bad players, and the system proposed now is a necessary step to its maturity.”
Creating the security box for the world’s code and the rising demand for end- to-end security online
Imagine git services as a giant word document where countless people can write, edit and update content, but for computer code.
“What makes git services such as Github indispensable is their ability to host a large number of collaborators working on the same coding project at the same time, without losing any efficiency,” said Associate Professor Tang. “However, this advantage is also an obstacle that prevented git services from getting end-to-end encryption.”
When you use a messaging service, the content or text remains relatively unchanged, or the edits will be very minor.
But in GitHub, countless lines of code are being written, edited and updated constantly at a such a rapid rate, standard end-to-end encryption cannot keep up. It would constantly need to refresh to encrypt new versions.
“It’s a balancing act—keep the code safe but not where it impacts the user’s computer so much that it becomes a hindrance,” Tang added.
The research team was able to achieve this balance with a tradeoff—by using only small bits of computational power at a time to significantly reduce the level of communication and storage needed. Specifically, using character-level encryption where only edits are treated as new data to be encrypted and appended (added to an existing data collection). In this way, the pressure on computational resources becomes minimal.
Another way of putting it is if you removed a word from a sentence in a document, the code would recognize that and encrypt the change, instead of encrypting the entire document.
By doing this, it would save a large amount of bandwidth and storage otherwise used on each entire new version of the code.
Co-author Dr. Ya-Nan Li from the University of Sydney said another challenge was to identify the necessary security requirements, which at times could be subtle. For example, when to enable the tracking and public verification of the source of all edits.
“With addressing this issue, it leaves the git server vulnerable to the potential injection of malicious code and sometimes can even directly hinder confidentiality,” said Dr. Li.
More information:
Ya-Nan Li et al, End-to-End Encrypted Git Services, (2025). DOI: 10.1145/3719027.3744815. eprint.iacr.org/2025/1208
Citation:
Scientists develop end-to-end encryption for git services (2025, October 7)
retrieved 7 October 2025
from https://techxplore.com/news/2025-10-scientists-encryption-git.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.
Tech
My Favorite Affordable 360 Rotating Pet Camera Is on Sale Right Now

I’ve tested over a dozen pet cameras, and they are not all created equal. A pet camera sets itself apart from a regular indoor security camera with special, pet-related features like treat tossing or interactive two-way audio. Each usually has a subscription service, where you can review pet footage historically and get alerts when things seem amiss, like odd behavior or continuous barking or meowing.
At an already super-affordable price, this Petcube camera has 360 PTZ rotation capabilities (it can not only rotate horizontally, but vertically as well for full coverage), super clear 1080p HD resolution, the ability to digitally zoom eight times, two-way audio to speak and hear your pet, and night vision. It’s already super affordable at its usual $53, but for Amazon Prime Big Deal Days, it’s only $38, a crazy-good price for a pet camera of this caliber.
Although I love (and highly recommend) this camera, the Petcube Cam 360 suffers from one of the pitfalls I have with the rest of the brand’s lineup—the features are seriously limited if you don’t want to pay for Petcube’s upgraded Care plan (which starts at $4 a month). You need to subscribe to get the full benefit of the luxury pet camera; with the plan, you’ll get video storage capabilities, automatic pet detection, and automatic video recording capabilities. The price point for the subscription plan is one of the lowest I’ve seen while testing similar models, and I don’t think I’d be able to go on vacation with peace of mind again without the extra plan. (At less than I spend on a cup of coffee, I find the subscription plan to be really worth it.)
There’s an optional mounting that requires some tools, so setup is a bit tricky. (You’ll want to make sure it’s anchored since it needs to be stable while rotating.) The camera feed rotates smoothly without much lag, and because of the wide fish-eye lens and complete panning abilities, I was able to clearly see more of the room I was monitoring than the majority of other cameras I’ve tested.
There’s a bit of inherent risk when having indoor security cameras in your home, and with the camera’s new privacy mode, you can easily turn off the camera lens for even more security while you’re at home so that it’s not catching anything that you don’t want it to.
Petcube is running deals on most of the cameras from its pet camera line for Amazon’s Prime Big Deal Days, so I’d check its brand page for even more sales.
If you want to save even more on security for your whole house, check out the camera bundles below that are also on a steep discount.
Power up with unlimited access to WIRED. Get best-in-class reporting and exclusive subscriber content that’s too important to ignore. Subscribe Today.
Tech
SHIELD activated: Researchers build defense to protect drones from cyberattacks

Fooled into following a hacker’s rogue commands, a drone is liable to do any number of things. Fly erratically. Speed up. Slow down. Hang suspended in the air. Reverse course. Take a new course. And, most dangerously: Crash.
What the compromised drone cannot do, however, is regain control. Lost to its original assignment—whether it’s delivering a package, inspecting an aging bridge or monitoring the health of crops—the machine is essentially useless.
At FIU, cybersecurity researchers have developed a series of countermeasures to fight back mid-flight against hostile takeovers.
Because drones are essentially flying computers, they are subject to the same software and hardware exploitation as their land-bound counterparts. But current drone-defense techniques fail to monitor all possible vulnerabilities.
FIU’s technology, called SHIELD, is different. Keeping watch over the entire control system, it picks up on subtle cues of malicious activity. It then identifies the kind of attack—even the stealthiest ones that often slip under the radar—before launching an attack-specific recovery process. The findings were presented at the IEEE/IFIP International Conference on Dependable Systems and Networks.
“Without robust recovery mechanisms, a drone cannot complete its mission under attacks, because even if it is possible to detect the attacks, the mission often gets terminated as a fail-safe move,” said Mohammad Ashiqur Rahman, lead researcher and associate professor in FIU’s Knight Foundation School of Computing and Information Sciences.
“What’s important about our framework is that it helps the system recover, so the mission can be completed.”
Safeguarding the security of drones may soon become more important than ever before. This summer, the Federal Aviation Administration proposed expanding commercial drone use across industries. From Amazon deliveries to agriculture, the FAA expects more businesses to deploy unmanned aircraft, raising questions about safety in the face of increasingly sophisticated cyber threats.
Traditionally, attack detection has revolved around sensors that help the drone perceive its surroundings and fly safely. But these sensors can be easily manipulated. For example, in “GPS spoofing,” hackers transmit fake coordinates to trick the drone into taking a different trajectory.
Sophisticated cyberattacks, though, bypass the sensors and go straight for the control or actuation system, sneaking malware into the drone’s hardware.
“This is why a detection and recovery system that only takes into account the sensors misses the bigger picture,” says Muneeba Asif, Ph.D. candidate in Rahman’s research group and study author. “It will be blind to other attacks that happen across the system and at different levels.”
SHIELD goes further by monitoring the drone’s entire control system. It detects abnormalities not just in sensors but also in the hardware. For example, the battery and computer components reveal a lot. Sudden surges in battery power or overworked processors are strong indicators that an attack is in progress.
The research team, which also includes FIU students Jean Tonday Rodriguez and Mohammad Kumail Kazmi, compares their approach to how a doctor arrives at a final diagnosis. A symptom (in this case, sensor data) doesn’t always reveal the underlying cause of an illness. Physical evidence (what’s happening with the battery), though, can provide a better idea of what’s going on.
And, just as every diagnosis dictates a different treatment, the researchers also find each attack needed a more tailored recovery plan.
Through multiple hardware-in-the-loop simulations in the lab, researchers learned that every attack leaves behind a unique signature and impacts the drone‘s system differently. So, the team trained AI machine learning models to spot abnormalities in the data, use the data to classify the attack and roll out the prescribed recovery protocol. In the lab, all of this happened in less than a second. Average detection time was 0.21 seconds, and recovery 0.36 seconds.
Next, Rahman’s research group will scale up testing, preparing SHIELD for real-world deployment.
With drones poised to reshape commerce, infrastructure monitoring, disaster response and more, FIU researchers say securing them is no longer optional.
“Reliable and secure drones are the key to unlocking future advancements,” Rahman said. “It’s our hope this work can play a role in moving the industry forward.”
More information:
Muneeba Asif et al, “I will always be by your side”: A Side-Channel Aided PWM-based Holistic Attack Recovery for Unmanned Aerial Vehicles, 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2025). DOI: 10.1109/dsn64029.2025.00070
Citation:
SHIELD activated: Researchers build defense to protect drones from cyberattacks (2025, October 7)
retrieved 7 October 2025
from https://techxplore.com/news/2025-10-shield-defense-drones-cyberattacks.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.
-
Tech1 week ago
Interrupting encoder training in diffusion models enables more efficient generative AI
-
Sports1 week ago
Transfer rumors, news: Benzema linked with reunion with Mourinho at Benfica
-
Tech1 week ago
More people are using AI in court, not a lawyer. It could cost you money—and your case
-
Fashion1 week ago
The World’s Fashion Business News
-
Tech1 week ago
OpenAI Is Preparing to Launch a Social App for AI-Generated Videos
-
Fashion1 week ago
Pay, human rights and the environment: the OECD puts Shein on notice
-
Business1 week ago
Top stocks to buy today: Stock market recommendations for September 30, 2025 – check list – The Times of India
-
Business1 week ago
YouTube to pay $24.5m to settle Trump lawsuit over Capitol riot