{"id":9148,"date":"2020-06-29T16:31:48","date_gmt":"2020-06-29T13:31:48","guid":{"rendered":"https:\/\/forklog.media\/?p=9148"},"modified":"2020-06-29T19:46:58","modified_gmt":"2020-06-29T16:46:58","slug":"fbi-names-six-u-s-states-most-vulnerable-to-online-attacks","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/fbi-names-six-u-s-states-most-vulnerable-to-online-attacks\/","title":{"rendered":"FBI Names Six U.S. States Most Vulnerable to Online Attacks"},"content":{"rendered":"<p>The United States Federal Bureau of Investigation (FBI) has estimated that cybercriminals stole approximately $2 billion from victims by virtue of compromising corporate email accounts, in 2019. Criminals continued to invent new and more sophisticated types of attacks last year, although quite widespread extortion, government impersonation, and spoofing were the three crime categories newly added to the report by the agency, in 2019.<\/p>\n<p><!--more--><\/p>\n<p>The FBI <a href=\"https:\/\/business.fau.edu\/images\/business\/centers\/center-for-forensic-accounting\/files\/fbi_analysis_2019.html\">indicated<\/a> California, Florida, New York, Ohio, Texas, and Washington as the states with the highest victim monetary losses or number of victims in 2019. California led the rating in terms of the volume of victim losses which amounted to $573.6 million, last year, while the number of victims only increased by 2%.<\/p>\n<p><a href=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/06\/1_2019.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9149 size-full\" src=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/06\/1_2019.png\" alt=\"The volume of victim monetary losses per state in 2019\" width=\"1344\" height=\"960\" srcset=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/06\/1_2019.png 1344w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/06\/1_2019-300x214.png 300w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/06\/1_2019-1024x731.png 1024w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/06\/1_2019-768x549.png 768w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/06\/1_2019-470x336.png 470w\" sizes=\"auto, (max-width: 1344px) 100vw, 1344px\" \/><\/a><\/p>\n<p><i>The volume of victim monetary losses per state in 2019. Source: <\/i><a href=\"https:\/\/business.fau.edu\/centers\/center-for-forensic-accounting\/research\/internet-crime\/\"><i>Florida Atlantic University<\/i><\/a><\/p>\n<p>California is followed by Ohio that had the largest loss rate of $22.6 million per one million in population, in 2019, and Florida that had the third-highest loss rate of $13.7 million per one million in population, in 2019.<\/p>\n<p>Per the report, Washington was hit with the highest number of victims adjusted for population in 2019, with 1,720 victims per one million in population. Florida and Texas showed a similar number of victims in 2019.<\/p>\n<p><i><a href=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/06\/2_2019.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9150 size-full\" src=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/06\/2_2019.png\" alt=\"The number of victims per state in 2019\" width=\"1344\" height=\"960\" srcset=\"https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/06\/2_2019.png 1344w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/06\/2_2019-300x214.png 300w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/06\/2_2019-1024x731.png 1024w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/06\/2_2019-768x549.png 768w, https:\/\/forklog.com\/en\/wp-content\/uploads\/2020\/06\/2_2019-470x336.png 470w\" sizes=\"auto, (max-width: 1344px) 100vw, 1344px\" \/><\/a>The number of victims per state in 2019. Source: <\/i><a href=\"https:\/\/business.fau.edu\/centers\/center-for-forensic-accounting\/research\/internet-crime\/\"><i>Florida Atlantic University<\/i><\/a><\/p>\n<blockquote><p><b><i>\u201cOver the last five years, victim losses in the six top states have increased more than 150% with Ohio having the highest growth of 1,600%. Washington had the highest growth rate in number of victims of 100%, while Florida had the lowest of 34%,\u201d <\/i><\/b><i>the report said.<\/i><\/p><\/blockquote>\n<h2>Most Popular Online Crimes in 2019<\/h2>\n<p>According to the FBI, threat actors mostly fell back to Business Email Compromise\/Email Account Compromise (BEC\/EAC) to break into personal or corporate email accounts aiming to obtain sensitive information and divert and request electronic wire transfers to fraudulent money accounts.<\/p>\n<p>Through BEC\/EAC, cybercriminals managed to steal $1.8 billion from victims in 2019. \u201cThis scheme has grown at varying rates in five of the six top states while declining 10% in New York. From 2018 through 2019, Ohio victim losses increased by 245%, but only 6% in Texas,\u201d the report detailed.<\/p>\n<p>Although extortion is not a new Internet crime and had not reportedly been a relatively large online crime before 2018, the FBI detected a notable increase of victim losses from this type of crime in the six top states, in 2019.<\/p>\n<p>The report further pointed out the government impersonation as one of the most popular fraudulent schemes in 2019. This type of Internet crime ran rampant in 2019, marking a high growth especially in California and New York.<\/p>\n<p>Among other most widespread online crimes last year, the report mentioned credit card fraud, identity theft, investment fraud, and spoofing.<\/p>\n<h2>Hacker Attacks Continue to Proliferate<\/h2>\n<p>As forklog.media previously reported, hackers seem to have <a href=\"https:\/\/forklog.com\/en\/cybercriminals-change-focus-from-individual-servers-to-enterprise-networks\/\">shifted their focus from individual servers to corporate networks<\/a>. In the second half of 2019, the number of postings on illicit marketplaces offering access to corporate networks reportedly began surging.<\/p>\n<p>Cybercriminals have been actively placing so-called \u201caccess for sale\u201d proposals on darknet seeking to sell the remote control over enterprise computers to third parties, over the past months. Once a third party obtains access to corporate computers, they can perform attacks on the company\u2019s infrastructure and eventually steal data and disrupt business operations.<\/p>\n<p>Per a report from IBM, in the fourth quarter of 2019, the volume of <a href=\"https:\/\/forklog.com\/en\/cybercriminals-change-focus-from-individual-servers-to-enterprise-networks\/\">ransomware attacks increased<\/a> by 67% year-on-year, with bad actors continuously developing new ransomware code for destructive attacks.<\/p>\n<p><b>Follow us on <\/b><a href=\"https:\/\/twitter.com\/forklogmedia\"><b>Twitter<\/b><\/a><b> and <\/b><a href=\"https:\/\/www.facebook.com\/forklogmedia\"><b>Facebook<\/b><\/a><b> and join our <\/b><a href=\"https:\/\/t.me\/forklogmedia\"><b>Telegram channel<\/b><\/a><b> to know what\u2019s up with crypto and why it\u2019s important.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The United States Federal Bureau of Investigation (FBI) has estimated that cybercriminals stole approximately $2 billion from victims by virtue of compromising corporate email accounts, in 2019. Criminals continued to invent new and more sophisticated types of attacks last year, although quite widespread extortion, government impersonation, and spoofing were the three crime categories newly added [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":9155,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[44,976,219],"class_list":["post-9148","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybercrime","tag-hacks","tag-us"],"aioseo_notices":[],"amp_enabled":true,"views":"1087","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/9148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=9148"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/9148\/revisions"}],"predecessor-version":[{"id":9153,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/9148\/revisions\/9153"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/9155"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=9148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=9148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=9148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}