What are the origins of Cybercrime?
The evolution of cybercrime and its culmination in ransomware is a story 30 years in the making

Ransomware has become one of the greatest threats to businesses globally. Successful attacks can be costly, both monetarily and reputationally, and defending against them is taking up an increasing amount of security professionals’ time, energy, and budget.
The stakes are high. A survey by cyber security firm Sophos found that the median ransom payment made by businesses it surveyed in the first half of the year was $400,000 (£323,200). While this is a significant chunk of money in its own right, 40% of respondents admitted to paying ransoms in excess of $1 million (£800,000), leading to a mean average of $1.54 million (£1.24 million). Even at the lower end, the cost of ransomware is getting more expensive for those who choose to pay up – only 34% of respondents paid less than $100,000 (£80,800) in 2023 compared to 54% the previous year.
Importantly, these figures don’t take into account the cost of cleaning up after the breach, from dealing with lost data to bringing in specialist teams to ensure attackers aren’t still lurking in the victim’s systems, to explaining what happened to customers and suppliers.
While the origins and motivations of ransomware actors may seem shadowy or just downright malign, as is so often the case there’s more to it than that.
The end of an era
When looking for the parents of cyber crime as we now know it, experts point to two key turning points in the 1990s: The fall of the Soviet Union and the widespread global adoption of electronic finance.
“The evolution of the cybercrime community began in basically 1995,” says Tom Kellerman, head of cybersecurity strategy at VMware and member of the Cybercrime Investigations Advisory Board for the United States Secret Service, in episode one of Sophos’ three-part video series Think you know ransomware?, Origins of Cybercrime.
“The central banking community of the world and the major financial institutions of the world moved to electronic finance. There was no longer a delay in when a payment would arrive at another institution, which allowed for greater liquidity in the markets. This is when money became digital.
“This was compounded,” he continues, “by a functional reality that you had a lot of computer scientists that used to be employed [in] the Soviet Bloc who were unemployed because the Soviet Union collapsed. And these folks harnessed their own skill sets to then bypass the encryption and the solutions employed by the banks to begin the largest theft in the history of the world: Cybercrime.”
Initially, these activities were often limited to what we would now call credential harvesting: Collecting people’s names, contact details, or email addresses and selling them on to marketing lists or purveyors of spam mail.
Over time, this has evolved into the cybercrime landscape we know today, with ransomware being the most costly, destructive, and damaging kind.
As Jeremy Sheridan, assistant director of the Office of Investigations of the United States Secret Service, puts it: “All cybercrime is about unauthorized access. But in terms of using that access to prevent the organization from being able to function and to hold it hostage, that has been a relatively recent phenomenon.”
From petty thieves to organized crime
Another inflection point in the evolution of cybercrime and the growth of ransomware came in 2008, in the wake of the global financial crisis.
Prior to this, ransomware attacks were often carried out by groups of just a handful of people who had to take care of everything themselves, from writing the malware to running the infrastructure and handling negotiations. Following the recession, however, ransomware gangs became more professionalized.
According to Kellerman, since the 2008/09 recession “the cyber crime community and these [cyber crime] cartels began to modernize their operations; their organizational structure became more sophisticated in how they delivered services”.
This in turn allowed them to not only carry out attacks more successfully and at a greater scale than before, but also to offer their services to inexperienced would-be extortionists.
“Ransomware is such a complex operation now that one person can’t do it all,” says Allan Liska, intelligence analyst at Recorded Future. “If I’m a novice bad guy, I don’t want to build out a whole ransomware infrastructure, so what I do is I choose one of these ransomware groups and say ‘Hey, I want to sign up for your ransomware as a service’.”
According to Allan, for this person it’s as simple as putting down a deposit, getting their own executable from the ransomware gang and then looking for potential victims. If any of these attacks are successful, everything from the negotiations to accepting the Bitcoin ransom payment is also handled by the gang, rather than the individual. The spoils are then divided up between the ‘novice’ and the professional cyber criminals, with each getting their cut.
The rise of state-sponsored attacks
There’s another leg to the story of ransomware that even those most removed from cyber security will likely have heard of, which is nation state, state sponsored, or patriotic hacking.
The link between these groups and the governments that harbor them is murky. While Western governments sometimes accuse others of having ‘cyber armies’, often these groups operate autonomously as criminal gangs. They’re tolerated on the understanding that they won’t attack businesses or infrastructure in the country in which they operate and that, if called upon, will direct resources to an attack on a named target.
Some of the most infamous state-linked ransomware campaigns include the 2014 Sony Pictures hack, the 2016 Bangladesh Bank heist, and the 2017 WannaCry outbreak.
Charles Debarber, a cyber intelligence professional who formerly worked for US Army intelligence, points to the Sony Pictures hack as being particularly notable for its severe and long-lasting impact.
“For a worldwide organization like Sony to be locked down, have films leaked that weren’t even released, have emails released that were very sensitive – that brought down careers – the impact of [the ransomware attack] lasted years after. And the problem just keeps getting worse,” he says.
This is the first in a series of three articles. To watch the whole of Origins of Cybercrime and learn more about how businesses can protect themselves from ransomware, click here.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Third time lucky? Microsoft finally begins roll-out of controversial Recall feature
News The Windows Recall feature has been plagued by setbacks and backlash from security professionals
By Emma Woollacott Published
-
The UK government wants quantum technology out of the lab and in the hands of enterprises
News The UK government has unveiled plans to invest £121 million in quantum computing projects in an effort to drive real-world applications and adoption rates.
By Emma Woollacott Published
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Healthcare systems are rife with exploits — and ransomware gangs have noticed
News Nearly nine-in-ten healthcare organizations have medical devices that are vulnerable to exploits, and ransomware groups are taking notice.
By Nicole Kobie Published
-
Alleged LockBit developer extradited to the US
News A Russian-Israeli man has been extradited to the US amid accusations of being a key LockBit ransomware developer.
By Emma Woollacott Published
-
February was the worst month on record for ransomware attacks – and one threat group had a field day
News February 2025 was the worst month on record for the number of ransomware attacks, according to new research from Bitdefender.
By Emma Woollacott Published
-
CISA issues warning over Medusa ransomware after 300 victims from critical sectors impacted
News The Medusa ransomware as a Service operation compromised twice as many organizations at the start of 2025 compared to 2024
By Solomon Klappholz Published
-
Warning issued over prolific 'Ghost' ransomware group
News The Ghost ransomware group is known to act fast and exploit vulnerabilities in public-facing appliances
By Solomon Klappholz Published
-
The Zservers takedown is another big win for law enforcement
News LockBit has been dealt another blow by law enforcement after Dutch police took 127 of its servers offline
By Solomon Klappholz Published
-
There’s a new ransomware player on the scene: the ‘BlackLock’ group has become one of the most prolific operators in the cyber crime industry – and researchers warn it’s only going to get worse for potential victims
News Security experts have warned the BlackLock group could become the most active ransomware operator in 2025
By Solomon Klappholz Published