Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Web of deceit: How cyber crooks are holding the world to ransom

© SASCHA STEINBACH/EPA-EFE/ShutterRising risk of sophisticated hack attacks alarms governments.
Rising risk of sophisticated hack attacks alarms governments.

At the start of the millennium, a cyber ‘love letter’ paralysed banks, broadcasters and businesses.

The Love Bug reached the UK Parliament and marked a new era of online mayhem. Technology correspondent Geoff White tells Sally McDonald the Honest Truth about cybercrime.


Why did you write this book?

I’ve covered so many fascinating cyber security stories in my time as an investigative journalist, and it irked me that no one had brought them all together into a book that was compelling but also comprehensible for the general reader.

Cyber security is such an important topic; as the pandemic forced us all to spend more time online, cybercrime doubled in Scotland, with more than 14,000 people affected.

Where did your research take you to?

It took about a year to research and write, with locations ranging from the political power centres of Washington DC to the secretive regime of North Korea.

Perhaps the weirdest moment was ending up in a backstreet market in Manila, capital of the Philippines, on the trail of a computer hacker. Spoiler alert: I found him!

What was your most shocking discovery?

The extent of North Korea’s alleged computer hacking campaigns. It’s a country where the vast majority of people have no internet access yet it has spawned one of the most dangerous hacking teams on the planet – The Lazarus Group.

They’ve taken down banks, TV and film studios, and are suspected of being behind the WannaCry ransomware attack that had devastating consequences for the NHS in 2017.

How did hacking develop?

Criminals were quick to spot the potential of the computing boom (a techie who joined one of the early computer clubs told me his group was approached by someone connected to the Mafia interested in hacking phones).

But there were two phenomena that pump-primed the cybercrime scene: the collapse of the Soviet Union in 1991 and the adoption of online credit card payments a few years later.

Russia had a lot of skilled techies and engineers and, as the economy crashed and fraud took off, a small but influential number of them turned to computer crime. As websites began to accept credit cards, the crooks simply followed the money.

What can you tell us about the Love Bug?

The Love Bug was arguably the first global computer pandemic. It spread disguised as an email attachment “Love Letter For You”. It scrambled victims’ files, stole passwords and brought email systems to a grinding halt.

The culprit turned out to be a computer science student in Manila. He went to ground for 20 years, until I managed to track him down in the back of a dingy shopping mall.

What are the most devastating hacks you have encountered?

One of the most impactful attacks is attributed to North Korea. In May 2017, the WannaCry ransomware virus spread round the world, scrambling victims’ files and bringing computer networks to a standstill.

The NHS is one of the world’s largest employers, so it was badly affected, with some A&E departments having to close and divert patients elsewhere.

What should we fear the most from hackers?

Hacks can change the fate of the world in a very real sense. What’s perhaps even more worrying is the use of hacking for opinion manipulation – putting out false data to poison debate, or even just to make people distrustful of any sources of information. Such pernicious tactics can be very hard to spot, let alone fight.

How can nations and individuals protect themselves?

Do the basics: regularly update software. Make sure you have a different password for each service, and they contain a mix of capital letters, numbers and symbols (top tip: put a symbol or number at the start, not the end).

Back up your information every now and again onto a memory stick and keep it somewhere safe.

What does the future hold?

Artificial intelligence will be weaponised to make the hackers’ attacks more widespread and effective.

“Deepfakes” – computerised copies of people’s images and voices – will be used to carry out scams.

The energy sector will continue to be at risk from cybercriminals. On the plus side, big governments are wising up and collaborating a lot more, so cybercrime will meet an increasing amount of resistance.


Crime Dot Com: From Viruses To Vote Rigging, How Hacking Went Viral, by Geoff White, is published by Reaktion Books.