Cyber Crime Stats UK: What Every IT Leader Needs to Know
For many UK organisations, Cybercrime is still viewed as an abstract risk that’s only discussed in yearly board reports. What many don’t realise is that cyber attacks are a constant operational threat for organisations, cutting across every sector and business size.
Last year alone, according to DSIT’s ‘Summary of research on the economic impact of cyber attacks’ report, 43% of UK businesses reported experiencing a cyber security breach or attack, equivalent to more than 600,000 organisations. This cyber crime statistic alone shows the importance of protecting your business against common cyber threats.
According to Allianz Commercial, cyber security has been the top risk concern among corporate leaders for a fifth consecutive year. What’s striking from this report is that AI has jumped into second place, reflecting how rapidly attackers are adopting automation, generative AI, and social engineering at scale.
In this article, we’ll talk about the latest cyber crime statistics in the UK and what they reveal about attacker behaviour. You’ll gain a clear view of which are the most common cyber threats, which are the most costly for your organisation, and how the business impact of cybercrime is changing.
Key Takeaways: UK Cyber Crime Statistics
- Cybercrime affects nearly half of UK businesses each year, with phishing and social engineering driving the majority of incidents
- Human behaviour, not malware, is now the primary attack vector behind most breaches in the UK
- AI is accelerating both attack and defence strategies, shrinking the time between compromise and impact
- Ransomware and extortion are increasingly targeting mid-sized organisations, not just large enterprises
- 24/7 detection, response, and preparedness are now critical to reducing downtime, cost, and regulatory fallout
What is Cyber Crime and Why Does it Matter?
Cybercrime is the use of digital attacks to compromise systems, data, or services for financial gain, disruption, or extortion. For UK businesses, this isn’t just an IT issue; it’s a direct threat to your revenue, operations, and regulatory compliance.
How is cybercrime defined in a business context?
In a UK business context, cybercrime is commonly framed by the National Cyber Security Centre (NCSC) as any attack that compromises the confidentiality, integrity, or availability of your systems and data. This includes financially motivated crime, state-linked activity, and insider threats.
Crucially, the impact isn’t limited to data loss. Operational disruption, reputational damage, and regulatory enforcement are often more severe than the technical breach itself.
Cybercrime also spans both external attackers and internal actors, whether through malicious intent, compromised credentials, or simple human error. That breadth makes detection and response far more complex than perimeter security alone can address.
Why UK businesses are uniquely vulnerable
The UK is one of the most digitally mature economies in the world, with extensive cloud adoption, remote working, and complex supply chains. This creates many opportunities for your business, but brings with it exposure.
The UK consistently ranks as the second most targeted country globally after the United States.
Regulatory pressure is also increasing. UK organisations now face overlapping requirements from emerging domestic legislation, such as the Cyber Security and Resilience Bill, alongside EU-driven frameworks such as NIS2 and the CRA, which still affect many UK firms due to supply chain obligations.
At the same time, the costs of a breach are rising, and legal consequences for poor incident handling are becoming more common.
The result is a risk environment where visibility and response speed matter as much as prevention.
What Do the Latest Cyber Crime Statistics Say?
The most recent cyber crime stats paint a clear picture of the scale of this problem and how it’s likely to escalate. While reporting figures only capture part of the problem, they still reveal how persistent and widespread cybercrime has become.
Total number of cybercrimes reported in the UK
Official reporting through Action Fraud (now called Report Fraud) and government surveys shows that hundreds of thousands of cyber-enabled crimes are reported each year.
However, it is estimated that the actual number of incidents is far higher, due to under reporting and detection gaps. Government research, such as the Cyber Security Breaches Survey from DSIT, indicates that millions of cybercrimes are likely occurring annually across UK businesses and charities, far exceeding the formally recorded number.
Under reporting is often driven by a combination of limited breach visibility, uncertainty over whether an incident meets reporting thresholds, and concerns around reputational damage or regulatory scrutiny.
This gap between reported and estimated incidents highlights a critical issue for security leaders: many organisations simply don’t know they’ve been compromised until damage has already occurred.
Average cost of a breach for UK organisations
The financial impact of cybercrime varies significantly by organisation size. Small and medium-sized businesses often experience lower absolute costs, but suffer proportionally greater disruption. Larger enterprises face higher direct costs linked to downtime, incident response, legal fees, and regulatory penalties.
Indirect costs usually outweigh the immediate financial loss. Reputational damage, customer churn, and delayed projects can persist for months after an incident. According to IBM, nearly half of all breaches involve customers’ personally identifiable information, dramatically increasing the long term impact on trust and compliance.
Frequency and scale of attacks
Cyberattacks can operate continuously or stealthily without you ever noticing.
Industry and government data show that UK organisations are probed, phished, or attacked daily, often multiple times per day. This reflects the automated nature of modern cybercrime, where attackers rely on volume, speed, and persistence rather than bespoke exploits.
This always-on threat environment exposes under-resourced IT and security teams. Attacks don’t stop outside of business hours, but many security teams do.
Key trends shaping the UK threat landscape
Looking at DigitalXRAID’s Annual Threat Pulse report, several trends stand out in the current data.
- Phishing and social engineering continue to rise, driven by increasingly convincing AI-generated content.
- Ransomware has shifted towards double and triple extortion, combining data theft with operational disruption.
- Insider threats, both malicious and accidental, remain a significant contributor to cyber security incidents.
AI is accelerating all of these trends. A survey by Cyber News Group found that 43% of organisations have experienced an increase in AI-related incidents in the past 12 months.
In the Cisco 2025 Cybersecurity Readiness Index, it was also reported that 86% of business leaders with cyber responsibilities had at least one AI-related incident during the same period.
In just 5 months, retailers faced over 560,000 AI-driven automated attacks per day, including fraudulent purchase attempts, account takeover efforts, and most prevalently, DDoS campaigns.
However, AI is present on both sides. IBM reports that 51% of enterprises now use security AI or automation, and those organisations experience $1.8 million lower average breach costs than those without it. Looking ahead, Gartner predicts that AI agents will reduce the time needed to exploit compromised accounts by 50% by 2027.
What Are the Most Common Types of Cyber Attacks in the UK?
Understanding volume is only half the picture. The real question for IT leaders is what types of attacks to be prepared for, and how those attacks succeed.
Most common UK cyberattack types
- Phishing attacks: Deceptive emails or messages designed to steal credentials, deliver malware, or trick users into fraudulent actions
- Business Email Compromise (BEC): Targeted impersonation of executives or suppliers to redirect payments or gain access to internal systems
- Ransomware and data extortion: Attacks that encrypt systems or steal data, then apply pressure through downtime, threats to leak information, or regulatory exposure
- Credential theft and account takeover: Stolen usernames, passwords, or tokens used to access systems as a legitimate user
- Exploitation of vulnerabilities: Abuse of unpatched software flaws or misconfigurations to gain initial access
- Malware infections: Malicious software used to spy, steal data, or establish persistence within a network
- Supply chain attacks: Compromise of third-party providers, software updates or vendors to reach downstream organisations
- Insider threats and accidental breaches: Incidents caused by human error, misuse of access, lost devices, or poor security practices
Phishing and business email compromise
Phishing remains the most common attack method in the UK. It continues to work because attackers exploit trust, urgency, and familiarity, rather than technical flaws. Business email compromise has become particularly effective, enabling fraud, credential theft, and unauthorised payments.
Verizon’s 2025 DBIR survey analysed 22,052 incidents and 12,195 confirmed breaches, the largest dataset so far, and 68% of these incidents involved an element of human error, such as phishing or social engineering.
AI has made these attacks harder to spot. Microsoft’s Cyber Signals 2025 recorded a 46% rise in AI-generated phishing content, while . .
The result is a growing detection gap that user awareness training alone can’t close.
Ransomware and data extortion
Ransomware has evolved from an occasional crisis into a persistent operational risk. Attacks increasingly target mid-sized organisations, because they lack enterprise-grade resilience but still hold valuable data.
Verizon’s 2025 Data Breach Investigations Report showed that ransomware or extortion now accounts for 44% of all breaches across industries, with prevalence rising 37% in a single year. A report from Searchlight Cyber recorded 3,734 victims listed on ransomware leak sites in just 6 months (H1), a 67% increase on the same period the previous year and a 20% increase on the previous 6 months.
Data from DigitalXRAID’s Annual Threat Pulse 2025 shows that downtime and disruption of operations are now as valuable to attackers as encryption of data. Victims are pressured through service outages, regulatory exposure, and public leak threats rather than just ransom demands.
Malware and supply chain attacks
Malware remains a significant threat, particularly when combined with vulnerable third-party software or mismanaged endpoints.
Also cited in the Verizon report, exploitation of vulnerabilities as an initial access vector grew 34% year on year, and now accounts for one-fifth of breaches.
Supply chain risks amplify this issue. Approximately half of hedge fund firms suffered a breach in the past year, with many citing third-party exposure as a key factor. This pattern is repeating across multiple sectors, notably in the UK’s healthcare sector, where third-party breaches halted operations for a group of London-based hospitals in 2024.
The healthcare sector also experienced twice as many breaches in the last 12 months, with ransomware attacks and third-party risks powering the surge.
Who is Being Targeted and Why?
Cybercrime doesn’t impact all organisations equally; attackers prioritise sectors where disruption, data value, and regulatory pressure intersect.
Sectors most at risk
Finance, manufacturing, healthcare, retail, public sector, and critical national infrastructure consistently experience high attack volumes.
Each of these industries has a combination of highly sensitive data and operational dependency on digital systems. Retail incidents, for example, rose from 725 to 837 in a single year, according to the Retail and Hospitality Information Sharing and Analysis Center. Phishing accounted for 25% of reported threats.
Multiple industry reports show that healthcare breaches have also doubled, driven by ransomware and third-party risk.
Common attack entry points
Email remains the primary entry point, followed by remote access services and misconfigured internet-facing systems.
Once inside, attackers often move laterally, completely undetected. A lack of continuous monitoring means that many organisations only discover an incident after significant damage has occurred.
Human error as a persistent vulnerability
Recent high profile UK incidents, such as Marks and Spencer and JLR, underline a critical change in how cyber security for large organisations is viewed. Many major attacks in the past year didn’t begin with malware, but instead with social engineering and abuse of trust. Fatigue, undertraining, and complex workflows all play a role in making this an effective initial access point for attackers.
The most severe incidents often escalate not because prevention failed, but because organisations were unprepared to respond. Regular and repeated incident response (IR) testing significantly reduces your outage duration, with statistics indicating a potential 35% faster response time for organisations running quarterly drills, according to research from the Ponemon Institute.
What Do These Stats Mean for IT and Security Leaders?
The message from the data is clear. Prevention alone is no longer sufficient.
From risk awareness to risk readiness
Understanding the threat landscape is only the first step. To be prepared, you must assume that breaches will occur and focus on limiting their impact, rather than hoping you won’t be targeted. That requires preparation, rehearsal and real time visibility.
Why in-house teams can’t do it all
Internal teams face growing challenges. Budgets are constrained, skills are scarce, and the demand for 24/7 coverage is relentless.
Alert fatigue and delayed response are common, particularly outside normal working hours, which creates gaps that attackers are quick to exploit.
The case for 24/7 SOC protection
A managed Security Operations Centre (SOC) provides continuous monitoring, rapid detection, and coordinated response. It bridges the gap between tooling and action, supporting your compliance while reducing operational risk.
For many organisations, it’s the most practical way to achieve cyber resilience without committing to a huge internal investment in tools and expertise.
How DigitalXRAID Helps You Stay Ahead of the Threat
Modern cyber defence is about preparedness just as much as it is about protection.
The role of a Managed SOC in real time threat mitigation
DigitalXRAID’s Managed SOC monitors your environments around the clock, detecting and neutralising threats across your entire estate before they can escalate. This approach combines technology, intelligence, and human expertise to reduce dwell time and business impact.
Proactive vs reactive cyber defence strategies
Proactive defence means testing your incident response plans by running table-top exercises and refining playbooks before a real incident occurs.
DigitalXRAID supports organisations in building this readiness, making sure that when an incident happens, response is coordinated and effective.
DigitalXRAID’s compliance led, expert driven approach
With accreditations from CREST, CHECK, NCSC, and Microsoft, amongst others, DigitalXRAID provides leading cyber defence that aligns with regulatory expectations, as well as providing protection assurance.
This reassures regulated organisations that security operations support both their resilience and compliance.
Final Thoughts: Cyber Crime Stats and How to Protect Your Business
UK cybercrime statistics tell a consistent story. Attacks are frequent, increasingly automated, and heavily focused on human behaviour as an initial access point. The cost of disruption now rivals the cost of data loss, and preparedness has become as important as prevention.
The strategic response is clear: always-on visibility, tested response processes, and expert support are crucial for protecting your business. If you want to discuss how a managed SOC can strengthen your cyber resilience, you can get in touch with our team.
FAQs: Cyber Crime Stats UK
How often do UK businesses get attacked by cyber criminals?
Most UK organisations face attempted attacks daily, often multiple times per day. Automated scanning and phishing campaigns mean exposure is constant rather than occasional.
How many cybercrimes were reported in the UK in 2025?
Looking at cybercrime statistics in the UK, hundreds of thousands of cybercrimes were formally reported, but government estimates suggest the true number of incidents affecting businesses is far higher due to under reporting.
What are the latest cybercrime statistics in the UK?
Recent data from the UK government shows that 43% of UK businesses experienced a cyber breach or attack in the past year, with phishing and social engineering dominating incidents.
What is the most common type of cyberattack in the UK?
Phishing is the most common attack type, often used to steal credentials or enable business email compromise.
Which UK industries are most affected by cybercrime?
Finance, healthcare, retail, manufacturing, public sector and critical infrastructure face the highest levels of attack due to the sensitivity of their data and operational dependency.
What is the cost of cybercrime for UK businesses?
Costs vary significantly, but include direct losses such as downtime and fines, as well as indirect impacts like reputational damage and customer churn.
How can UK organisations protect themselves?
Effective protection combines prevention, continuous monitoring, incident response planning, and regular testing rather than relying on tools alone.
What makes a managed SOC more effective than internal security?
A managed SOC provides 24/7 coverage, specialist expertise, and faster response, reducing gaps caused by staffing limits and alert fatigue.
Where can I find trusted UK cybercrime statistics?
Trusted sources include UK government surveys, the National Cyber Security Centre and reputable industry research such as DigitalXRAID’s monthly Threat Pulse and Annual Threat Pulse Report.
What are the predicted UK cybercrime trends for 2026?
AI-enabled attacks, credential abuse, and extortion are expected to increase, making preparedness and rapid response even more critical.
@daniel@commonground.digital I think this could be hallucinated, I can’t find a source, but this exact phrase appears in several other articles online (without a source)
All stats are found by me – I got them all from articles. We can’t reference this as it’s a competitor https://deepstrike.io/blog/ai-cyber-attack-statistics-2025
@daniel@commonground.digital same here, the FBI’s IC3 report for 2025 doesn’t seem to have been released yet.
Same here https://www.totalassure.com/blog/ai-cybersecurity-stats-2025 – offers same services as us




