You will find a (hopefully) welcome novelty from this month: as a
matter of fact starting from July I begun to record the nationality of
the targeted companies (not the domains), so the corresponding data will
be reported in the statistics accordingly.
Let us begin with the Daily Trend of Attacks chart. Here the Summer shows its effects showing a constantly decreasing shape after the peak occurred the 15th.
Let us begin with the Daily Trend of Attacks chart. Here the Summer shows its effects showing a constantly decreasing shape after the peak occurred the 15th.
And here it comes the innovation. Easy Predictable US (well above the others) and UK lead the Country Distribution Chart,
but even Pakistan is not that bad! The other countries are aligned at
approximately the same levels. US and UK collected together the 45% of
the attacks reported in the timelines.
Just like the previous month, Cyber Crime leads the Motivation Behind Attacks chart.
The levels are similar to the ones of the previous month with a light
drop from 62% in June to 57% in the current month. On the other hand,
unlike the past years, this summer seems quite problematic for the
hacktivists, also due to the recent sentencing.
It is true, this July has brought many innovations, and for the first time Defacements lead the Distribution Of Attack Techniques
Chart. Also the account Hijackings are becoming very popular. For the
first time (as far as I remember) SQLi and DDoS are out from the first
three ranks, even if there is a meaningful amount of attacks for which
it has not been possible to derive the used technique based on the
available information. Kindly remind that I take defacements into
consideration only when they are meaningful, that is targeting
Governmental primary domains or high profile targets, or also when they
cause the leaking of data.
Last but not least, Governmental targets lead the Distribution of Target chart
with 29%. Industry ranks at number two, quite close (only three points
far). The two categories swapped their places in comparison with the
previous month. It is also interesting to notice the third position of
single individuals, a consequence of the multiple attacks against
Twitter accounts.
As usual, please bear in mind that the
sample must be taken very carefully since it refers only to discovered
attacks included in my timelines. The sample does not pretend to
be exhaustive but only aims to provide an high level overview of the
“cyber landscape”.
If you want to have an idea
of how fragile our data are inside the cyberspace, have a look at the
timelines of the main Cyber Attacks in 2011, 2012 and now 2013 (regularly updated). You may also want to have a look at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.
No comments:
Post a Comment