July is gone and hence it’s time, as usual, to summarize the main cyber events happened in the second half of this month (Part I here).
For a strange coincidence this month has shown an unusual number of breaches dating back to several years ago (2010-2012) and reported only now: Catch of The Day, Think W3 Limited, Paddy Power and Lasko are the organizations affected.
It’s time for the first cyber attacks timeline of July reporting the main cyber events happened (or discovered) during the first half of the month.
In a short summary: if even the number of recorded attacks remains moderate, the most important events of this period are related to Cyber Espionage: eight sophisticated campaigns have been discovered, a number remarkably high for this category.
I do not know if being happy or not, but it looks like the second half of June (the first timeline covering 1-15 June is here) has seen a sharp inversion of the decreasing trend recorded on the last few months. I have registered an increase of the number of attacks with particular focus on targeted attacks.
So, the second half of July is ready to show us what happened in the cyber-landscape.
It’s Summer, the dog days are among us, and the temperatures are quite high even under the Infosec Sun. Most of all for software companies that, even if for different motivations, were the unwelcome targets of the most remarkable attacks of these two weeks: Ubuntuforums.org has been hacked, putting at risk 1.82 million of accounts, and even three well-know mobile services TrueCaller, Viber and TangoMe suffered the same fate.
I am quite in time with the list of the main Cyber Attacks occurred in the first half of July.
This period has been quite hard for the Video Games Industry with two noticeable events targeting Konami and Ubisoft (58 million of account potentially affected in this second case). Another noticeable breach involves the attack against the Italian Website of Sony, which lead to 40,000 records leaked.
Here we are with the statistics from the Cyber Attack Timelines for the first and the second half of July 2012. The sample included 76 attacks which have been analyzed according the three familiar parameters: Motivations behind attacks, Distribution of attacks techniques and Distribution of targets.... Read More