Last Updated on May 24, 2015

As I do every month (unfortunately with a constantly growing delay, here are the statistics extracted from the cyber attacks timelines for April 2013.

As usual, let us begin with the Daily Trend Chart. The peak of April the 2nd seems to be quite an exception for a quiet month, showing a constant trend, except for the decrease towards the end.

Daily Trend April 2013

Similarly to March, the Motivations Behind Attacks Chart confirms the predominance, inside the sample, of the attacks motivated by hacktivism, leading the chart with 56% (was 50% during the previous month).

Motivations April 2013

And, again, similarly to March, DDoS leads the Distribution of Attack Techniques Chart with nearly 35%. SQLi ranks at number three with nearly the same value than the previous month (13.5%). It is worth to mention the rise of the cases of account hijacking, on the rise of the attacks carried on by the Syrian Electronic Army.

Techniques April 2013

Again, the wave of DDoS attacks affects the Distribution Of Targets Chart, lead by Financial Targets with 32%, twice as much as the industrial sector, ranking at the second place with nearly 15%. Apparently the attention against the governmental targets is decreasing, as a result, they rank at number three with 10.7%.

Targets April 2013

As usual, please bear in mind that the sample must be taken very carefully since it refers only to discovered attacks included in my timelines. The sample does not pretend to be exhaustive but only aims to provide an high level overview of the “cyber landscape”.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012 and now 2013 (regularly updated). You may also want to have a look at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

This Post Has 2 Comments

  1. The Pentagon this week launched “Plan X,” which is a five-year cyberwarfare research project. The goal of Plan X is to create technology that allows the military to fight cyber attacks in cyberspace under the command of generals and other non-technically-competent military personell. The “Plan X app” is reported to be a large touch-screen table that commanders can interact with to send virtual warriors into cyberwarfare. According to DARPA‘s website “Cyberspace is now recognized as a critical domain of operations by the U.S. military and its protection is a national security issue.”

    So where does this leave the rest of us who aren’t multi-national banks, governments, huge businesses, or hackers?

  2. secguru

    Hi, What is the source for your data ? what is the accuracy ?

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.