Last Updated on May 24, 2015

It’s time to summarize the Cyber Landscape of November, extracting the corresponding statistics from the two two timelines of November (part I and part II).

Let us begin with the Attack Trend. From this point of view November has been quite active and stable (despite some breaks in the trend).

Attack Trend November 2013

The attacks executed by Pakistani hackers against India and Indonesian hackers against Australia influence the Country Distribution Chart, which is led, as usual, by the US, well above these two countries.

Country Distribution November 2013

Cyber Crime leads the Motivations Behind Attacks chart (53%), even if the spread with hacktivism (45%) is much smaller in comparison with the previous month when the two were respectively at 63% and 33%. For the second consecutive month, apparently, I have recorded no operations related to Cyber Warfare.

Motivations November 2013

The Distribution of Attack Techniques Chart sees Defacement at number one for the third consecutive month with 29.7%. DDoS ranks at number three with 15.4%, more than five points above Account Hijacking, which ranks at number four with 9.9. SQLi is constantly decreasing and this month ranks at number six with 4.4%.

Attacks November 2013

The Distribution of Targets chart confirms governments at number one with 29.3% and industries at number two with 25%. What is also interesting to notice in this month is the presence into the chart of Bitcoin Wallets, an increasingly interesting prey for Cyber Criminals, at rank number seven with 3.3%. Entertainment and Software lead the drill-down chart for Industries, while Political Parties (quite obviously) lead the one for Organizations.

Targets November 2013

As usual, please bear in mind that the sample must be taken very carefully since it refers only to discovered attacks, published in the news, and included in my timelines. The sample cannot be exhaustive but only aims to provide an high level overview of the “cyber landscape”.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012 and now 2013 (regularly updated). You may also want to have a look at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.