Last Updated on June 5, 2015
Here we go with the aggregated statistics extracted from the Cyber Attacks Timelines of February 2015 (Part I and Part II).
As we normally do, let’s start from the Country Distribution Chart, which is led, as usual, by the United States. All the other countries are essentially aligned on the same level, with the sole exception of the United Kingdom, which slightly emerges over the others.
The Daily Trend of Attacks shows quite a heterogeneous distribution throughout the month. After a slow start, two peaks emerge on the 10th and the 14th.Even in February, Cyber Crime is on top of the Motivations Behind Attacks Chart, increasing its percentage to 73.8% from the 67.4% of January. Hacktivism slows down to 19% (from 29.2%), whereas Cyber Espionage jumps to 7.1% (was 1.1% in January).
For the second month in a row SQLi ranks on top of the Attack Technique Distribution Chart with 25.3% (was 33.7% on January). Account Hijackings and Defacements swap their positions and complete the podium for the known attacks despite the third place of Defacements is in co-location with Targeted Attacks (quite a remarkable result).
For the sixth month in a row, industry ranks on top of the Distribution of Targets chart with 26.2%, a value comparable to the 28.1% of the previous month). Single Individuals rank at number two (13.6%) and Organizations at number three (11.9%). Curiously this month Governmental targets are outside the podium, slightly ahead of Educational (and Financial) targets.
The Industry Drill Down chart is extremely fragmented, however the terrible moment for the E-Commerce sites continues. On the other hand, the Non-Profit institutions are the preferred targets for the Organizations, as reported in the corresponding Drill Down chart.
As usual, the sample must be taken very carefully since it refers only to discovered attacks included in my timelines, aiming to provide an high level overview of the “cyber landscape”.
If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012, 2013 and now 2014 (regularly updated). You may also want to have a look at the Cyber Attack Statistics.
Of course follow @paulsparrows on Twitter for the latest updates, and feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).
Pingback: 21 Common Mistakes Ruining Your Website – And Free Tools To Fix Them | Layerthemes
Pingback: Greed, Cyber Criminals Main Drive - TAL Global - International Security, Counter-Terrorism, Cyber Security, Protection and Investigation Consultancy
Pingback: February 2015 - Security in a Nutshell | WARLOCK
Pingback: February 2015 Cyber Attacks Statistics | Securi...
Pingback: February 2015 Cyber Attacks Statistics | Cyberc...
Pingback: February 2015 Cyber Attacks Statistics | Cyber_...
Pingback: February 2015 Cyber Attacks Statistics | OSINFO
Pingback: February 2015 Cyber Attacks Statistics | OSINT ...