Last Updated on March 23, 2016
As usual let’s start from the Country Distribution Chart, which is led by the United States for the categories of Cyber Crime and Hacktivism. United Kingdom and Ireland were also particularly hit by criminals, while hacktivists reserved a particular attention for Thailand and Japan.
And let’s proceed with the Daily Trend of Attacks Chart that, after a slow start, shows quite a sustained activity with two peaks on the first and third week.
Cyber Crime ranks on top of the Motivations Behind Attacks chart with 60.6%, more than twice than hacktivism, at number two with 27.7%. Cyber Espionage ranks at number three with 7.4%, while attacks motivated by Cyber Warfare counted for a modest 4.3% of total.
January reported an unusually low number of Attack Techniques. In the 34% of the cases, the reason was not specified, whereas DDoS leads the chart of the known techniques with 22.3%, ahead of Account Hijacks (13.8%) and Defacements (10.6%). Targeted attacks are immediately behind with a remarkable 7.4%.
Industries lead the Distribution of Targets chart with 22.3%, ahead of Governments (17.0%) and Single Individuals (10.6%). Online Services (6.4%) and Financial Targets (5.3%) emerge from the other targets.
Software Companies lead the Industry Drill Down Chart with 23.8%. Automotive and Web Hosting companies share the second place with 14.3% each, followed by Entertainment (9.5%), the only category that emerges from the rest of the group.
The Organization Drill Down Chart, is not particularly meaningful, since there were only three attacks against belonging to only one class (political organizations).
As usual, the sample must be taken very carefully since it refers only to discovered attacks included in my timelines, aiming to provide an high level overview of the “cyber landscape”.
If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012, 2013, 2014 and now 2015 (regularly updated). You may also want to have a look at the Cyber Attack Statistics.