Last Updated on March 24, 2016

It’s now time to publish the statistics derived from the Cyber Attacks Timelines of February (Part I and Part II).

Let’s start from the Daily Trend of Attacks, which shows a slow start, immediately followed by a plateau, a peak concentrated on the 15th, and finally a stable trend until the end of the month.

February 2016 Daily Trend

One again, Cyber Crime ranks on top of the Motivations Behind Attacks chart with 62.7%, substantially stable and in line with January (was 60.6%). Hacktivism  ranks at number two, nearly with the same value reported in January (28% vs 27.7%). Cyber Espionage ranks at number three with 5.3% (was 7.4% in January), while attacks motivated by Cyber Warfare are equally substantially stable with 4% (was 4.3% in January).

February 2016 Motivations

The Attack Techniques were unknown in 41.3% of the cases. Account Hijackings are immediately behind with 12%, and SQLi achieve an impressive 10.7%. Impressive are also the percentages of targeted attacks (9.3%) and malware (6.7%). All the other techniques follow…

February 2016 Attack Techniques

Industries lead the Distribution of Targets chart with 29.3% (was 22.3% in January), ahead of Governments (14.7%, was 17.0% in January) and Finance, Law Enforcement Agencies and Single Individuals (each of them at 8%). Organizations (6.7%), Online Services (5.3%) and Education (4.0%) emerge on the other targets.February 2016 Distribution of Targets

For the second month in a row, software Companies lead the Industry Drill Down Chart with 13.6%, but this time they share the higher stand of the podium with E-Commerce. Job seeking and Telco emerge from the rest of the group.

February 2016 Industry Drill Down

Software also leads the Organization Drill Down Chart.

February 2016 Org Drill Down

As usual, the sample must be taken very carefully since it refers only to discovered attacks included in my timelines, aiming to provide an high level overview of the “cyber landscape”.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012, 2013, 2014 and now 2015 (regularly updated). You may also want to have a look at the Cyber Attack Statistics.

Of course follow @paulsparrows on Twitter for the latest updates, and feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.