Last Updated on June 1, 2016

It’s time to publish the statistics related to the two cyber attacks timeline of April (Part I and Part II).

As usual let’s start from the Daily Trend of Attacks, which shows a trend progressively growing towards the end of the month, and is characterized by a peak in the middle.

Daily Trend April 2016

Unsurprisingly, cyber crime ranks on top of the Motivations Behind Attacks chart with 71.1% (close to 73.9% of March). Hacktivism is essentially stable at 14.5% (a slight increase compared to 12% of March). Cyber Espionage and Cyber Warfare report the same 7.2%, against respectively 10.9% and 3.3% in March.

Motivations April 2016

31.3% of the Attack Vectors are unknown. Analyzing the known vectors, account hijackings rank at number one among the known with 14.5% (in March they were at number one with 20.7%). Targeted attacks rank at number two with 12% (were 9.8% in March). SQLi is immediately behind with 10.8% (9.8% in March).

Attack Vectors April 2016

Industries lead the Distribution of Targets chart with 31.3% (was 33.7% in March). Governments  rank at number two (14.5%, was 9.8% in March).

Targets April 2016

The Industry Drill Down see Hotel and Hospitality and E-Commerce on-top with 11.5%. Software, retail and video games follow with 7.7% and emerge over the rest of the verticals.

Industries April 2016

Organizations related to Religion lead the Organization Drill Down chart.

Org April 2016

As usual, the sample must be taken very carefully since it refers only to discovered attacks included in my timelines, aiming to provide an high level overview of the “cyber landscape”.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012, 2013, 2014 and now 2015 (regularly updated). You may also want to have a look at the Cyber Attack Statistics.

Of course follow @paulsparrows on Twitter for the latest updates, and feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.