Last Updated on August 18, 2016

It’s time to publish the statistics derived from the Cyber Attacks Timelines of June (Part I and Part II).

As usual let’s start from the Daily Trend chart. June has shown quite a sustained level of activity (the most active month so far), concentrated primarily in the central week.

June 2016 Daily Trend

As always, cyber crime ranks on top of the Motivations Behind Attacks chart with 69.1% (a light increase from 66.7% of May). Hacktivism falls back to the levels of April (15.5%, it was 20.4% in May). Cyber Espionage drops to 9.1% from 9.1% of May, whereas Cyberwarfare soars to 6.4% from 1.1% in May.

June 2016 Motivations

Account Hijacking ranks on top of the known Attack Vectors with 14.5%, a consequence of the wave of celebrities who had their social media account hijacked. DDoS and targeted attacks follow with 12.7% each.

June 2016 Attacks

As usual, Industries lead the Distribution of Targets chart with 24.5% (was 21.5% in May), ahead of Organizations (14.5%), Single Individuals (10.9%, again an effect of the attacks against social media accounts) and Governments (10%).

June 2016 Targets

For the second month in a row, the Industry Drill Down chart sees Software companies on top.

June 2016 Industry Drill Down

And finally “thanks” mostly to Guccifer 2.0 and his leaks, Political Parties rank on top of the Organization Drill Down chart.

June 2016 Organization Drill Down

Finally, bear in mind that the sample refers solely to the attacks included in my timelines, aiming to provide an high level overview of the “cyber landscape”.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012, 2013, 2014 and now 2015 (regularly updated). You may also want to have a look at the Cyber Attack Statistics.

Of course follow @paulsparrows on Twitter for the latest updates, and feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.