Last Updated on December 21, 2016

Christmas is coming, and we are ready to archive this Infosec 2016, while I am still collecting the data for the last timelines of December, I found the time to publish the statistics for November 2016, derived from the corresponding timelines (part I and part II).

The Daily Trend of Attacks chart shows a peak in the first week, followed by a plateau and a more sustained activity between November the 16th and the 26th.


Cyber crime ranks on top of the Motivations Behind Attacks chart with 82.7% (was 76.5% in October). Hacktivism ranks at number two dropping to 9.3% (was 17.6% in October). Cyber Espionage slides to 4% from 5.9% , Cyberwarfare records a small 2.7%.


For the second month in a row, Malware/POS Malware rank on top of the known Attack Vectors with 20% (was 21.6% in October). Account Hijackings are still at number with practically the same value (17.33% vs 17.65% in October), ahead of Targeted Attacks, exactly like the previous month (10.67% vs 13.73% in October).


Once again, the Distribution of Targets is led by industry with 22.67% (was 31.4% in October), followed by Governments (21.33%, was 7.84% in October), and Single Individuals (12%, practically equal to October, when it was 11.8%).


Hotel and Hospitality rank on top of the Industry Drill Down chart with 23.5%, ahead of Retail (17.6%) and Entertainment (11.85). All other categories follow.


For the third month in a row, non-profit organizations lead the chart of the Organization Drill Down with 28.6% (was 42.9% in October).


As always, bear in mind that the sample refers exclusively to the attacks included in my timelines, aiming to provide an high level overview of the “cyber landscape”.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011, 2012, 2013, 2014 and now 2015 (regularly updated). You may also want to have a look at the Cyber Attack Statistics.

Of course follow @paulsparrows on Twitter for the latest updates, and feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.