I can finally summarize the statistics derived from the timeline of November (part I and part II). In this month I have collected 135 events, corresponding to a 11% decrease compared with October when the timelines included a total of 156 events.
The Daily Trend of Events chart shows a higher level of activity during the first half of the month. After that, maybe it’s the Christmas atmosphere, the graph shows a clear decrease in the number of events.
The November Motivations Behind Attacks chart is no exception, and Cyber Crime ranks on top with 85.9% (it was 80.1% in October). Cyber Espionage plunges to 8.1% from 16%, while Hacktivism is stable in the third position with 3.7% (it was 2.6% in October). Cyber Warfare is also stable at 1.5% (it was 1.3% in October).
Thanks to ransomware, malware is still on top of the known Attack Techniques chart with nearly one half of the recorded attacks (49.6%), a remarkable jump from 35.3% recorded in October. Account hijackings take the rank number two with 16.3% (vs. 12.2% in October), while targeted attacks slide to 8.1% (it was 14.7% in October.)
For the third month in a row, attacks against single individuals lead the Distribution of Targets chart, with 19.3% (it was 16.7% in October), once again, ahead of attacks against multiple industries (14.8% vs 14.1% in October). And again, healthcare targets take the number three with 12.6% (it was 13.5% in October).
That’s all for now and, as always bear in mind that the sample refers exclusively to the attacks included in my timelines, aiming to provide an high level overview of the threat landscape.
Keep on supporting the blog, and of course follow @paulsparrows on Twitter for the latest updates. Also feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).