About these ads

Archive

Posts Tagged ‘2012’

1-15 November 2012 Cyber Attacks Timeline

November 19, 2012 1 comment

The first half of November 2012 has been undoubtedly characterized by Hacktivism. Not only the month has begun with the ProjectBlackStar by the infamous Team Ghostshell (2.5 million accounts leaked belonging to different Russian sectors), but also the long-awaited November 5 has brought an unprecedented wave of Cyber Attacks against organizations all over the world, including Symantec and the UK Ministry Of Defence (more than 3,000 accounts leaked in both cases).

Moreover, after the dramatic event of the 14th of November (the killing of Ahmed Al-Jaabari, the commander of the military wing of Hamas by an Israeli missile and the consequent Operation “Pillar Of Defense”), the Anonymous have started a massive campaign of Cyber Attacks against Israel sites and in support of Palestine. This campaign is still ongoing even if it is really impossible to track all the attacks (nearly 700 defaced web sites so far), and hence, as far as possible, only a general overview is provided.

Of course these events have shadowed the other attacks, including the ones to LG (3,300 accounts leaked in two different cyber attacks) and Adobe (150,000 records allegedly compromised).

The chronicles also report of an alleged cyber attack against Telecom Italia (30,000 accounts allegedly leaked), even if there several doubts about the real authenticity of this attack.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 and the related statistics (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Read more…

About these ads
Categories: Cyber Attacks Timeline, Security Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

October 2012 Cyber Attacks Statistics

November 6, 2012 1 comment

It’s time for the statistics derived from the Cyber Attacks Timeline of October 2012 (Part I and Part II).

Let us begin with the Daily Trend that has seen a revamp of the Cyber Attacks in the second part of the month, with a marked decrease towards the end of the month (maybe in preparation of the massive wave of cyber attacks we are experiencing in conjunction with the 5th of November, the so-called #5Nov or #OpVendetta).

The Motivations Behind Attacks chart confirms the predominance of Cyber Crime with nearly the 59% of occurrences, followed by Hacktivism with the 37.3%. Apparently October has confirmed the trend of September with similar percentages.

The Distribution Of Attack Techniques Chart confirms the predominance of SQL Injection over Distributed Denial Of Service but the two have only 5 points of difference, in clear contrast with the findings of the previous month when the percentages were respectively: 42.1% and 18.2%. It is interesting to notice that, on average, approximately one attack on five has no useful details to identify the used techniques, probably this is a side effect of the sample that is very heterogeneous.

Nothing new, the distribution Of Targets Chart confirms the preference of Cyber Crooks against Government targets which rank at number one with the 31.4% of occurrences, nearly 8 points more than September. Industry targets rank at number two with nearly 17% of occurrences, hence substantially stable (the previous month the value was 14.6%). Great jump of the targets belonging to education that rank at number three with the 12.7% of occurrences, while finance confirms the fourth place (in cohabitation with online services) with the 7.8% of occurrences.

Please, as usual, take the sample very carefully since it refers only to discovered attacks (the so-called tip of the iceberg), and hence does not pretend to be exhaustive but only aims to provide an high level overview of the “cyber landscape”.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 (regularly updated), at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

1-15 October 2012 Cyber Attack Statistics

October 22, 2012 Leave a comment

Here’s the partial snapshot for the Cyber Landscape in October. I have deliberately decided not to include in the statistics the massive Cyber Attack against the Universities executed by Team Ghost Shell, since, in my opinion, it would not have been formally correct include into the sample, this wave of cyber attacks which have been distributed in several months, and disclosed all at once.

In any case, looking at the sample including all the other attacks collected in October, according to the Daily Trend they were mainly concentrated at the beginning of the month:

For what concerns the Motivations Behind Attacks chart, Cyber Crime ranks at number one, with nearly the 58%, approximately at the same level of September (when it was at 55%). Interesting to notice, for the first half of October, the rise of events related to Cyber Warfare, mainly related to what is happening in the Middle East, and in particular in Iran, that suffered a couple of noticeable cyber attacks. In this landscape, the events related to hacktivism appear in decrease with the 35% of the events.

Even if the events related to hacktivism seem to be decreasing, the Distribution Of Attack Techniques shows a revamp of DDoS (the favourite weapon of hacktivists), mainly due to the wave of DDoS Cyber Attacks against the U.S. banks. Even if approximately one-fourth of the attacks has an unknown origin, SQL is stable at rank number three with the 22.5% of occurrences. It also worth to mention the 5% gained by Targeted Attacks.

Last but not least, the Distribution Of Targets chart, that confirms the weakness of the targets belonging to Government, ranking at number one with nearly one-third of the occurrences. It does not matter if the reason is hacktivism or cyber crime, Governments keep on to be the preferred victims of cybercrooks, at least for this first half of October.

Again, I will never get tired of repeating that data must be taken very carefully since they do refer only to discovered attacks (the so-called tip of the iceberg), and hence do not pretend to be exhaustive but only aim to provide an high level overview of the “cyber landscape” of the considered period.

In any case, if you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 (regularly updated), at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

September 2012 Cyber Attacks Statistics

October 8, 2012 1 comment

It’s time for the statistics derived from the Cyber Attacks Timeline of September 2012 (Part I and Part II).

I have decided to add another chart reporting the Daily Trend for the Cyber Attacks. According to collected data, the first week of the month has shown the higher concentration of events.

The Motivations Behind Attacks chart reveals the predominance of Cyber Crime which ranked, in September, at number one with the 55% of occurrences, followed by Cyber Crime, at number two with the 42% of occurrences. This is in contrast with the result of the previous month, in which the ranks were pratically inversed (respectively 58% Hacktivism and 36% Cyber Crime).

The Distribution Of Attack Techniques Chart confirms the predominance of SQL Injection over Distributed Denial Of Service. Interesting to notice the position of Targeted Attacks at the fifth place with the 5% of occurrences (I wonder how many will go undetected). Of course the main purpose of Targeted Attacks is to remain undetected for long time. Is the fact that they appear in the chart a sign of increasing detection capabilities by technological and human countermeasures?

Last but not least, the Distributon Of Targets Chart confirms the preference of Cyber Crooks against Government targets which rank at number one with the 23.6 of occurrences. Industry targets rank at number two with nearly 15% of occurrences, immediately before targets belonging to various organizations which rank at the third place with 12.2% of occurrences. Targets belonging to finance rank at number four with the 9% of occurrences, mainly due to the wave of DDoS Cyber attacks against U.S. Banks.

Again, I will never get tired of repeating that data must be taken very carefully since they do refer only to discovered attacks (the so-called tip of the iceberg), and hence do not pretend to be exhaustive but only aim to provide an high level overview of the “cyber landscape” of the considered period.

In any case, if you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 (regularly updated), at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

1-15 September Cyber Attacks Statistics

September 27, 2012 Leave a comment

I know, September is nearly gone, but it is the time for the cyber stats related to the first half of September. As you know, they are derived from my Cyber Attack Timeline.

A look at the Motivations Behind Attacks chart, shows that apparently the Sun of August is the best period for hacktivism, since September has shown the overtake of Cyber Crime motivated attacks which reported the 56% of occurrences inside the analyzed sample.

The Distribution Of Attack Techniques confirms the domain od SQL Injection with nearly the 50% of the attacks. The fall of DDoS in this unwelcome charts is attributable to the minor number of attacks Motivated by Hacktivism

After all, apparently the Governments keep on investing an inadequate amount of money for securing their infrastructure: in fact they continue to lead the Distribution of Targets chart with the 30% of occurrences, nearly twice than the industry sector which ranks at number two with the 16%. Among the single targets (in fact the sectors od industries and organizations are higly fragmented) the edcuational institutions are the most targeted afer governments. Online activities (miscellaneous services, online games, online gambling and e-commerce sites), summed together reach the considerable number of 14%.

As usual, I will never get tired of repeating that data must be taken very carefully since they do refer only to discovered attacks (the so-called tip of the iceberg), and hence do not pretend to be exhaustive but only aim to provide an high level overview of the “cyber landscape” of the considered period.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

1-15 September 2012 Cyber Attacks Timeline

September 19, 2012 Leave a comment

Here it is the usual compilation for the Cyber Attacks in the first half of September, a period which has apparently confirmed the revamping of hacktivism seen in August.

Several operations such as #OpFreeAssange (in support of Julian Assange), #OpTPB2 against the arrest of The Pirate Bay Co-Founder Gottfrid Svartholm Warg, and #OpIndipendencia in Mexico have characterized the first half of September. Curiously the hacktivists have also characterized this period for a couple of controversial events: the alleged leak of 1 million of UDIDs from FBI (later proven to be fake) and the alleged attack to GoDaddy (later proven to be a network issue, that is the reason why I not even mentioned it in this timeline). Other actions motivated by hacktivists have been carried on by Pro-Syrian hackers.

From a Cyber Crime perspective, there are two events particularly interesting (even if well different): the alleged leak of Mitt Romney’s tax returns and yet another breach against a Bitcoin Exchange (Bitfloor), worthing the equivalent of 250,000 USD which forced the operator to suspend the operations.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 and the related statistics (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Read more…

August 2012 Cyber Attacks Statistics

September 7, 2012 4 comments

It’s time for the stats related to the Cyber Attacks Timeline of August. I do not remember a month so characterized by Hacktivism like this! The reason is mainly due to the actions motivated by the so-called OpFreeAssange, the waves of cyber attacks in favor of Julian Assange and, most of all in the first part of the month, to the OpDemonoid, the attacks targeting Ukrainan sites after the shutdown of the famous torrent tracker.

Let us begin with the Motivations Behind Attacks Chart. More than one half of the attacks of my sample (58%) were motivated by hacktivism, in line with the data of July (when the value was 55%). Cyber Crime motivated attacks rank at number two, with the 36% of occurrences, even in this case a value substantially in line with the previous month when it was at 31%. Cyber Espionage and Cyber Crime are well behind with the 3% respectively.

Moving forward to the chart regarding the Distribution Of Attack Techniques, there is a predominance of SQLi, which confirms to be the preferred weapon for Hacktivists or Cyber Criminals. DDoS (real or claimed) counts for nearly one third of the occurrence (32,4% real plus a further 2,9% claimed). Of Course, keep always in mind that data refer only to my sample and do not take into account all the defacements (make a jump to Zone-H and you will realize that is simply impossible) unless they are particularly meaningful.

Last but not least, the Distribution Of Targets chart clearly reflects the predominance of hacktivism in this month. In fact target belonging to governments rank at number one with the 19% of occurrences. Industries and organizations are immediately behind with respectively the 16.2% and the 15.2%. Inside industry, technology has been the most targeted sector, this is mainly due to the (controversial) Philips hack, but also to other remarkable cyber attacks such as AMD and AVX Corporation.

Of course, as usual, data must be taken very carefully since they do refer only to discovered attacks (the so-called tip of the iceberg), and hence do not pretend to be exhaustive but only aim to provide an high level overview of the “cyber landscape” of the considered period. Moreover, remember that the most dangerous threats are the invisible ones.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 (regularly updated). Also have a look at the 2012 Cyber Attacks Statistics and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Follow

Get every new post delivered to your Inbox.

Join 3,041 other followers