First of all, let me begin with great news: The Cyber Attacks Statistics page is complete with all the data collected so far: I created and inserted even the charts for January, so I am currently covering (and will cover) the whole 2012.
Now, after this small “self-gratification” it is time to look at the statistics derived from the Cyber Attacks Timeline for the first half of August. You will soon discover that this month has seen an (un)expected revamping of Hacktivism and consequently of his preferred weapon (DDoS), and preferred targets (governments). This is a consequence of the so-called OpDemonoid carried on by the Anonymous collective against the takedown of the famous Torrent Tracker (which in many ways reminded the most famous OpMegaUpload). But this is also a consequence of OpAustralia, the operation (successful since the law proposal is in standby) against the new Australian Internet Surveillance Law.
With the occasion I did some other small enhancement to the page style, I did what I could or at least what WordPress allowed me to do (fitting the images in the table, and the table in the page size has been harder than collecting the data!).
I wrote a small script to automate the parsing of the data collected in the Cyber Attacks Timelines. I am just verifying the data for January and February 2012 for which I did not publish any statistics. I was already able to classify the data for March 2012, whose results you can see in the Statistics page.
You will probably have already noticed a new item on the upper menu bar called “Cyber Attacks Statistics“. Here is the big news: for the sake of simplicity and completeness, I have decided to collect on a single page all the cyber attacks statistics derived from the timelines.
As I did last month for the Cyber Attacks occurred in April, I have aggregated the data collected on the timelines of May (on the right) in order to provide a consolidated view of the month according to the three parameters of Motivations Behind Attacks, Distribution of Targets and Distribution of Attack Techniques. Again, no need to repeat that data must be taken very carefully since they do refers only to discovered attacks (the so-called tip of the iceberg), and hence do not pretend to be exhaustive but only aim to provide an high level overview of the “cyber landscape” of the month.