The research (also made on other smaller forums) used the forum’s search engine capabilities to analyze conversations by topic using specific keywords. Unfortunately no details have been provided about the methodology used to collect the data, however the results show that SQL Injection and DDoS are the most discussed topic, both of them with the 19% of discussion volume (I am glad to see that the results are coherent with the findings of my Cyber Attack Statistics).
Of course the data must be taken with the needed caution since the analyzed sample could not be entirely consistent. As Imperva admits: “The site we examined is not a hardcore crime site, but it’s not entirely softcore. New hackers come to this site to learn and,on the other hand, more experienced hackers teach to gain “street cred” and recognition […]. Typically, once hackers have gained enough of a reputation, they go to a more hardcore, invitation-only forum.” This probably means that the incidence of the two attack techniques is overrated since one should expect a beginner hacker to approach the easiest and most common attack methods for which there are many tools available.
Anyway the events of the last months show that an attack does not deserve less attention only because it is carried on by a beginner, nor a beginner worries too much if he uses automated tools without full knowledge and awareness. A look to the infosec chronicles of the last period is sufficient to verify that DDoS and SQLi attacks are always in the first pages.
Sadly, Imperva estimates that only the 5% of the security budget is spent on thwarting SQL Injection attacks.
Other interesting findings of the research are: the fact that social networks pose a major interest for hackers since they are becoming a prominent source of information and potential monetary gain (Facebook was the most discussed social media platform, with 39%, immediately followed by Twitter at 37%), and also the fact that E-whoring is becoming one of the most common methods for beginner cyber criminals to gain easy money (more than 13,000 threads observed).
- 489,007 hits since November 2010
08/13/2011 - My Post on Android Malware Mentioned on Engadget.
04/14/2011 - The Article Smart Grid: L'ultima Frontiera del Cybercrime published on ICT Security Magazine May 2011.
03/14/2011 - Security Summit 2011: Paolo Passeri guest at Round Table "Mobile Security: Rischi, Tecnologie, Mercato"
02/14/2011 - The Article Gears of Cyberwar published on ICT Security Magazine January 2011.
About This Blog
In this blog I express my personal opinion, which does not necessarily reflects the opinion of my organization, about events and news or interest, concerning information security, winking to mobile world and, why not, to some curious personal event.
Every information is reported with its source.
Anyone intending to use information contained in my post is free to do so, provided that mention my blog in your article.
Top Posts & Pages
- List Of Hacked Celebrities Who Had (Nude) Photos Leaked
- 2013 Cyber Attacks Timeline Master Index
- 2012 Cyber Attacks Statistics
- 2012 Cyber Attacks Timeline Master Index
- 15-31 May 2013 Cyber Attacks Timeline
- May 2013 Cyber Attacks Statistics
- March 2013 Cyber Attacks Statistics
- 2013 Cyber Attacks Master Index
- 1-15 May 2013 Cyber Attacks Timeline
- About Me
- @taosecurity @Mandiant Sure, could I have more details? - 1 week ago
- 2013 Cyber Attacks Master Index wp.me/p14J6X-2q5 - 1 week ago
- Edward Snowden: the whistleblower behind revelations of NSA surveillance gu.com/p/3gec7/tw via @guardian - 1 week ago
- May 2013 Cyber Attacks Statistics lnkd.in/FFm8cN - 1 week ago
- May 2013 Cyber Attacks Statistics hackmageddon.com/2013/06/09/may… #Infosec #Cybercrime - 1 week ago
- Domino’s Pizza testing pizza-delivering drones fxn.ws/10NTX38 via @hushedfeet - 2 weeks ago
- Hard Work during the WE to post in time the May 2013 Cyber Attacks TImeline lnkd.in/BABPvC I'm abusing of my wife's patience :) - 2 weeks ago
- 15-31 May 2013 Cyber Attacks Timeline wp.me/p14J6X-2pl - 2 weeks ago
- RT @teamcymru: 30million 'wi-fi' credit cards can be plundered by cyber identity thieves exploiting contactless payment technology http://t… - 2 weeks ago