About these ads

Archive

Posts Tagged ‘#OpVendetta’

1-15 November 2012 Cyber Attacks Timeline

November 19, 2012 1 comment

The first half of November 2012 has been undoubtedly characterized by Hacktivism. Not only the month has begun with the ProjectBlackStar by the infamous Team Ghostshell (2.5 million accounts leaked belonging to different Russian sectors), but also the long-awaited November 5 has brought an unprecedented wave of Cyber Attacks against organizations all over the world, including Symantec and the UK Ministry Of Defence (more than 3,000 accounts leaked in both cases).

Moreover, after the dramatic event of the 14th of November (the killing of Ahmed Al-Jaabari, the commander of the military wing of Hamas by an Israeli missile and the consequent Operation “Pillar Of Defense”), the Anonymous have started a massive campaign of Cyber Attacks against Israel sites and in support of Palestine. This campaign is still ongoing even if it is really impossible to track all the attacks (nearly 700 defaced web sites so far), and hence, as far as possible, only a general overview is provided.

Of course these events have shadowed the other attacks, including the ones to LG (3,300 accounts leaked in two different cyber attacks) and Adobe (150,000 records allegedly compromised).

The chronicles also report of an alleged cyber attack against Telecom Italia (30,000 accounts allegedly leaked), even if there several doubts about the real authenticity of this attack.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 and the related statistics (regularly updated), and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Read more…

About these ads
Categories: Cyber Attacks Timeline, Security Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

October 2012 Cyber Attacks Statistics

November 6, 2012 1 comment

It’s time for the statistics derived from the Cyber Attacks Timeline of October 2012 (Part I and Part II).

Let us begin with the Daily Trend that has seen a revamp of the Cyber Attacks in the second part of the month, with a marked decrease towards the end of the month (maybe in preparation of the massive wave of cyber attacks we are experiencing in conjunction with the 5th of November, the so-called #5Nov or #OpVendetta).

The Motivations Behind Attacks chart confirms the predominance of Cyber Crime with nearly the 59% of occurrences, followed by Hacktivism with the 37.3%. Apparently October has confirmed the trend of September with similar percentages.

The Distribution Of Attack Techniques Chart confirms the predominance of SQL Injection over Distributed Denial Of Service but the two have only 5 points of difference, in clear contrast with the findings of the previous month when the percentages were respectively: 42.1% and 18.2%. It is interesting to notice that, on average, approximately one attack on five has no useful details to identify the used techniques, probably this is a side effect of the sample that is very heterogeneous.

Nothing new, the distribution Of Targets Chart confirms the preference of Cyber Crooks against Government targets which rank at number one with the 31.4% of occurrences, nearly 8 points more than September. Industry targets rank at number two with nearly 17% of occurrences, hence substantially stable (the previous month the value was 14.6%). Great jump of the targets belonging to education that rank at number three with the 12.7% of occurrences, while finance confirms the fourth place (in cohabitation with online services) with the 7.8% of occurrences.

Please, as usual, take the sample very carefully since it refers only to discovered attacks (the so-called tip of the iceberg), and hence does not pretend to be exhaustive but only aims to provide an high level overview of the “cyber landscape”.

If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 (regularly updated), at the Cyber Attack Statistics, and follow @paulsparrows on Twitter for the latest updates.

Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Follow

Get every new post delivered to your Inbox.

Join 2,899 other followers