SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
4	
  Years	
  of	
  Cyber	
  A.acks	
  
A	
  quick	
  overview	
  of	
  the	
  Hackmageddon	
  Stats	
  
#15ISMS	
  
#CyberSecurity	
  
What is Hackmageddon?
•  Since March 2011 Hackmaggeddon.com collects timelines
related to the main Cyber Attacks in a bi-weekly basis.
•  Only sources freely available on the Internet are taken into
consideration (specialized news sites, hacking blogs, etc.).
•  Born to collect useful data for pre sale activity, it has grown
beyond the initial expectations, offering a useful synoptic
picture of what’s going on the cyber space.
•  30,000 visits per month
Since March 2011 to date, Hackmageddon
has collected:
•  418 attacks (Jul-Dec 2011)
•  1320 attacks (2012)
•  1307 attacks (2013)
•  315 attacks (Jan-Apr 2014)
They can be useful to derive stats for
analyzing how trends vary during the years
and are influenced by global events.
Hackmageddon Stats
•  The sample is heterogeneous and stats cannot obviously be exhaustive!
They are useful to understand the trends = (have a look to Zone-H to see
how many defacements happen each second);
•  Sample of 2011 only involves 8 months
•  Defacements are taken into consideration only if targeting primary
domains of high-profile sites (primary companies or Governments);
•  Hacktivism-led attacks aim to attract the attention of media
•  On the other hand, targeted attacks are stealth and (too) often
discovered only after they have achieved their scope.
Caveats
Size Matters (2011)
Main Breaches with ≥ 100.000 records
The total is around 322M leaked accounts
Size Matters (2012)
The total is around 180M records
Size Matters (2013)
Total is around 392M records
Size Matters (2014) ≥ 500.000 records
Total (up-to-date) is around 140 Million records
Daily Attack Trend: 2011 to 2012
Daily Attack Trend: 2012 to 2013
Daily Attack Trend: 2014 (4 Months)
Attack Trend: 2012
Attack Trend: 2013 (9 Months)
Motivations Behind Attacks
Motivations Behind Attacks: Yearly Trend
Findings
§  Despite the actions performed by the Law Enforcement Agencies, 2013 has
shown an increase of attacks related to hacktivism. They are diminishing in
2014.
§  In 2013 this was partly due to the political turmoil (in Greece, Turkey, Egypt
and Syria), but also to new unprecedented forms of Hacktivism such as the
DDoS attacks to the U.S. Banks.
§  Sophisticated cyber attacks operations are steadily gaining space on the media
(5% of attacks recorded in 2013 and 2014, so far, are related to Cyber
Espionage Operations).
§  Cyber Crime is raising space (outcomes of the Target breach and the wave of
attacks against retailers)?
Distribution Of Attack Techniques
Findings
§  DDoS is the favorite weapon of hacktivists. Attacks using this technique gained
more space in the news in 2013. Now they are decreasing.
§  Account Hijackings had nearly a 100% increase on a yearly basis (on the wake
of the actions of the Infamous Syrian Electronic Army): Maximum result with
minimum effort.
§  Targeted attacks revealed in the news jumped in 6.2% in 2013 and are around
5.4% in 2014.
§  Apparently high profile targets have become more aware of SQLi risks.
§  In too many cases the reason of the attacks is still unknown. Growing Trend in
2014.
Distribution Of Targets
Findings
§  During 2012 and 2013 attacks towards governmental and industrial institutions
ranked nearly at the same level;
§  In 2014 the percentage of industrial targets is nearly the 30%.
§  This is strictly related with the decrease of attacks motivated by hactkivism and
the corresponding increase in attacks driven by Cyber Crime.
Muchas	
  gracias!	
  

Contenu connexe

Tendances

2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
Scott Geye
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
jessicafay2010
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
kelsports
 

Tendances (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uae
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
CYBER SECURITY THREATS - Polytechnic Ungku Omar
CYBER SECURITY THREATS - Polytechnic Ungku OmarCYBER SECURITY THREATS - Polytechnic Ungku Omar
CYBER SECURITY THREATS - Polytechnic Ungku Omar
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
 

En vedette

CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
Siddharth Anand
 

En vedette (11)

Mobile Security Business-e
Mobile Security Business-eMobile Security Business-e
Mobile Security Business-e
 
Relazione tavola rotonda 14 marzo final
Relazione tavola rotonda 14 marzo finalRelazione tavola rotonda 14 marzo final
Relazione tavola rotonda 14 marzo final
 
Cyberwar22092011
Cyberwar22092011Cyberwar22092011
Cyberwar22092011
 
Moving Security Model From Content to Context
Moving Security Model From Content to ContextMoving Security Model From Content to Context
Moving Security Model From Content to Context
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
Schwachstellen In Sap Web Anwendungen (OWASP Germany 2009)
Schwachstellen In Sap Web Anwendungen (OWASP Germany 2009)Schwachstellen In Sap Web Anwendungen (OWASP Germany 2009)
Schwachstellen In Sap Web Anwendungen (OWASP Germany 2009)
 
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Finding the needle in the haystack: how Nestle is leveraging big data to defe...Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 

Similaire à Hackmageddon stats: 4 Year of Cyber Attacks

Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 
The Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence ReportThe Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence Report
Simona Franciosi
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Symantec
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
Dominic A Ienco
 
Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015
Group-IB
 

Similaire à Hackmageddon stats: 4 Year of Cyber Attacks (20)

Symantec Intelligence Report 2013
Symantec Intelligence Report 2013Symantec Intelligence Report 2013
Symantec Intelligence Report 2013
 
Istr19 en
Istr19 enIstr19 en
Istr19 en
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence Index
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
The Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence ReportThe Executive's Guide to the 2016 Global Threat Intelligence Report
The Executive's Guide to the 2016 Global Threat Intelligence Report
 
IBM X Force threat intelligence quarterly 1Q 2014
IBM X Force threat intelligence quarterly 1Q 2014IBM X Force threat intelligence quarterly 1Q 2014
IBM X Force threat intelligence quarterly 1Q 2014
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence Index
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
 
KASPERSKY SECURITY BULLETIN 2013
KASPERSKY SECURITY BULLETIN 2013KASPERSKY SECURITY BULLETIN 2013
KASPERSKY SECURITY BULLETIN 2013
 
MID_Modern_Threats_Landscape_GTI_Alex_de_Graaf_EN
MID_Modern_Threats_Landscape_GTI_Alex_de_Graaf_ENMID_Modern_Threats_Landscape_GTI_Alex_de_Graaf_EN
MID_Modern_Threats_Landscape_GTI_Alex_de_Graaf_EN
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
 
Financial Institutions, Merchants, and the Race Against Cyberthreats
Financial Institutions, Merchants, and the  Race Against CyberthreatsFinancial Institutions, Merchants, and the  Race Against Cyberthreats
Financial Institutions, Merchants, and the Race Against Cyberthreats
 
Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015
 
Security Industry Overview
Security Industry OverviewSecurity Industry Overview
Security Industry Overview
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Hackmageddon stats: 4 Year of Cyber Attacks

  • 1. 4  Years  of  Cyber  A.acks   A  quick  overview  of  the  Hackmageddon  Stats   #15ISMS   #CyberSecurity  
  • 2. What is Hackmageddon? •  Since March 2011 Hackmaggeddon.com collects timelines related to the main Cyber Attacks in a bi-weekly basis. •  Only sources freely available on the Internet are taken into consideration (specialized news sites, hacking blogs, etc.). •  Born to collect useful data for pre sale activity, it has grown beyond the initial expectations, offering a useful synoptic picture of what’s going on the cyber space. •  30,000 visits per month
  • 3. Since March 2011 to date, Hackmageddon has collected: •  418 attacks (Jul-Dec 2011) •  1320 attacks (2012) •  1307 attacks (2013) •  315 attacks (Jan-Apr 2014) They can be useful to derive stats for analyzing how trends vary during the years and are influenced by global events. Hackmageddon Stats
  • 4. •  The sample is heterogeneous and stats cannot obviously be exhaustive! They are useful to understand the trends = (have a look to Zone-H to see how many defacements happen each second); •  Sample of 2011 only involves 8 months •  Defacements are taken into consideration only if targeting primary domains of high-profile sites (primary companies or Governments); •  Hacktivism-led attacks aim to attract the attention of media •  On the other hand, targeted attacks are stealth and (too) often discovered only after they have achieved their scope. Caveats
  • 5. Size Matters (2011) Main Breaches with ≥ 100.000 records The total is around 322M leaked accounts
  • 6. Size Matters (2012) The total is around 180M records
  • 7. Size Matters (2013) Total is around 392M records
  • 8. Size Matters (2014) ≥ 500.000 records Total (up-to-date) is around 140 Million records
  • 9. Daily Attack Trend: 2011 to 2012
  • 10. Daily Attack Trend: 2012 to 2013
  • 11. Daily Attack Trend: 2014 (4 Months)
  • 13. Attack Trend: 2013 (9 Months)
  • 16. Findings §  Despite the actions performed by the Law Enforcement Agencies, 2013 has shown an increase of attacks related to hacktivism. They are diminishing in 2014. §  In 2013 this was partly due to the political turmoil (in Greece, Turkey, Egypt and Syria), but also to new unprecedented forms of Hacktivism such as the DDoS attacks to the U.S. Banks. §  Sophisticated cyber attacks operations are steadily gaining space on the media (5% of attacks recorded in 2013 and 2014, so far, are related to Cyber Espionage Operations). §  Cyber Crime is raising space (outcomes of the Target breach and the wave of attacks against retailers)?
  • 18. Findings §  DDoS is the favorite weapon of hacktivists. Attacks using this technique gained more space in the news in 2013. Now they are decreasing. §  Account Hijackings had nearly a 100% increase on a yearly basis (on the wake of the actions of the Infamous Syrian Electronic Army): Maximum result with minimum effort. §  Targeted attacks revealed in the news jumped in 6.2% in 2013 and are around 5.4% in 2014. §  Apparently high profile targets have become more aware of SQLi risks. §  In too many cases the reason of the attacks is still unknown. Growing Trend in 2014.
  • 20. Findings §  During 2012 and 2013 attacks towards governmental and industrial institutions ranked nearly at the same level; §  In 2014 the percentage of industrial targets is nearly the 30%. §  This is strictly related with the decrease of attacks motivated by hactkivism and the corresponding increase in attacks driven by Cyber Crime.