SlideShare a Scribd company logo
4	
  Years	
  of	
  Cyber	
  A.acks	
  
A	
  quick	
  overview	
  of	
  the	
  Hackmageddon	
  Stats	
  
#15ISMS	
  
#CyberSecurity	
  
What is Hackmageddon?
•  Since March 2011 Hackmaggeddon.com collects timelines
related to the main Cyber Attacks in a bi-weekly basis.
•  Only sources freely available on the Internet are taken into
consideration (specialized news sites, hacking blogs, etc.).
•  Born to collect useful data for pre sale activity, it has grown
beyond the initial expectations, offering a useful synoptic
picture of what’s going on the cyber space.
•  30,000 visits per month
Since March 2011 to date, Hackmageddon
has collected:
•  418 attacks (Jul-Dec 2011)
•  1320 attacks (2012)
•  1307 attacks (2013)
•  315 attacks (Jan-Apr 2014)
They can be useful to derive stats for
analyzing how trends vary during the years
and are influenced by global events.
Hackmageddon Stats
•  The sample is heterogeneous and stats cannot obviously be exhaustive!
They are useful to understand the trends = (have a look to Zone-H to see
how many defacements happen each second);
•  Sample of 2011 only involves 8 months
•  Defacements are taken into consideration only if targeting primary
domains of high-profile sites (primary companies or Governments);
•  Hacktivism-led attacks aim to attract the attention of media
•  On the other hand, targeted attacks are stealth and (too) often
discovered only after they have achieved their scope.
Caveats
Size Matters (2011)
Main Breaches with ≥ 100.000 records
The total is around 322M leaked accounts
Size Matters (2012)
The total is around 180M records
Size Matters (2013)
Total is around 392M records
Size Matters (2014) ≥ 500.000 records
Total (up-to-date) is around 140 Million records
Daily Attack Trend: 2011 to 2012
Daily Attack Trend: 2012 to 2013
Daily Attack Trend: 2014 (4 Months)
Attack Trend: 2012
Attack Trend: 2013 (9 Months)
Motivations Behind Attacks
Motivations Behind Attacks: Yearly Trend
Findings
§  Despite the actions performed by the Law Enforcement Agencies, 2013 has
shown an increase of attacks related to hacktivism. They are diminishing in
2014.
§  In 2013 this was partly due to the political turmoil (in Greece, Turkey, Egypt
and Syria), but also to new unprecedented forms of Hacktivism such as the
DDoS attacks to the U.S. Banks.
§  Sophisticated cyber attacks operations are steadily gaining space on the media
(5% of attacks recorded in 2013 and 2014, so far, are related to Cyber
Espionage Operations).
§  Cyber Crime is raising space (outcomes of the Target breach and the wave of
attacks against retailers)?
Distribution Of Attack Techniques
Findings
§  DDoS is the favorite weapon of hacktivists. Attacks using this technique gained
more space in the news in 2013. Now they are decreasing.
§  Account Hijackings had nearly a 100% increase on a yearly basis (on the wake
of the actions of the Infamous Syrian Electronic Army): Maximum result with
minimum effort.
§  Targeted attacks revealed in the news jumped in 6.2% in 2013 and are around
5.4% in 2014.
§  Apparently high profile targets have become more aware of SQLi risks.
§  In too many cases the reason of the attacks is still unknown. Growing Trend in
2014.
Distribution Of Targets
Findings
§  During 2012 and 2013 attacks towards governmental and industrial institutions
ranked nearly at the same level;
§  In 2014 the percentage of industrial targets is nearly the 30%.
§  This is strictly related with the decrease of attacks motivated by hactkivism and
the corresponding increase in attacks driven by Cyber Crime.
Muchas	
  gracias!	
  

More Related Content

PPTX
Cybersecurity 2 cyber attacks
PPTX
Latest Top 10 Types of Cyber Security Threats
PDF
Cyber Security
PPT
cyber terrorism
PPTX
Cyber security presentation
PPTX
Cyber crime , threats and their security measures
PDF
Cyber Security Vulnerabilities
PDF
A Look Into Cyber Security
Cybersecurity 2 cyber attacks
Latest Top 10 Types of Cyber Security Threats
Cyber Security
cyber terrorism
Cyber security presentation
Cyber crime , threats and their security measures
Cyber Security Vulnerabilities
A Look Into Cyber Security

What's hot (20)

PPTX
Cyber Security
PPTX
Ethical hacking
PPTX
Cyber security threats and its solutions
PDF
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
PPTX
Webinar cybersecurity presentation-6-2018 (final)
PPTX
2016 - Cyber Security for the Public Sector
DOCX
It risk assessment in uae
PPT
Cyber Security and Cyber Awareness
PDF
5 Top Cyber Threats That Will Ruin Your Business
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
Cyber terrorism power point
PDF
Cyber security
DOCX
Hot Cyber Security Technologies
PPTX
Cyber threats landscape and defense
PDF
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
PPTX
Cyber threats
PPTX
Introduction to Cyber Security
PPTX
CYBER SECURITY THREATS - Polytechnic Ungku Omar
PPTX
Cyber Security: Threats and Needed Actions
PDF
4. Mitigating a Cyber Attack
Cyber Security
Ethical hacking
Cyber security threats and its solutions
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Webinar cybersecurity presentation-6-2018 (final)
2016 - Cyber Security for the Public Sector
It risk assessment in uae
Cyber Security and Cyber Awareness
5 Top Cyber Threats That Will Ruin Your Business
Cybersecurity 1. intro to cybersecurity
Cyber terrorism power point
Cyber security
Hot Cyber Security Technologies
Cyber threats landscape and defense
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber threats
Introduction to Cyber Security
CYBER SECURITY THREATS - Polytechnic Ungku Omar
Cyber Security: Threats and Needed Actions
4. Mitigating a Cyber Attack

Viewers also liked (11)

PDF
Mobile Security Business-e
DOC
Relazione tavola rotonda 14 marzo final
PPTX
Cyberwar22092011
PDF
Moving Security Model From Content to Context
PDF
The Evolution of Cyber Attacks
PPTX
Jason Samide - State of Security & 2016 Predictions
PDF
Schwachstellen In Sap Web Anwendungen (OWASP Germany 2009)
PDF
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
PPT
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
PPTX
CYBER CRIME( DU PRESENTATION FOR FYUP)
PDF
Anatomy of a cyber attack
Mobile Security Business-e
Relazione tavola rotonda 14 marzo final
Cyberwar22092011
Moving Security Model From Content to Context
The Evolution of Cyber Attacks
Jason Samide - State of Security & 2016 Predictions
Schwachstellen In Sap Web Anwendungen (OWASP Germany 2009)
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
CYBER CRIME( DU PRESENTATION FOR FYUP)
Anatomy of a cyber attack

Similar to Hackmageddon stats: 4 Year of Cyber Attacks (20)

PDF
Symantec Intelligence Report 2013
PDF
Istr19 en
PDF
IBM 2015 Cyber Security Intelligence Index
PDF
Symantec's Internet Security Threat Report for the Government Sector
PDF
The Executive's Guide to the 2016 Global Threat Intelligence Report
PDF
IBM X Force threat intelligence quarterly 1Q 2014
PDF
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
PPT
Cyber Security Emerging Threats
PDF
Symantec Website Security Threat Report 2014 - RapidSSLOnline
PDF
Security troubles in e commerce website
PDF
The IBM X-Force 2016 Cyber Security Intelligence Index
PDF
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
PDF
Article 1 - cyber threat.pdf
PDF
Global Cyber Attacks report 2018 - 2019 | HaltDos
PDF
KASPERSKY SECURITY BULLETIN 2013
PDF
MID_Modern_Threats_Landscape_GTI_Alex_de_Graaf_EN
PDF
2016 trustwave global security report
PDF
Global Commision on Internet Governance
PDF
Financial Institutions, Merchants, and the Race Against Cyberthreats
 
PDF
Hi-Tech Crime Trends 2015
Symantec Intelligence Report 2013
Istr19 en
IBM 2015 Cyber Security Intelligence Index
Symantec's Internet Security Threat Report for the Government Sector
The Executive's Guide to the 2016 Global Threat Intelligence Report
IBM X Force threat intelligence quarterly 1Q 2014
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Cyber Security Emerging Threats
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Security troubles in e commerce website
The IBM X-Force 2016 Cyber Security Intelligence Index
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Article 1 - cyber threat.pdf
Global Cyber Attacks report 2018 - 2019 | HaltDos
KASPERSKY SECURITY BULLETIN 2013
MID_Modern_Threats_Landscape_GTI_Alex_de_Graaf_EN
2016 trustwave global security report
Global Commision on Internet Governance
Financial Institutions, Merchants, and the Race Against Cyberthreats
 
Hi-Tech Crime Trends 2015

Recently uploaded (20)

PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
project resource management chapter-09.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
TLE Review Electricity (Electricity).pptx
PDF
STKI Israel Market Study 2025 version august
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPTX
Modernising the Digital Integration Hub
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
project resource management chapter-09.pdf
Group 1 Presentation -Planning and Decision Making .pptx
NewMind AI Weekly Chronicles – August ’25 Week III
OMC Textile Division Presentation 2021.pptx
observCloud-Native Containerability and monitoring.pptx
NewMind AI Weekly Chronicles - August'25-Week II
TLE Review Electricity (Electricity).pptx
STKI Israel Market Study 2025 version august
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Getting started with AI Agents and Multi-Agent Systems
1 - Historical Antecedents, Social Consideration.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
O2C Customer Invoices to Receipt V15A.pptx
Modernising the Digital Integration Hub
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf

Hackmageddon stats: 4 Year of Cyber Attacks

  • 1. 4  Years  of  Cyber  A.acks   A  quick  overview  of  the  Hackmageddon  Stats   #15ISMS   #CyberSecurity  
  • 2. What is Hackmageddon? •  Since March 2011 Hackmaggeddon.com collects timelines related to the main Cyber Attacks in a bi-weekly basis. •  Only sources freely available on the Internet are taken into consideration (specialized news sites, hacking blogs, etc.). •  Born to collect useful data for pre sale activity, it has grown beyond the initial expectations, offering a useful synoptic picture of what’s going on the cyber space. •  30,000 visits per month
  • 3. Since March 2011 to date, Hackmageddon has collected: •  418 attacks (Jul-Dec 2011) •  1320 attacks (2012) •  1307 attacks (2013) •  315 attacks (Jan-Apr 2014) They can be useful to derive stats for analyzing how trends vary during the years and are influenced by global events. Hackmageddon Stats
  • 4. •  The sample is heterogeneous and stats cannot obviously be exhaustive! They are useful to understand the trends = (have a look to Zone-H to see how many defacements happen each second); •  Sample of 2011 only involves 8 months •  Defacements are taken into consideration only if targeting primary domains of high-profile sites (primary companies or Governments); •  Hacktivism-led attacks aim to attract the attention of media •  On the other hand, targeted attacks are stealth and (too) often discovered only after they have achieved their scope. Caveats
  • 5. Size Matters (2011) Main Breaches with ≥ 100.000 records The total is around 322M leaked accounts
  • 6. Size Matters (2012) The total is around 180M records
  • 7. Size Matters (2013) Total is around 392M records
  • 8. Size Matters (2014) ≥ 500.000 records Total (up-to-date) is around 140 Million records
  • 9. Daily Attack Trend: 2011 to 2012
  • 10. Daily Attack Trend: 2012 to 2013
  • 11. Daily Attack Trend: 2014 (4 Months)
  • 13. Attack Trend: 2013 (9 Months)
  • 16. Findings §  Despite the actions performed by the Law Enforcement Agencies, 2013 has shown an increase of attacks related to hacktivism. They are diminishing in 2014. §  In 2013 this was partly due to the political turmoil (in Greece, Turkey, Egypt and Syria), but also to new unprecedented forms of Hacktivism such as the DDoS attacks to the U.S. Banks. §  Sophisticated cyber attacks operations are steadily gaining space on the media (5% of attacks recorded in 2013 and 2014, so far, are related to Cyber Espionage Operations). §  Cyber Crime is raising space (outcomes of the Target breach and the wave of attacks against retailers)?
  • 18. Findings §  DDoS is the favorite weapon of hacktivists. Attacks using this technique gained more space in the news in 2013. Now they are decreasing. §  Account Hijackings had nearly a 100% increase on a yearly basis (on the wake of the actions of the Infamous Syrian Electronic Army): Maximum result with minimum effort. §  Targeted attacks revealed in the news jumped in 6.2% in 2013 and are around 5.4% in 2014. §  Apparently high profile targets have become more aware of SQLi risks. §  In too many cases the reason of the attacks is still unknown. Growing Trend in 2014.
  • 20. Findings §  During 2012 and 2013 attacks towards governmental and industrial institutions ranked nearly at the same level; §  In 2014 the percentage of industrial targets is nearly the 30%. §  This is strictly related with the decrease of attacks motivated by hactkivism and the corresponding increase in attacks driven by Cyber Crime.