This past May there were a significant decrease of cyber-attacks. As a network forensics engineer I have personally experienced this decrease in attacks. There were only small peak times of attacks that occurred in May which was middle and at the end of May based upon the linear trending of known cyber- attacks. The majority of the attacks that did occur were in the realm of criminal activity. Sixty-five percent of the cyber-attacks were of criminal purpose. Surprisingly enough, 12% of cyber-attacks were related to cyber espionage both state and corporate.
The reasons for the espionage cyber-attacks are unknown at this point. However, we all know that it is some type of intellectual property, method or tracking that was involved in cyber espionage. Cyber criminals when they were busy in May accounted for an increase in computer hijackings and targeted attacks. Computer hijackings occur when the victim’s computer has been compromised and taken control over by a botnet system with command and control capabilities.
Overall, the worse cyber-attacks were on industry. Industry had a whopping 42% of all cyber-attacks that were indicated. As a breakdown of industry, it was e-commerce that took the brunt of this sector. I wonder why? Right? Well of course it’s because of the use of computers for on-line buying. The Government came in a close second for cyber-attacks at 21%. These attacks were mostly from hactivists, espionage or deliberate state sponsored type activities. Finally, 27% was the internal or insider threats which were determined by the number of both unauthorized and authorized user intrusions and breaches, even while they may be both intentionally and / or unintentionally. The June cyber-attack statistics at this pace should be increasingly bad in both government and industry if these trends continue. There are several sources for obtaining such real time statistics. You can use Verizon’s Veris Framework model and continuous reports on cyber-attacks. Usually, Verizon is mostly concerned with the corporate breaches rather than all categories of cyber-attacks. There is also the site that is the source for this blog that you can find below.