###### Information Security Timelines and Statistics Cyber Attacks Statistics Cyber Attacks Timeline Security #### 2018: A Year of Cyber Attacks  [January 15, 2019](https://www.hackmageddon.com/2019/01/15/2018-a-year-of-cyber-attacks/)  [Paolo Passeri](https://www.hackmageddon.com/author/paulsparrows/)  1 Comment  [2017, 2018, Cyber Attacks, Cyber](https://www.hackmageddon.com/tag/2017/) ###### Crime, Cyber Espionage, Cyber Warfare, Hacktivism, Statistics, Timeline  [Views: 12,048] Finally I can summarize all the events and statistics collected in 2018, quite a complicated year from an infosec perspective. For those of you that keep asking, every two weeks (more or less) I publish a timeline with the main cyber attacks occurred in that period. Every timeline contains the link with the details of the events, and �nally, every month (more or less), the timelines are aggregated to provide a statistical overview of the period. Moreover, the taxonomy of the categories is inherited from the International Standard Industrial Classi�cation So during 2018, I have collected a total of 1337 events that you can �nd in the following table (and after the table you will �nd the statistics):  [Print]  [Excel]  [CSV]  [Copy]  [PDF] **Show** 10 **entries** **Search:** |Date|Author|Target|Description|Attack|Target Class|Atta ck Clas s|Coun try|Link| |---|---|---|---|---|---|---|---|---| ----- |Col1|Col2|Col3|Col4|Col5|Col6|Col7|Col8|Col9|Col10|k| |---|---|---|---|---|---|---|---|---|---|---| |||||||||||| |01/10/ 2018|?|Apollo|Apollo, a sales engagement startup boasting a database of more than 200 million contact records, is hacked and sends an email to its affected customers.|Unknow n|S Other service activities|Cybe r Crim e|US|Link (http s://te chcru nch.c om/2 018/ 10/0 1/ap ollo­ conta cts­ data­ breac h/)||| ||||||||||Link|| |||||||||||| |01/10/ 2018|Roamin g Mantis|iOS Users|Kaspersky discover that the Roaming Mantis group is testing a new monetization scheme by redirecting iOS users to pages that contain the Coinhive in­browser mining script rather than the normal Apple phishing page.|Maliciou s Script Injectio n|X Individual|Cybe r Crim e|>1|Link (http s://s ecure list.c om/r oami ng­ manti s­ part­ 3/88 071/)||| ||||||||||Link|| |||||||||||| |02/10/ 2018|Hidden Cobra AKA Lazarus Group|US Banks|A joint technical alert from the DHS, the FBI, and the Treasury warns about a new ATM cash­out scheme, dubbed “FASTCash,” used by the Hidden Cobra APT.|Malware /PoS Malware|K Financial and insurance activities|Cybe r Crim e|US|Link (http s://s ecurit yaffai rs.co/ word press /767 98/h ackin g/fas tcash ­ hidde n­ cobra ­ attac ks.ht ml)||| ||||||||||Link|| |||||||||||| ----- |Col1|Col2|Col3|Col4|Col5|Col6|Col7|Col8|Col9|Col10|k| |---|---|---|---|---|---|---|---|---|---|---| |||||||||||| |02/10/ 2018|?|Individual s in the US|Researchers from ProofPoint discover a new DanaBot campaign spread through Malspam campaign installing the Hancitor malware.|Malware /PoS Malware|X Individual|Cybe r Crim e|US|Link (http s://w ww.p roofp oint.c om/u s/thr eat­ insig ht/po st/da nabot ­ gains ­ popul arity­ and­ targe ts­ us­ organ izatio ns­ large ­ camp aigns )||| ||||||||||Link|| |||||||||||| ----- |Col1|Col2|Col3|Col4|Col5|Col6|Col7|Col8|Col9|Col10|k| |---|---|---|---|---|---|---|---|---|---|---| |||||||||||| |02/10/ 2018|?|City of Regina|A city of Regina email is hacked, and used as a phishing tool to try and get passwords and emails from other city of Regina staff as well as external groups.|Account Hijackin g|O Public administr ation, defence, compulso ry social security|Cybe r Crim e|CA|Link (http s://gl obaln ews.c a/ne ws/4 5213 46/ci ty­of­ regin a­ email ­ hack ed­ exper ts­ warn ­ citys­ websi te­ unsaf e­as­ well/)||| ||||||||||Link|| |||||||||||| |02/10/ 2018|?|WhatsAp p Users in Israel|A wave of reports about hijacked WhatsApp accounts in Israel has forced the government's cyber­security agency to send out a nation­ wide security alert.|Account Hijackin g|X Individual|Cybe r Crim e|IL|Link (http s://w ww.z dnet. com/ articl e/rec ent­ wave ­of­ hijac ked­ what sapp­ accou nts­ trace d­ back­ to­ voice mail­ hacki ng/)||| ||||||||||Link|| |||||||||||| ----- |Col1|Col2|Col3|Col4|Col5|Col6|Col7|Col8|Col9|k| |---|---|---|---|---|---|---|---|---|---| ||||||||||| |Date|Aut…|Target|Description|Att…|Targ…|…|…|L…|| Showing 1 to 10 of 1,337 entries ######   1 2 3 4 5 … 134   ###### Now, let’s have a closer look at the statistics derived from the mega timeline of 2018. The �rst chart compares the total events in 2017 and 2018 on a monthly basis. Clearly, with the sole exception of August, the level of activity has been constantly higher in 2018. ###### Monthly Attacks (2017 vs 2018) 160 140 120 100 80 60 40 20 0 hackmageddon.com [JS chart by amCharts](http://www.amcharts.com/) Jan Mar May Jul Sep Nov |Col1|Col2|Col3|Col4|Col5|Col6|Col7|Col8| |---|---|---|---|---|---|---|---| ||JS chart by|amCharts|||||| ||||||||| ||||||||| ||||||||| ||||||||| ||||||||| ||||||||| ||||||||| ----- ###### Daily Events Per Category (2017 vs 2018) hackmageddon.com 12 10 8 6 4 2 0 01­Jan 08­Feb 18­Mar 25­Apr 02­Jun 10­Jul 17­Aug 24­Sep 01­Nov 9­Dec Cyber Crime (2017) Cyber Crime (2018) Cyber Espionage (2017) Cyber Espionage (2018) Cyber Warfare (2017) Cyber Warfare (2018) Hacktivism (2017) Hacktivism (2018) ###### The following charts compare the distribution of motivations between 2017 and 2018: as expected also in 2018 cyber crime leads the chart with an increase of nearly 5 points in comparison to 2017. All the other motivations (cyber espionage, hacktivism and cyber warfare) has ###### experienced a decrease in 2018. [JS chart by amCharts](http://www.amcharts.com/) ###### Motivations (2017): 951 Events [JS chart by amCharts](http://www.amcharts.com/) ###### Motivations (2018): 1337 Events hackmageddon.com ###### 951 hackmageddon.com 3.36% ###### 337 2.84% 12.86% 2.47% 4.73% 14.51% 77.39% 81.82% ----- 100 0 ###### Monthly Distribution Motivations of (2018) hackmageddon.com [JS chart by amCharts](http://www.amcharts.com/) Jan Jul 150 100 50 0 ###### Monthly Distribution Motivations of (2017) hackmageddon.com [JS chart by amCharts](http://www.amcharts.com/) Jan Jul |JS c|Col2|Col3|Col4|hart by amC|Col6|Col7|Col8|Col9|Col10|harts|Col12|Col13|Col14|Col15|Col16| |---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---| ||||||ar|||||h|||||| ||||||||||||||||| ||||||||||||||||| ||||||||||||||||| |JS c|Col2|Col3|Col4|hart by amC|Col6|Col7|Col8|Col9|Col10|harts|Col12|Col13|Col14|Col15|Col16| |---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---| ||||||||||||||||| ||||||||||||||||| ||||||||||||||||| ||||||||||||||||| ||||||||||||||||| ||||||||||||||||| ###### Malware (and I would add unsurprisingly) leads the chart of the Top 10 Attack Techniques: ----- Account Hijacking: 18.2% Unknown: 16.0% Targeted Attack: 13.0% Malware/PoS Malware: 34.4% Vulnerability: 6.4% Malicious Script Injection: 3.2% DDoS: 3.2% Defacement: 2.3% Brute­Force/Credential Stuffing: 1.3% SQLi: 0.8% Social Network Bots: 0.8% 51% attack: 0.4% Malware/PoS Malware 441 Account Hijacking 233 Unknown 205 Targeted Attack 167 Vulnerability 82 Malicious Script Injection 41 DDoS 41 Defacement 29 Brute­Force/Credential Stuffing 17 SQLi 10 Social Network Bots 10 51% attack 5 ###### While individuals are still the preferred targets for cyber criminals: ----- Multiple Industries: 15.6% Information, communication: 5.5% Arts entertainment, recreation: 3.9% Wholesale, retail trade: 2.5% Accommodation, food services: 2.3% Other services: 2.3% Transportation, Storage: 1.9% Manufacturing: 1.8% Electricity, gas steam, air conditioning supply: 1.3% Professional scientific, technical: 1.2% Extraterritorial organizations and bodies: 0.9% Administrative and support services: Individuals 301 Multiple Industries 208 Public administration, defence, social security 167 Human health, social work 124 Financial and insurance 83 Education 74 Information, communication 73 Arts entertainment, recreation 52 Fintech 44 Wholesale, retail trade 34 Accommodation, food services 31 Other services 31 Transportation, Storage 26 Manufacturing 24 Electricity, gas steam, air conditioning supply 17 Professional scientific, technical 16 Extraterritorial organizations and bodies 12 Administrative and support services 12 Water supply, sewerage waste management 4 Unknown 3 Real estate 1 ###### The following chart shows the breakdown of motivations for each target sector. Please notice the in�uence of cyber crime for the healthcare sector. ----- g Individuals Multiple Industries Public administration, defence, social security Human health, social work Financial, insurance Education Information, communication Arts entertainment, recreation Fintech Wholesale, retail trade Accommodation, food service Other services Transportation, storage Manufacturing Electricity, gas steam, air conditioning Professional scientific, technical Administrative and support service Extraterritorial organizations and bodies Water supply, sewerage waste management Unknown Real estate |J|S chart b|Col3|Col4|y amCharts|Col6|Col7|Col8|Col9|Col10|Col11|Col12| |---|---|---|---|---|---|---|---|---|---|---|---| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| ||||||||||||| 0 100 200 300 4 Cyber Crime Cyber Espionage Hacktivism Cyber Warfare ###### And I think that for 2018 is pretty much everything. Feel free to share the links and use the data (for personal purposes) as needed. Also remember that this is only the tip of the iceberg, and obviously my stats can’t be comprehensive. My humble mission is just to rise the awareness and keep the level of attention on the cyber threats constantly high. ----- ###### 2017 Cyber Attacks Statistics December 2018 Cyber Attacks Statistics Share this: ###### May 2018 Cyber Attacks Statistics April 2018 Cyber Attacks Timeline ###### October 2018 Cyber Attacks Statistics ###### June 2017 Cyber Attacks Statistics ######             10 ###### Like this: ###### Like Be the first to like this. ###### ← December 2018 Cyber Attacks Statistics 1-15 January 2019 Cyber Attacks Timeline → ###### One thought on “2018: A Year of Cyber Attacks”  Matt Fagala  January 15, 2019 at 4:34 pm  Permalink Many of us appreciate all you do. Thanks. ######  ----- ###### Enter your comment here...Enter your comment here... ###### Enter your comment here... ###### This site uses Akismet to reduce spam. Learn how your comment data is processed. Copyright © 2019 HACKMAGEDDON. All rights reserved. Theme: ColorMag by ThemeGrill. Powered by WordPress. -----