_Cyber-Threat and Attack Trends and Prediction of Future Cyber-Attack Patterns e
_Cyber-Threat and Attack Trends and Prediction of Future Cyber-Attack Patterns e
Abstract: This paper presents a comparative survey of cyber-threat and attack trends starting from 2010 till date. Cyber
security breaches are constantly on the rise with huge uncertainty and risks. The trend is causing rife globally because
of its consequences to national security and economy. With diverse interests and motivations for various categories of
threats and attacks, we carried out a comparative survey and analysis of security breaches to unravel the patterns and
predict what will shape future security challenges. The diversity of attacks and growing state actors’ involvement
without any sort of regulation is making cyber weapons attractive to the states. States are leveraging the anonymity and
attribution flaws to hit hard on perceived adversaries thereby complicating the cyber security equation.
Keywords: Cyber security; Cyber-threats; Cyber-attacks; Cyber security trends; target; Motivation
I. INTRODUCTION
With the increasing dependence on the internet by individuals, industries, academic institutions and government
agencies, the issue of cyber-attack as become everyone’s business. While the cyber space is relied on for entertainment,
business, education and administration amongst other purposes, many users –individuals, groups and nation states- now
take advantage of this dependence to fulfil their own malicious intents [1]. Different attacks now occur on the internet
on a regular basis. While some of them are similar in purpose and mode of operation, others tend to be of a different
stalk. Some attacks are re-occurrences of past attacks - with different targets and tools used for operation, while other
attacks are entirely new. Knowledge of the sources of these attacks, system vulnerabilities that paved way for the
attacks, and the method used in carrying out the attacks is crucial for mitigating the re-occurrences of similar attacks in
the future [2]. Comparative Survey of Cyber-Threat and Attack Trends and Prediction of future Cyber-attack Patterns is
for every stake holder of the cyber space who is concerned about being secured against cyber-threats. The study high
lights real case studies of attacks, identifies their motivations, tools or techniques used and the targets they exploited.
These events are statistically analysed to predict future attacks, in a bid to inform internet users to be better prepared for
them. The rest of this paper is organised into different sections. Section II reviews various literature that explain the
diverse cyber-threats and attacks that exist and section III identifies the various cyber-threats and attacks that have
plagued systems since the year 2012 till date. Section IV describes a methodology used in analyzing the past and
present cyber-attacks mentioned in the previous section, then in section V, mathematical analysis is carried out to
identify the pattern which the cyber-threats and attacks have taken. Finally, section VI discusses the result of the
analysis done in the previous section, bringing to light the relationship between the cyber-attacks and predicting the
form in which cyber-threats and attacks will take in the future [3].
ISSN(Online): 2320-9801
ISSN (Print): 2320-9798
b) 2013
Houston Astros: Houston Astros is a baseball team that is based in Houston, Texas, United States of America. When a
former staff of St. Louis Cardinals (an American baseball team based in St. Louis, Missouri) called Jeff Luhnow was
leaving Cardinals for Houston Astros around December 2011, he handed his work laptop and its password to a staff of
Cardinals at that time called Christopher Correa. Correa began to try variations of Luhnow’s passwords on Astros’s
database until he succeeded in getting the password that enabled him access Astros’ database called Ground Control
[10]. By March and July 2013, Correa scooped player information about how players are obtained and rated.
Yahoo: Yahoo is a popular mail service based in the United States. In 2013, data from 1 billion Yahoo accounts were
stolen. Such data include user names, phone numbers, and date of birth, password and security questions that are useful
for password reset.
Myspace: Myspace is an online social network which allows users to submit network of friends, videos, music, blog,
profiles, photos, etc. Myspace was intruded in June 2013, by a hacker called “Peace” who stole Usernames and
Passwords from about 360 million accounts of users [13].
Target: target is a discount store retailer, with headquarters in Minneapolis, Minnesota, United States. Data breach on
Target’s systems started on the 27th of November, 2013 [14]. The hackers stole 11 gigabytes of data consisting of
credit and debit card records of about 110 million customers of Target. The hackers got their way into Target through a
refrigeration contractor called Fazio Mechanical. Through phishing email, a variant of the Zeus banking Trojan called
Citadel was installed in Fazio’s systems. Citadel was used to collect login credentials.
c) 2014
Home Depot: Home Depot is a retailing company that deals in home improvement supplies like tools, construction
materials and services in the United States. Around April to September 2014, Home Depot systems were compromised
and 53 million email addresses, together with 56 million credit and debit card details were stolen [15]. Documents from
Home Depot show that the company refused to activate intrusion detection feature on its security software-the
managers wanted to reduce cost and service downtime, even though that led to insecurity. The feature was specifically
made to identify attacks on registers. An investigator said the attack was on the store’s registers [16]. Home Depot says
a third-party vendor’s stolen login credentials was used to gain access to the retailer’s network.
Yahoo: By late 2014, Yahoo was struck again. This time, 500 million user accounts were compromised and sensitive
information stolen includes user names, phone numbers, and date of birth, encrypted password and unencrypted
questions that are useful for password reset. Yahoo thinks the hackers were backed by a nation-state [17].
ISSN(Online): 2320-9801
ISSN (Print): 2320-9798
d) 2015
Ashley Madison: Ashley Madison is a dating website that is meant for people who are married or are in a committed
relationship. The site is owned by a Canadian based company called Avid Media. In 2015, a hacking group named
‘Impact Team’ gave Avid Media 30 days to close Ashley Madison but when the company refused to comply the
hackers leaked details of 32 million of the site’s customers online [23]. The sensitive information leaked includes
transactions, credit card data, emails and user profiles. Impact Team was angry with Ashley Madison for arranging
dates for married people and its high charge given to people who want all their data deleted from the site [24].
Hacking Team: Hacking Team is an intelligence organisation that develops and sells hacking tools to various
governments. In 2015, a hacker called Phineas Phiser. After exploiting vulnerability in an embedded device, the hacker
could access an unsecured database in Hacking Team which he also breached. The hacking was a punishment given to
Hacking Team for making tools which governments used to hack and spy on people [25].
Kaspersky Lab: Kaspersky Lab is a top anti-malware-producing company based in Russia. Kaspersky was struck by
hackers whose intent was to steal trade secrets on Kaspersky’s latest technology. Kaspersky admitted that the attacker
had access to only data that was not critical to its operations [26].
Kaspersky links the attack to the hackers who used the Trojan dubbed Duqu to infiltrate system in India and Belgium in
2011.
e) 2016
Federal Reserve Bank of New York: In February 2016, a group of hackers called Lazarus hackers operating with a
malware called Dridex, used the SWIFT code of Bangladesh Bank to instruct the Federal Reserve Bank of New York
to transfer $81 million from Bangladesh Bank’s account to five different accounts in the Rizal Commercial Banking
Corporation (RCBC) in the Philippines. Security experts claim that North Korea is responsible for the attacks [27].
Democratic National Committee (DNC): The DNC is the governing body of the US’ Democratic Party. On July 22,
2016 wiki leaks published 19,252 emails and 8,034 attachments stolen from the DNC by a hacker who goes by the
name “Guccifer 2.0”. On November 6, 2016, Wikileaks released more 8,263 emails gotten from the DNC by hackers.
The leaked documents indicated that the DNC members were inclined to helping Hillary Clinton win the elections.
ISSN(Online): 2320-9801
ISSN (Print): 2320-9798
Ukraine’s Power Grid: In December 2016, a group of Russian hackers called Fancy bear hacked Ukraine’s power
grid, putting out 200 megawatts of power, and they also tracked Ukraine’s military unit, retrieve communications and
location data [29]. Fancy Bear is linked to the breach of the US Democratic National Committee’s emails in 2016.
f) 2017
World-wide attack: In May 2017, a virus dubbed WannaCry infected about 300,000 computers in about 150 counties.
The virus encrypted files in the host computers and asked the owners of the files to pay a ransom in bit coin within a
stipulated time (usually seven days) or lose their files [30]. Researchers in Symantec, Kaspersky and South Korea’s
Hauri Labs claim the older version of WannaCry shares some similarities with the malware used by Lazarus Group (a
group alleged to be run by North Korea) to siphon money from Bangladesh Bank’s account at the Federal Reserve
Bank of New York [9].
IV. METHODOLOGY
The methodology for comparative survey adopts systematic review which is aimed at providing the trends in cyber-
threats and attacks in order to recommend a research direction [31]. The results of the survey would help us to identify
and map research areas related to cyber-threat and attack that need to be intensified and possible research gaps. The
process for the study is presented in Figure 1, and consists of six process steps and outcomes [32-34].
V. COMPARATIVE ANALYSIS
We present the comparative analysis of cyber-threat and attacks using the data collected from
www.hackmageddon.com. Three factors are considered in data organisation: motivation, method and target from 2012-
2017.
Rate
Motivation
2012 2013 2014 2015 2016 2017
Cyber Crime 57.275 49.16667 62.3 67 72.1 77.4
Hacktivism 36.3333 42.08333 24.2 20.8 14.2 4.7
Cyber Warfare 3.45833 3.083333 11 9.8 9.2 14.5
Cyber Espionage 2.93333 5.5 2.5 2.4 4.3 3.4
Art? 0 0.083333 0 0 0.2 0
N/A 0 0.083333 0 0 0 0
Rate
Method
2012 2013 2014 2015 2016 2017
Account Hijacking 2.4 10.3 9.8 8.3 15.1 15.5
DDOS 19.4 19.9 9.3 9.3 11.2 4.2
Defacement 6.4 14.4 14.8 12.4 4.5 2.4
DNS Hijacking 1 1.7 1 0.9 0.4 1.2
ISSN(Online): 2320-9801
ISSN (Print): 2320-9798
Percentage
Target
2012 2013 2014 2015 2016 2017
>1 0 1.9 3.3 4.4 4.7 7.9
Cryptocurrency Exchange 0.1 0.9 0 0 0 2.5
Education 8.3 5 6 6.9 3.4 6.8
Finance 4.3 11 2.5 2.6 4.2 3.5
Government 21.3 24.3 20 13.7 11.9 12.5
Healthcare 0.8 1 3.1 2.6 4.1 6.8
Industry 15.6 21.5 33.8 25.2 24.8 22.4
Military 2.4 1.6 0 0 0 1.4
News 3 5.7 2.8 2.9 1.9 0
Online Services 5.3 1.6 2 2.5 3.2 0
Organisation 6.9 7.1 9.4 8.3 8.3 4.5
Others 32 13.9 11.4 26 24.2 9.4
Single Individuals 0 4.5 5.7 4.9 9.3 22.3
VI. DISCUSSION
6.1 Attack Motivation
Our analysis in Figure 2 shows that cyber-crime rate is the highest in 2012 with 57.275 followed by Hacktivism with
36.3333; the same is maintained in 2013 with 49.16667 and 42.08333 for cyber-crime and hacktivism rates respectively
Table 1. The cyber-crime rate continues to increase from 2014 to 2017 consecutively with 62.3, 67, 72.1, and 77.4
respectively while hacktivism rate decreases in 2014 to 2017 consecutively with 24.2, 20.8, 14.2, and 4.7 respectively.
The analysis indicates increase in cyber warfare rate in 2014 to 2017 with 24.2, 20.8, 14.2 and 4.7 respectively placing
it in second position to cyber-crime in 2017. Other motivations like espionage experience no significant change across
the years. The point is that cyber warfare simply can mean the use of cyberspace to gain military, political and
economic advantage over an opponent but Cyber Crime can be alluded to as a civilian act, highly motivated by criminal
benefits like in conventional crime [40]. Cyber-crime is very wide in scope as it covers all malicious acts; hence Figure
2 shows that cyber-crime is the major motivation behind cyber threat and attack since 2012 up to 2017 and the high
margin to other motivations indicates its predominant motivation in future. Therefore, more people may likely engage
in cyber-crime than other motivation in future. Cyber-warfare on the other hand happens among nations, so the rate
may continue to rise as more nations tussle for powers, which indicates its second position to cyber-crime in the future.
VII. CONCLUSION
Since 2012 up to 2017, cyber-crime has been the major motivation behind cyber threat and attack compared to other
motivations. This trend is likely to continue in the nearest future at least. Cyber warfare will follow after cyber-crime as
nation’s battle each other for supremacy. The constant high rate of Account Hijacking between 2013 and 2015 and its
surge in 2016 which was maintained in 2017 indicates a possibility of future dominance. Consequently, the stable rate
of attack on industry since 2012 to 2017 indicates its likely predominance in the future. Also, attack on single
individuals and governments would likely increase due to espionage.
VIII. REFERENCES