The data describes the leading threat action varieties within global industrial cyber espionage incidents in 2016. During the survey period, it was found that 181 of cyber espionage incidents involved phishing. The usage of stolen credentials occurred in 28 cyber espionage data breaches.
Social - Phishing | 181 |
Hacking - Use of Backdoor or C2 | 138 |
Malware - C2 | 136 |
Malware - Backdoor | 118 |
Malware - Adminware | 63 |
Malware - Capture stored data | 62 |
Malware - Export data | 60 |
Malware - Downloader | 53 |
Malware - Spyware/keylogger | 51 |
Hacking - Use of stolen credentials | 28 |