Technology & Telecommunication Services » Software » Security software | Cyber espionage: threat action varieties 2016

Cyber espionage: threat action varieties 2016

Leading threat action varieties within global industrial cyber espionage incidents in 2016

The data describes the leading threat action varieties within global industrial cyber espionage incidents in 2016. During the survey period, it was found that 181 of cyber espionage incidents involved phishing. The usage of stolen credentials occurred in 28 cyber espionage data breaches.

Social - Phishing 181
Hacking - Use of Backdoor or C2 138
Malware - C2 136
Malware - Backdoor 118
Malware - Adminware 63
Malware - Capture stored data 62
Malware - Export data 60
Malware - Downloader 53
Malware - Spyware/keylogger 51
Hacking - Use of stolen credentials 28