Top 5 Countries where Cyber Attacks Originate

Top 5 Countries Where Cyber Attacks Originate

Cyber attacks have been around as far back as the internet itself. Most countries have fallen victims to the traditional style of cyber attacks originating from other countries and with the rate of information growing exponentially in value and in volume, cyber risks have started to pose serious threats to governments, businesses and economies around the world. It is possible the continuous growth in cyber attacks could result in man-made disasters around the world.

2016 saw some of the most destructive cyber attacks since the dawn of the internet. Looking at the recent trends of the past, we can expect the this pattern to not only continue, but increase in severity.

What are the sources of these cyber attacks?

Most attacks are hatched by unidentified hackers working in groups or individually. The list below identifies the countries in which some of the biggest attacks were sourced from.

China

China continues to wage forward in cyber attacks, stealing intellectual property in the process despite political pressures by the US government. Also, China's cyber espionage campaigns appear to be more streamlined. The purpose of these attacks is to mostly hack the networks of US government and its allies. As per a research, 27.24% of cyber attacks are initiated by China. And according to various estimates, 41% of the world’s cyber attacks trace their genesis back to China.

Last year, ABC news reported that Chinese spies have reportedly stepped up their cyber attacks on networks belonging to Australian government and individuals in Australia. Hundreds of cyber attacks are now carried out every month. Aussies need to be aware of these hacking attempts and must use an Australia VPN to stay anonymous.

United States

While speaking at a press conference in G20 summit in China, the former President Barack Obama said “the nation he leads has the world's foremost cyber arsenal in the world.” This might be actually true given the sophistication of cyber attacks allegedly carried out by the US. In fact, 17.12% of cyber attacks are initiated by the US. As per various estimates, the US accounts for nearly 10% of the world’s malicious digital traffic. It is home to many famous and infamous hackers.

Turkey

In the global cyber attack traffic, Turkey has a share of 4.7% and as per estimates, 10.24% cyber attacks are carried out by Turkish hackers. Also, they have increased their activities in the last decade or so.

Brazil

It was last year’s hacking attempt at the Rio Olympics that brought Brazilian hackers into the limelight. In fact, Brazil has the highest cyber attack traffic not only in South-America but the entire southern hemisphere. Approximately, 8.60%of cyber attacks are initiated by Brazilians. The reason behind the growing numbers of cyber criminals in Brazil is the cashless nature of its economy.

Russia

Nearly 4.3% of all the global attack traffic is generated from Russia. The last year's DNC hack has placed Russia on our list. Russian hackers are famous worldwide and have a knack for cracking the most secure of networks. A total of 5.14% of cyber attacks are initiated by the Russians.

About the Author

Anas Baig is a Security Journalist covers most of the Cyber Security & Tech news. He is a security professional and writer specializing in Science and Technology, with a passion for dinosaurs, archaeology, robots, cars and animals great and small.

Featured

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3

  • SecureAuth

    SecureAuth

    The acceleration of digital transformation initiatives as a result of COVID-19 has created a lasting impact on how businesses empower their workforce and engage customers. 3

  • PDK IO Access Control Software

    PDK.IO Access Control Software

    ProdataKey now allows for "custom fields" within the interface of its pdk.io software. Custom fields increase PDK's solutions' overall functionality by allowing administrators to include a wide range of pertinent data associated with each user. 3