Top 5 Countries where Cyber Attacks Originate

Page 2 of 1

Top 5 Countries Where Cyber Attacks Originate

Cyber attacks have been around as far back as the internet itself. Most countries have fallen victims to the traditional style of cyber attacks originating from other countries and with the rate of information growing exponentially in value and in volume, cyber risks have started to pose serious threats to governments, businesses and economies around the world. It is possible the continuous growth in cyber attacks could result in man-made disasters around the world.

2016 saw some of the most destructive cyber attacks since the dawn of the internet. Looking at the recent trends of the past, we can expect the this pattern to not only continue, but increase in severity.

What are the sources of these cyber attacks?

Most attacks are hatched by unidentified hackers working in groups or individually. The list below identifies the countries in which some of the biggest attacks were sourced from.

China

China continues to wage forward in cyber attacks, stealing intellectual property in the process despite political pressures by the US government. Also, China's cyber espionage campaigns appear to be more streamlined. The purpose of these attacks is to mostly hack the networks of US government and its allies. As per a research, 27.24% of cyber attacks are initiated by China. And according to various estimates, 41% of the world’s cyber attacks trace their genesis back to China.

Last year, ABC news reported that Chinese spies have reportedly stepped up their cyber attacks on networks belonging to Australian government and individuals in Australia. Hundreds of cyber attacks are now carried out every month. Aussies need to be aware of these hacking attempts and must use an Australia VPN to stay anonymous.

United States

While speaking at a press conference in G20 summit in China, the former President Barack Obama said “the nation he leads has the world's foremost cyber arsenal in the world.” This might be actually true given the sophistication of cyber attacks allegedly carried out by the US. In fact, 17.12% of cyber attacks are initiated by the US. As per various estimates, the US accounts for nearly 10% of the world’s malicious digital traffic. It is home to many famous and infamous hackers.

Turkey

In the global cyber attack traffic, Turkey has a share of 4.7% and as per estimates, 10.24% cyber attacks are carried out by Turkish hackers. Also, they have increased their activities in the last decade or so.

Brazil

It was last year’s hacking attempt at the Rio Olympics that brought Brazilian hackers into the limelight. In fact, Brazil has the highest cyber attack traffic not only in South-America but the entire southern hemisphere. Approximately, 8.60%of cyber attacks are initiated by Brazilians. The reason behind the growing numbers of cyber criminals in Brazil is the cashless nature of its economy.

Russia

Nearly 4.3% of all the global attack traffic is generated from Russia. The last year's DNC hack has placed Russia on our list. Russian hackers are famous worldwide and have a knack for cracking the most secure of networks. A total of 5.14% of cyber attacks are initiated by the Russians.

About the Author

Anas Baig is a Security Journalist covers most of the Cyber Security & Tech news. He is a security professional and writer specializing in Science and Technology, with a passion for dinosaurs, archaeology, robots, cars and animals great and small.

Featured

  • Cloud Adoption Gives Way to Hybrid Deployments

    Cloud adoption is growing at an astonishing rate, with Gartner forecasting that worldwide public cloud end-user spending will approach $600 billion by the end of this year—an increase of more than 21% over 2022. McKinsey believes that number could eclipse $1 trillion by the end of the decade, further underscoring the industry’s exponential growth. Read Now

  • AI on the Edge

    Discussions about the merits (or misgivings) around AI (artificial intelligence) are everywhere. In fact, you’d be hard-pressed to find an article or product literature without mention of it in our industry. If you’re not using AI by now in some capacity, congratulations may be in order since most people are using it in some form daily even without realizing it. Read Now

  • Securing the Future

    In an increasingly turbulent world, chief security officers (CSOs) are facing a multitude of challenges that threaten the stability of businesses worldwide. Read Now

    • Guard Services
  • Security Entrances Move to Center Stage

    Most organizations want to show a friendly face to the public. In today’s world, however, the need to keep people safe and secure has become a prime directive when designing and building facilities of all kinds. Fortunately, there is no need to construct a fortress-like entry that provides that high level of security. Today’s secured entry solutions make it possible to create a welcoming, attractive look and feel at the entry without compromising security. It is for this reason that security entrances have moved to the mainstream. Read Now

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3