Top 5 Countries where Cyber Attacks Originate

Top 5 Countries Where Cyber Attacks Originate

Cyber attacks have been around as far back as the internet itself. Most countries have fallen victims to the traditional style of cyber attacks originating from other countries and with the rate of information growing exponentially in value and in volume, cyber risks have started to pose serious threats to governments, businesses and economies around the world. It is possible the continuous growth in cyber attacks could result in man-made disasters around the world.

2016 saw some of the most destructive cyber attacks since the dawn of the internet. Looking at the recent trends of the past, we can expect the this pattern to not only continue, but increase in severity.

What are the sources of these cyber attacks?

Most attacks are hatched by unidentified hackers working in groups or individually. The list below identifies the countries in which some of the biggest attacks were sourced from.

China

China continues to wage forward in cyber attacks, stealing intellectual property in the process despite political pressures by the US government. Also, China's cyber espionage campaigns appear to be more streamlined. The purpose of these attacks is to mostly hack the networks of US government and its allies. As per a research, 27.24% of cyber attacks are initiated by China. And according to various estimates, 41% of the world’s cyber attacks trace their genesis back to China.

Last year, ABC news reported that Chinese spies have reportedly stepped up their cyber attacks on networks belonging to Australian government and individuals in Australia. Hundreds of cyber attacks are now carried out every month. Aussies need to be aware of these hacking attempts and must use an Australia VPN to stay anonymous.

United States

While speaking at a press conference in G20 summit in China, the former President Barack Obama said “the nation he leads has the world's foremost cyber arsenal in the world.” This might be actually true given the sophistication of cyber attacks allegedly carried out by the US. In fact, 17.12% of cyber attacks are initiated by the US. As per various estimates, the US accounts for nearly 10% of the world’s malicious digital traffic. It is home to many famous and infamous hackers.

Turkey

In the global cyber attack traffic, Turkey has a share of 4.7% and as per estimates, 10.24% cyber attacks are carried out by Turkish hackers. Also, they have increased their activities in the last decade or so.

Brazil

It was last year’s hacking attempt at the Rio Olympics that brought Brazilian hackers into the limelight. In fact, Brazil has the highest cyber attack traffic not only in South-America but the entire southern hemisphere. Approximately, 8.60%of cyber attacks are initiated by Brazilians. The reason behind the growing numbers of cyber criminals in Brazil is the cashless nature of its economy.

Russia

Nearly 4.3% of all the global attack traffic is generated from Russia. The last year's DNC hack has placed Russia on our list. Russian hackers are famous worldwide and have a knack for cracking the most secure of networks. A total of 5.14% of cyber attacks are initiated by the Russians.

About the Author

Anas Baig is a Security Journalist covers most of the Cyber Security & Tech news. He is a security professional and writer specializing in Science and Technology, with a passion for dinosaurs, archaeology, robots, cars and animals great and small.

Featured

  • Top 5 Cybersecurity Trends of 2023

    Top 5 Cybersecurity Trends for 2023

    Cybersecurity is a rapidly evolving field, and staying on top of the latest trends is essential for organizations looking to protect themselves from cyber threats. Read Now

  • See How Reddit Users Have Unlocked the Dark Side of ChatGPT

    See How Reddit Users Have Unlocked the Dark Side of ChatGPT

    In less than four months after its debut, ChatGPT continues to garner attention from users all around the world who have made use of the AI system that answers questions, creates computer code, and much more. Read Now

  • Enforcing Zero Trust in a Hybrid Work Environment

    Enforcing Zero Trust in a Hybrid Work Environment

    The effects of the pandemic have rippled across the business world like a meteor hitting a pond, creating a new plethora of challenges that incorporated into MBA curriculum for years to come. Read Now

  • First Responders Give NIST Their Communications Tech Wish Lists

    First Responders Give NIST Their Communications Tech Wish Lists

    Our first responders have spoken. An extensive research project conducted by experts at the National Institute of Standards and Technology (NIST) reveals what our country’s police, fire, emergency medical and 911 dispatch responders think about the communications technology they use on a regular basis and how they would like developers to improve it in the future. Read Now

Featured Cybersecurity

New Products

  • Tyco Kantech EntraPass security management software

    Tyco Kantech EntraPass security management software

    Johnson Controls, the global leader in smart, healthy and sustainable buildings, and architect of the Open Blue digital connected platforms, has released the newest version of the Tyco Kantech EntraPass security management software. 3

  • LiftMaster Garage Door Opener

    LiftMaster Garage Door Opener

    LiftMaster Transforms the Garage Door Opener Into a Sleek Smart Home Device That Does More Than Open and Close the Garage Door 3

  • Schlage RC reader controller

    Schlage RC Reader Controller

    This new innovative device combines the power of the Pure IP™ access control technology pioneered by ISONAS with Schlage’s intelligent hardware and credentials, delivering a comprehensive and cost-effective perimeter solution to customers. 3