WP Cyber Threat Index | Cyber Security Statistics & Trends | Imperva

Cyber Threat Index Score by Country

View threat level by:

Country

This month, Israeli financial institutions and services experienced a significant uptick in distributed denial of service (DDoS) attacks. One financial services site faced its largest application-layer DDoS attack to date, enduring an hour-long onslaught that peaked at 3.5 million requests per second (RPS), indicative of a well-coordinated effort involving a vast botnet of over 13,000 unique IP addresses. Across multiple incidents, over 3200 IPs were identified as overlapping among the attacks, strongly suggesting a coordinated campaign against these sites. These attacks, targeting sites that have been repeatedly attacked throughout the year, highlight the persistent and evolving threat of politically or financially motivated cyber aggression towards Israeli financial sectors.

Take action:
Imperva DDoS Protection secures all your assets at the edge for uninterrupted operation.

This month, an Italian telecommunications site was subjected to an aggressive account takeover (ATO) campaign, witnessing nearly 8 million attempted logins in a sophisticated brute force attack lasting almost 24 hours. Remarkably, the attack came exclusively from within Italy, utilizing bots for the vast majority of login attempts. This localized nature of the attack suggests a highly targeted approach, possibly indicating the presence of a formidable botnet operation within the country. Notably, less than 10% of the credentials attempted were from previously leaked datasets, implying that the attackers were relying heavily on generating combinations to breach accounts. This incident highlights the escalating challenge of securing digital identities against the backdrop of increasingly automated and localized cyber threats.

Take action:
Imperva Account Takeover prevention uses multi-layered detection to block fraud.

This month, a prominent US-based entertainment website experienced severe remote code execution (RCE) attacks, attempting to exploit several vulnerabilities including CVE-2022-21371. With the attacks generating over 10 million requests per day, the scale of this attack is noteworthy. The offensive was launched from IP addresses–primarily leveraging tools written in Go– located within the US, suggesting the possible use of a regional botnet or a deliberate strategy to obscure the attackers' true geographical origins or bypass georestrictions. This incident not only underscores the vulnerability of entertainment platforms to sophisticated cyberattacks, but also highlights the complexity of attributing such attacks in an increasingly interconnected digital landscape.

Take action:
See how Imperva Web Application Firewall can help you defend against attacks like RCE..

Following this year’s trend of increasing DDoS attacks, a Romanian retail website was the target of an application-layer distributed denial of service (DDoS) attack, peaking at just over 4 million requests per second (RPS). In addition to being this year's second-largest DDoS attack, this is the largest attack we’ve ever seen on Romania, up from a previous average of 27,000 RPS. Originating from approximately 2,000 IP addresses, with a notable concentration in both Romania and China, this incident not only highlights the global scale and coordination behind such cyberattacks but also raises concerns about the potential involvement of international cybercriminal networks. This attack underscores the critical need for robust cybersecurity defenses in the retail sector, which is increasingly becoming a focal point for high-scale DDoS campaigns.

Take action:
Imperva DDoS Protection secures all your assets at the edge for uninterrupted operation.

decor

Application Security Highlights

With visibility into global web application traffic from different industries, the Cyber Threat Index is a comprehensive look at application security.

Total Number of Requests Analyzed

Total Number of Application Attacks Blocked

Origin of Web Threats

This map reflects the relative amount of attacks per country, after normalizing the number of attacks with legitimate traffic. Hover mouse over the countries to see data.

Country vs Country Heatmap

This heatmap shows attacks where countries are the source (attackers) or destination (attacked) of application security attacks. The number represents a relative, normalized value.

Cyber Attack Types

Breakdown of attack attempts seen in our network, split by attack types.

Cyber Attacks by Source

Breakdown of attack attempts seen in our network, split by the source of the attacking traffic.

Automated vs Human Attacks

Shows the proportion of bot and human traffic identified as performing attacks within all observed traffic.

Attacks Observed by Tool Used

Shows the breakdown of attacks in our network by the type of tool used by attackers.

Vulnerabilities by Severity

Shows the number of disclosed vulnerabilities for every day of the month. These vulnerabilities are separated by severity. Includes both CVE (Common Vulnerabilities & Exposure) and ‘Non-CVEs’.

Vulnerabilities by ‘Exploitability’

Breakdown of vulnerabilities disclosed by the “exploitability” (e.g. whether there is a published exploit) of the disclosed vulnerability.

Vulnerabilities by Attack Type

Shows the breakdown of attack types for the published vulnerabilities.

decor

Vulnerabilities by Severity

In the following chart you can see the disclosed vulnerabilities for every day of the month. We separate them by their severity. This includes both CVE (Common Vulnerabilities & Exposure) and ‘Non-CVEs’.

Low Severity

Vulnerabilities

Medium Severity

Vulnerabilities

HIGH Severity

Vulnerabilities

decor

DDoS Attacks Highlights

Understand the duration of the longest attack. Know the size and volume of the largest DDoS attacks. Learn more about DDoS here.

Longest DDoS
attack

Largest Web Application
DDoS attack

Largest Bandwidth Network
Layer DDoS Attack

Highest Volume Network
Layer DDoS Attack

Application Layer DDoS Attack

Shows the volume of Application Layer attacks for each day of the month by the maximum total requests per second (RPS) blocked by our DDoS mitigation service.

DDoS Attacks by Attacked Country

Breakdown of DDoS attacks by the attacked country.

DDoS Attacks by Attacked Industry

Breakdown of DDoS attacks by the attacked industry.

Network Layer DDoS Attack

Network layer attacks look to overwhelm the target by exhausting the available bandwidth. Shows the attacks by their bandwidth and by volume.

Network Layer Attack Volume (Gbps) by Vector

Breakdown of bandwidth volume (Gigabits per second) by the vector used in network layer DDoS attacks.

Network Layer Attack Rates (Mpps) by Vector

Breakdown of attack rates (Mega packets per second) by the vector used in network layer DDoS attacks.