You are on page 1of 1

ENISA threat landscape

Top 15 Cyber Threats 2015


o
o s o c i a ln l i n e
s s o c i a ln l i n e i der
s hac
i d er hac I n s ke
rs
s

TREND 2015
In ke
rs

TREND 2015
s

Na
al
in

tio
3
s
o

rim
s s o c i a ln l i n e o
s o c i a ln l i n e
ider
s

n/
hac ider hac
Ins ke
rs Ins ke
rs

Na
TREND 2015

TREND 2015
al

rc
1

Sta
s s

Na
al
Na
al

in

ti
13
in

ti

in

14

tio

on

Cybe
rim
on
rim

t es
/S
rc
/S
rc

tat
rim
tat

Cybe
Cybe

es
n/
es

i ons
Sc ri p t k idd
i ons
Sc ri pt k idd

rc

porat
Sta
por at

Ransomware

ions
Information

Script kidd
Co r
i es
Cybe
Co r

leakage
i es

t es

Cy
be

p o r at
s
te i

st
r
iv
Cy

rr
kt
be

or
s

te c
vi Ha
st

ist
r

rr i s
or c kt C yb er F i g h t e rs

Web application
ist
s Ha
C y b e r F i g h t e rs

Co r
attacks

i es
ions
Script kidd

Cy
be

ts
te

p o r at

r
v

is
rr i
or kt

Malware
c
ist
s Ha
C y b e r F i g h t e rs

Cor
ies

o
s s o c i a ln l i n e
ider hac
Ins ke
rs

Na
al
6
in

ti
Cy

on
rim

/S
be

rc
ts

tat
te

Cybe
r

v
is

es
rr t
or c k
ist H a

ions
Script kidd
TREND 2015

ider
s
o
s o c i a ln l i n e s

p o r at
hac
Ins ke
rs
C y b e r F i g h t e rs Physical damage / ider
s
o
s o c i a ln l i n e
hac
s Ins ke
theft / loss

Co r
rs
Na

i es

TREND 2015
al
in

ti

9
on
rim

s
/S
rc

Na
al
7
tat

in

ti
Cybe

Cy

on
es

rim
be

ts
te

/S
r
iv

is

rc
rr t

tat
or ck

Cybe
ions
Script kidd

ist Ha

es
s
p o r at

C y b e r F i g h t e rs
Spam
Co r

ions
Script kidd
i es

p o r at
o
s o c i a ln l i n e

Insider
s
ider hac
TREND 2015
Cy

Ins ke
rs
be

ts

te
r

iv
is

rr
threat

Co r
s
kt

i es
or
Na

c
al

ist Ha
in

ti

12
s
o
on
rim

s o c i a ln l i n e
C y b e r F i g h t e rs
/S
rc

tat

s
Cybe

er hac
es

Cy
i d
ns

be

ts
I ke te

r
v

is
rr ti
rs
i ons
Sc ri pt k idd

TREND 2015
k
TREND 2015

or
ist ac
por at

s H
Identity theft C y b e r F i g h t e rs
Co r
i es

s
Cy

Na
al
be

te vi
st
r

rr ti
or ck
in

tio
ist Ha

2
s
C y b e r F i g h t e rs
rim

n/
o
s o c i a ln l i n e
rc

e rs

Sta
id hac
Ins ke
rs
Cybe

s t es
Na
al
in

ti

4
on
rim

/S
rc

ions
Script kidd

o
s o c i a ln l i n e
tat

s
ider hac
Cybe

In s ke
rs
TREND 2015
es

s
Na
al

15
in

ti

p o r at
on
rim

/S
rc

tat
Cybe

es

Web-based
ions
Script kidd

i ons
Sc ri p t k idd

porat

Cyber
Cor
p o r at

attacks
ies

espionage
Co r
i es

o
s o c i a ln l i n e

Botnets
er s hac
sid
Cy

In ke
be

te i
st

rs
r

rr ti v
Co r

or ck
ist Ha
i es

s
C yb er F i ght ers
s

Na
al
Cy

in

ti
8 on
rim
be

/S
ts

rc
Cy

TREND 2015

te

tat
r

Cybe

v
is
be

ts

rr i

es
te
t
r

v
is

rr ti or k
or c k
ist a c
ist Ha H

ions
Script kidd

s o s TREND 2015
C y b e r F i g h t e rs s s o c i a ln l i n e

p o r at
s i der hac
C y b e r F i g h t e rs
I n ke
rs Phishing
TREND 2015

Co r
i es

s
Na
al

Cy

5
in

ti

be

ts
on

te
rim

iv
is

rr t
or ck
/S

Ha
rc

ist
s
tat

C y b e r F i g h t e rs
Cybe

es

o o
s s o c i a ln l i n e s s o c i a ln l i n e
Ins
ider hac ider hac
ke
rs Ins ke
rs
TREND 2015

s s
Na
al

Na
ions

al
Script kidd
in

ti

in

ti

11
on
rim

10
on
rim
/S
rc

/S
rc
tat

p o r at
Cybe

tat
Cybe
es

es

Denial of
ions
Scri pt k idd

Co r

TREND 2015

service
i es

ions
Scri pt kidd
porat

por at

Data breaches
Co r
i es

Exploit kits
Co r
i es
Cy
be
Cy

ts

te
be

ts

te
r

iv
is
r

v
is

rr ti
Cy

or
ac
k rr t
be

ck
ts

i st H or te
r

s iv
is

Ha
rr
C y b e r F i g h t e rs ist or c kt
s ist
s Ha
C y b e r F i g h t e rs C y b e r F i g h t e rs

legend Primary group


for threat
Secondary group
for threat
Increasing
trend
Declining
trend
Stable
trend
ranking of assessed cyber threats
2014 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Trend
TOP Malicious Web-based Web Botnets Denial of Spam Phishing Exploit kits Data Physical Insider Information Identity Cyber Ransomware /
code: attacks application / service breaches damage / threat leakage theft / espionage Rogueware /
15 Worms / Injection theft / fraud Scareware
Trojans attacks loss

2013 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Trend
TOP Drive by Worms / Code Exploit kits Botnets Physical Identity Denial of Phishing Spam Ransomware / Data Information Targeted Watering
downloads Trojans Injection damage / theft / service Rogueware / breaches leakage Attacks Hole
15 theft / fraud Scareware
loss

European Union Agency for Network and Information Security www.enisa.europa.eu

You might also like