{"id":676,"date":"2020-02-21T17:59:16","date_gmt":"2020-02-21T17:59:16","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=676"},"modified":"2025-04-28T12:02:38","modified_gmt":"2025-04-28T12:02:38","slug":"42-cyber-attack-statistics-by-year-a-look-at-the-last-decade","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/","title":{"rendered":"42 Cyber Attack Statistics by Year: A Look at the Last Decade"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Do you remember what some of the top cyber attacks statistics were over the\npast decade? We\u2019re here to remind you and to provide a comparison for the year\n2020<\/h2>\n\n\n\n<p>In 2020, cyber attacks seem to be making headlines just about every day. Data breaches, data leaks, phishing scams, ransomware attacks \u2014 you name it, somebody, somewhere has fallen victim to them. This is why we thought it might be cool (and potentially painful) to see the progression of  cyber attack statistics over the last decade. <\/p>\n\n\n\n<p>Here are some of the top cyber attack statistics from each\nyear over the last decade. For this article, we\u2019re going to draw from a number\nof notable research publications from government institutions, industry associations,\nreputable corporations, and news organizations. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Top Cyber Attack Statistics Reported in the Last Decade<\/h2>\n\n\n\n<p>Over the past 10 years, there have been a lot of cyber\nattack trends we\u2019ve seen come and go. Some are pretty regular in terms of being\ncounted from year to year. For example, one such cyber security attack\nstatistic that we\u2019re able to track from year to year is the number of cyber\nattacks that result in reported losses that exceed $1 million. <\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.csis.org\/programs\/technology-policy-program\/significant-cyber-incidents\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Center for Strategic &amp; International Studies (CSIS)<\/a> tracks \u201ccyber attacks on government agencies, defense and high tech companies, or economic crimes with losses of more than a million dollars.\u201d Over the past decade, they\u2019ve tracked 490 significant cyber incidents. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"642\" height=\"376\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/cyber-attack-statistics-reported-losses.png\" alt=\"\" class=\"wp-image-677 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/cyber-attack-statistics-reported-losses.png 642w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/cyber-attack-statistics-reported-losses-300x176.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/cyber-attack-statistics-reported-losses-560x328.png 560w\" sizes=\"auto, (max-width: 642px) 100vw, 642px\" \/><\/figure><\/div>\n\n\n\n<p>Below, we\u2019ve put together a chart that showcases the number\nof consumer complaints that were reported to the Federal Bureau of\nInvestigation\u2019s Internet Crime Complaint Center (IC<sup>3<\/sup>) between 2009\nand 2019. They handle complaint reported about a wide variety of\ninternet-facilitated criminal activity and have since the center\u2019s inception in\nMay 2000. <\/p>\n\n\n\n<p>The chart below showcases how this particular cyber attack\nstatistic has changed from year to year: <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"643\" height=\"376\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/consumer-complaints-2009-2019.png\" alt=\"\" class=\"wp-image-678 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/consumer-complaints-2009-2019.png 643w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/consumer-complaints-2009-2019-300x175.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/consumer-complaints-2009-2019-560x327.png 560w\" sizes=\"auto, (max-width: 643px) 100vw, 643px\" \/><\/figure><\/div>\n\n\n\n<p>You know what else has\nsteadily increased over the last decade? The cost of losses from consumer\ncomplaints that were reported to the FBI IC<sup>3<\/sup>. See for yourself:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"643\" height=\"379\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/reported-losses-consumer-complaints.png\" alt=\"\" class=\"wp-image-679 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/reported-losses-consumer-complaints.png 643w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/reported-losses-consumer-complaints-300x177.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/reported-losses-consumer-complaints-560x330.png 560w\" sizes=\"auto, (max-width: 643px) 100vw, 643px\" \/><\/figure><\/div>\n\n\n\n<p><em>Note: 2010 was a year that\nthe IC3 report did not include its calculation of reported annual losses. As\nsuch, we reported it as a \u201c0\u201d but at least wanted to take a moment to explain\nthat it wasn\u2019t a matter of there being no reported financial losses \u2014 it\u2019s just\nthat the FBI didn\u2019t disclose that information in its report. <\/em><\/p>\n\n\n\n<p>Looking at the year-over-year trends, the number of known phishing websites is also on the rise. Let\u2019s take a look at a chart from the <a href=\"https:\/\/transparencyreport.google.com\/safe-browsing\/overview?hl=en&amp;unsafe=dataset:1;series:malware,phishing;start:1230768000000;end:1577836799999&amp;lu=warnings_displayed&amp;malware=start:1230768000000;series:attack,compromised;end:1577836799999&amp;warnings_displayed=dataset:users;start:1230768000000;end:1577836799999\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Google Transparency Report on Safe Browsing: malware and Phishing<\/a>: <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"661\" height=\"423\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/google-phishing-sites-statistics.png\" alt=\"\" class=\"wp-image-680 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/google-phishing-sites-statistics.png 661w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/google-phishing-sites-statistics-300x192.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/google-phishing-sites-statistics-560x358.png 560w\" sizes=\"auto, (max-width: 661px) 100vw, 661px\" \/><\/figure><\/div>\n\n\n\n<p>Between January 1, 2009 and Dec. 31, 2019, you can see a very clear increase in phishing sites that Google\u2019s Safe Browsing service detected over time. Now, of course, this could be because of how they define <a href=\"https:\/\/sectigostore.com\/blog\/phishing-statistics-phishing-stats-to-help-avoid-getting-reeled-in\/\">phishing<\/a>. Or because their algorithms improved and become more capable of identifying such sites. A third option is that it could be because phishing sites have just increased in number so rapidly that it resulted in that big spike between 2016 and 2019. <\/p>\n\n\n\n<p>Or, it could also be a result\nof all of the above. <\/p>\n\n\n\n<p>But how exactly does Google\ndescribe phishing websites? According to their Transparency Report page:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>These websites pretend to be legitimate so that they can trick users into typing in their usernames and passwords or sharing other private information. Web pages that impersonate legitimate bank websites or online stores are common examples of phishing sites\u201d<\/em><\/p><\/blockquote>\n\n\n\n<p>All of this is great, but we know you\u2019re here for something\nmore statistic. With this in mind, let\u2019s cover some of the most noteworthy\ncyber attack statistics by year.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Top Cyber Attack\nStatistics of 2009<\/h3>\n\n\n\n<p>The <a href=\"https:\/\/www.csoonline.com\/article\/2124314\/internet-security-trends-2009--an-interim-update.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">global economic recession had a big impact<\/a> on businesses and individuals in terms of cybercrime. A litany of <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-phishing-email-5-examples-of-phishing-emails-and-how-to-avoid-them\/\">scams and phishing emails<\/a> promising solutions targeted recession victims, and new cyber attack tactics made their foray into the wild.<\/p>\n\n\n\n<p>Here are some of key cyber attack statistics to note in\n2009: <\/p>\n\n\n\n<p>1.<strong> The FBI\u2019s IC3 Received a Total of 336,655 Consumer\nComplaints of Fraud and Scams<\/strong><\/p>\n\n\n\n<p>The FBI\u2019s Internet Crime Complaint Center (IC3) reported in its <a href=\"https:\/\/pdf.ic3.gov\/2009_IC3Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">2009 Internet Crime Report<\/a> that they received more than 335,000 complaints with estimated losses from that year reported at more than $560 million. This jump in the number of consumer complaints is likely due to the recession we mentioned a few moments ago. <\/p>\n\n\n\n<p>2. <strong>Hacking Involved in 60% of Identity Exposure Cases<\/strong><\/p>\n\n\n\n<p>In Symantec\u2019s <a href=\"https:\/\/www.securityweek.com\/content\/symantec-unveils-global-internet-security-threat-report-2009\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Global Internet Survey Threat Report (ISTR)<\/a> for 2009, the company reported that \u201c60 percent of identities exposed were compromised by hacking attacks.\u201d <\/p>\n\n\n\n<p>3. <strong>Botnets Sent 85% of Spam Emails<\/strong><\/p>\n\n\n\n<p>The same Symantec Global ISTR report data indicates that approximately\n85% of spam emails sent during the year were linked to botnets. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Top Cyber Attack\nStatistics of 2010<\/h3>\n\n\n\n<p>There were many notable cybersecurity events of 2010. One of the most impactful was the discovery of <a href=\"https:\/\/spectrum.ieee.org\/telecom\/security\/the-real-story-of-stuxnet\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Stuxnet<\/a>, a malicious computer worm that was thought to be responsible for causing significant damage to the software of at least 14 nuclear facilities in Iran. <\/p>\n\n\n\n<p>Here are some of the top cyber attack statistics of 2010:<\/p>\n\n\n\n<p>4. <strong>The FBI\u2019s IC3 Received a Total of 303,809 Consumer\nComplaints of Fraud and Scams<\/strong><\/p>\n\n\n\n<p>The FBI\u2019s Internet Crime Complaint Center (IC3) reported in its <a href=\"https:\/\/pdf.ic3.gov\/2010_IC3Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">2010 Internet Crime Report<\/a> that they received more than 300,000 complaints that year. However, they did not disclose the estimated annual losses from those internet-based crimes. <\/p>\n\n\n\n<p>5. <strong>Kaspersky Lab Reported 580,371,937 <a class=\"wpil_keyword_link\" href=\"https:\/\/sectigostore.com\/blog\/10-different-types-of-cyber-attacks-how-they-work\/\" title=\"Cyber Attacks\">Cyber Attacks<\/a>\nAgainst Users<\/strong><\/p>\n\n\n\n<p>The U.S. ranked No. 1 for the <a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-2010-statistics-2010\/36345\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">highest number and percentage of malware-based cyber attacks<\/a> that were launched from web resources \u2014 137,487,939 unique web-based attacks, or nearly 26% of all attacks \u2014 in 2010. <\/p>\n\n\n\n<p>6. <strong>4 Companies Were Responsible for Kaspersky\u2019s Top 20\nSoftware Vulnerabilities<\/strong><\/p>\n\n\n\n<p>The same Kaspersky Lab report noted that the Top 20 most\ncommon vulnerabilities were found in software developed by four big name\ncompanies: Microsoft (8), Adobe (8), Oracle (3), and ACDSee (1). However, it\u2019s\nimportant to note that some of those vulnerabilities were detected as early as 2007.\n&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Top Cyber Attack\nStatistics of 2011<\/h3>\n\n\n\n<p>Like 2010 before it, <a href=\"https:\/\/www.businessinsider.com\/imf-cyber-attacked-hackers-sony-rsa-lockheed-martin-epsilon-michaels-2011-6\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">2011 hit the ground running<\/a> in terms of major cyber attacks. The attacks against international organizations, businesses, and governments were carried out by hackers and nation-state actors. <\/p>\n\n\n\n<p>Here are some additional cyber attack statistics of interest\nin 2011:<\/p>\n\n\n\n<p>7.<strong> U.S. Intelligence Performs 231 Cyber Operations<\/strong><\/p>\n\n\n\n<p>In 2011, a decade after the Sept. 11 attacks occurred, the <a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show\/2013\/08\/30\/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Washington Post<\/a> reported that U.S. intelligence organizations carried out \u201c231 offensive cyber-operations\u201d in a massive campaign of cyber warfare. <\/p>\n\n\n\n<p>8. <strong>The FBI\u2019s IC3 Received More than 300,000 Consumer\nComplaints of Fraud and Scams<\/strong><\/p>\n\n\n\n<p>The FBI\u2019s Internet Crime Complaint Center (IC3) reported in its <a href=\"https:\/\/pdf.ic3.gov\/2011_IC3Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">2011 Internet Crime Report<\/a> that they received 314,246 complaints with estimated losses from that year reported at about $485 million.<\/p>\n\n\n\n<p>9. <strong>Annual Browser-Based Attacks Increase to Nearly 1\nBillion<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-statistics-2011\/36344\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Kaspersky reports<\/a> that the number of browser-based attacks they detected increased to 946,393,693 in 2011 \u2014 a number that\u2019s up from 580,371,937 the previous year.&nbsp; <\/p>\n\n\n\n<p>10. <strong>77 Million Users Impacted by PlayStation Network and Qriocity\nBreach<\/strong> <\/p>\n\n\n\n<p><a href=\"https:\/\/blog.us.playstation.com\/2011\/04\/26\/update-on-playstation-network-and-qriocity\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Sony announced<\/a> that the personal and user information of 77 million PlayStation Network and Qriocity users was stolen by one or more hackers via an attack that occurred over a three-day period in April.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Top Cyber Attack\nStatistics of 2012<\/h3>\n\n\n\n<p>2012 was a year marked by the targeting of nations\u2019 critical\ninfrastructure \u2014 particularly the United States. Here are some of the top cyber\nattack statistics of 2012:<\/p>\n\n\n\n<p>11. <strong>Attacks on Critical Infrastructure Increased 52%<\/strong><\/p>\n\n\n\n<p>The U.S. Department of Homeland Security (DHS) reported a significant increase in the number of cyber attacks on critical infrastructure in 2012, <a href=\"https:\/\/money.cnn.com\/2013\/01\/09\/technology\/security\/infrastructure-cyberattacks\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">according to CNN<\/a>. The article reports that cybercriminals mainly focused their attacks on organizations within the water and energy sectors and experienced success with \u201c\u2019several\u2019 of their nuclear targets.\u201d <\/p>\n\n\n\n<p>12. <strong>Browser-Based Attacks Jumps to Nearly 1.6 Billion<\/strong><\/p>\n\n\n\n<p>Web-based attacks rose from 946,393,693 to 1,595,587,670 in 2012, <a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-2012-the-overall-statistics-for-2012\/36703\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Kaspersky Labs reports<\/a>. This rate of growth is consistent with the previous couple of years. <\/p>\n\n\n\n<p>13. <strong>Botnet of 700,000 Infected Apple Computers Discovered<\/strong><\/p>\n\n\n\n<p>2012 marked the year when the \u201cApple-is-invincible\u201d myth was debunked with the discovery of the Flashfake botnet. According to <a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-2012-the-overall-statistics-for-2012\/36703\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Kaspersky Labs\u2019 2012 bulletin<\/a>, this network of infected computers consisted of 700,000 computers that used Mac OS X. &nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Top Cyber Attack\nStatistics of 2013<\/h3>\n\n\n\n<p>2013 marked the year when cybersecurity became a central\nfeature in foreign policy and national security as a whole. It saw the rise of\nthe \u201chack back\u201d industry and was the year when Edward Snowden became an enemy\nof the state.<\/p>\n\n\n\n<p>Here are some of the most impactful cyber attack statistics\nof 2013:<\/p>\n\n\n\n<p>14. <strong>The Stock Market Nosedived $136 Billion Due to a\nSocial Media Cyber Attack<\/strong><\/p>\n\n\n\n<p>Do you remember reading the fake headline about how there were two explosions at the White House and then-President Barack Obama was injured? The <a href=\"https:\/\/www.washingtonpost.com\/news\/worldviews\/wp\/2013\/04\/23\/syrian-hackers-claim-ap-hack-that-tipped-stock-market-by-136-billion-is-it-terrorism\/?arc404=true\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Washington Post<\/a> reported that the fake tweet was posted by the Associated Press\u2019s (AP) official Twitter account, which became compromised after AP staffers fell for a phishing scam. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"505\" height=\"277\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/obama-tweet.jpg\" alt=\"\" class=\"wp-image-681 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/obama-tweet.jpg 505w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/obama-tweet-300x165.jpg 300w\" sizes=\"auto, (max-width: 505px) 100vw, 505px\" \/><\/figure><\/div>\n\n\n\n<p>15. <strong>3 Billion Yahoo Accounts Hacked in Massive Data\nBreach<\/strong><\/p>\n\n\n\n<p>Verizon, the parent company of Yahoo, announced in a <a href=\"https:\/\/www.verizonmedia.com\/press\/yahoo-provides-notice-to-additional-users-affected-by-previously\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">2017 press release<\/a> that the initial estimates of the number of user accounts exposed in a 2013 breach \u2014 one billion \u2014 was vastly underestimated. Their 2017 report states that new intelligence they obtained indicates that \u201call Yahoo user accounts were affected by the August 2013 theft.\u201d <\/p>\n\n\n\n<p>16. <strong>Browser-Based Cyber Attacks Surpassed 1.7 Billion<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/media.kaspersky.com\/pdf\/KSB_2013_EN.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Kaspersky reports<\/a> that they neutralized 1,700,870,654 web-based threats in 2013. This number is up from the 1,595,587,670 threats reported in 2012. &nbsp;Almost half (43%) of the attacks they ceased originated from web resources in the U.S. and Russia.<\/p>\n\n\n\n<p>17. <strong>552 Million Identities Exposed by Data Breaches in\n2013<\/strong><\/p>\n\n\n\n<p>Symantec\u2019s 2013 ISTR report indicates that more than half a billion identities were exposed via data breaches in 2013. An average of 2,181,891 million identities were exposed per event \u2014 an increase of 261% over the 604,826 reported the previous year. <\/p>\n\n\n\n<p>18. <strong>\u201cHuman Error\u201d Contributes to 95% of Cybersecurity\nIncidents <\/strong><\/p>\n\n\n\n<p>In the <a href=\"https:\/\/www.ibm.com\/developerworks\/library\/se-cyberindex2014\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">IBM Security Services 2014 Cyber Security Intelligence Index<\/a>, IBM reported that \u201cover 95 percent of all incidents investigated recognize \u2018human error\u2019 as a contributing factor.\u201d The most commonly reported errors to make their list? <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Misconfigured and poorly patched systems, <\/li><li>Use of default usernames and passwords,<\/li><li>Lost laptops or mobile devices, and <\/li><li>Disclosure of sensitive information wrong email\naddresses<\/li><\/ul>\n\n\n\n<p>19. <strong>Mobile Malware Reaches New Levels with 148,427\nModifications <\/strong><\/p>\n\n\n\n<p>Good news for non-Android mobile users: The overwhelming majority of mobile malware \u2014 more than 98% \u2014 <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-2013-malware-evolution\/57879\/\" target=\"_blank\" rel=\"noreferrer noopener\">focused on Android devices<\/a>. These <a href=\"https:\/\/sectigostore.com\/blog\/different-types-of-malware\/\">types of malware<\/a> included trojans, trojan spies, and SMS trojans. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Top Cyber Attack\nStatistics of 2014<\/h3>\n\n\n\n<p>By virtually all accounts, 2014 was the posterchild year for\ncyber security concerns. Data breaches and cyber threats seemed to take up\npermanent residence on the front pages of new publications. Cyber attacks\nexposed a litany of health records, PII, and financial information. <\/p>\n\n\n\n<p>Here are some of the top cyber attack stats of 2014:<\/p>\n\n\n\n<p>20. <strong>3 Industries Targeted by 62% of Cyber Attacks<\/strong> <\/p>\n\n\n\n<p>IBM reported in its <a href=\"https:\/\/securityintelligence.com\/media\/cyber-security-intelligence-index-2015\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">2015 Cyber Security Intelligence Index<\/a> that nearly two-thirds of cyber attacks focused on three industries: finance and insurance, information and communications, and manufacturing. <\/p>\n\n\n\n<p>21. <strong>The FBI\u2019s IC3 Received a Total of 269,422 Complaints\nof Fraud and Scams<\/strong><\/p>\n\n\n\n<p>The FBI\u2019s Internet Crime Complaint Center (IC3) reported in its <a href=\"https:\/\/pdf.ic3.gov\/2014_IC3Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">2014 Internet Crime Report<\/a> that they received nearly 270,000 complaints with estimated losses reported at $800,492,073 in 2014 alone.<\/p>\n\n\n\n<p>22. <strong>More than 1.4 Billion Browser-Based Attacks Reported<\/strong><\/p>\n\n\n\n<p>Web-based attacks decreased from 1,700,870,654 to 1,432,660,467 in 2014, <a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2018\/03\/08065515\/Kaspersky-Security-Bulletin-2014-EN.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Kaspersky Labs reports<\/a>. Attackers frequently used exploit packs to infect computers by targeting vulnerable applications.<\/p>\n\n\n\n<p>23. <strong>More Than 6.1 Billion Threats Detected &amp;\nNeutralized in 2014<\/strong><\/p>\n\n\n\n<p>The number of cyber threats continue to climb. The same Kaspersky\nreport data indicates that they alone \u201cdetected and neutralized a total of 6,167,233,068\nthreats during the reported period.\u201d That number doesn\u2019t even include threats\nthat were detected by other IT security solutions providers!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Top Cyber Attack\nStatistics of 2015<\/h3>\n\n\n\n<p>2015 was a year that resulted in many data breaches of\nbig-name companies, including the affair website Ashley Madison and the\nhealthcare provider Anthem. Here are some of the most notable cyber attack-related\nstats from the year:<\/p>\n\n\n\n<p>24. <strong>91% of IT Service Providers\u2019 Clients Victimized by\nRansomware<\/strong><\/p>\n\n\n\n<p>More than 90% of <a href=\"https:\/\/www.datto.com\/news\/american-small-businesses-lose-an-estimated-75-billion-a-year-to-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Datto IT survey provider survey<\/a> respondents indicate that their clients were victimized by ransomware in the previous year. The survey of 1,000 ISPs (representing hundreds of thousands of small businesses globally) was eye-opening for sure. In the U.S. alone, Datto estimates that these attacks \u201ccause $75 billion in damages\u201d to SMBs with downtime often costing those businesses more than $8,500 per hour.&nbsp; <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"442\" height=\"282\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/ransomware-cyber-attack-statistics-2015.png\" alt=\"\" class=\"wp-image-682 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/ransomware-cyber-attack-statistics-2015.png 442w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/ransomware-cyber-attack-statistics-2015-300x191.png 300w\" sizes=\"auto, (max-width: 442px) 100vw, 442px\" \/><\/figure><\/div>\n\n\n\n<p>25. <strong>431 Million New Malware Variants Discovered<\/strong><\/p>\n\n\n\n<p>The number of new malware variants added in 2015 was 431 million. <a href=\"https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-21-2016-en.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Symantec\u2019s ISTR<\/a>, which reported this number, also says it\u2019s equates to a 36% increase over the previous year\u2019s number of 317 million. <\/p>\n\n\n\n<p>26. <strong>9 Data Breaches Exposed a Minimum of 10 Million\nIdentities Per Event<\/strong><\/p>\n\n\n\n<p>Data from the same ISTR report from Symantec indicates that there\nwere nine breaches that exposed a minimum of 10 million identities per incident.\n<\/p>\n\n\n\n<p>27. <strong>191 Million Registered Voters PII Exposed<\/strong><\/p>\n\n\n\n<p>Due to a database server misconfiguration, the personal information of <a href=\"https:\/\/www.reddit.com\/r\/privacy\/comments\/3yinij\/entire_us_voter_registration_record_leaks_191\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">191 million registered voters was left exposed<\/a> on the internet. The exposed information was discovered by a hacker by the name of Chris Vickery. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Top Cyber Attack\nStatistics of 2016<\/h3>\n\n\n\n<p>2016 saw some of the largest cyber attacks in recent history. Companies were getting \u201cpwned\u201d via hacking, DDoS attacks, and <a href=\"https:\/\/exchange.xforce.ibmcloud.com\/collection\/Ransomware-tops-the-spam-charts-in-2016-1332816b2536befc46fb600ab51613da\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ransomware attacks<\/a> in particular \u2014 and it appeared that no one was safe. <\/p>\n\n\n\n<p>See for yourself. Here are a few of the key cyber attack\nstatistics from 2016:<\/p>\n\n\n\n<p>28. <strong>Only 15% of Organizations Report Ransomware Attacks<\/strong><\/p>\n\n\n\n<p>According to a report by cyberscoop.com, \u201cOnly an estimated 15 percent of the nation\u2019s fraud victims report their crimes to law enforcement\u2026 This 15 percent figure is just a subset of the victims worldwide.\u201d Case in point? In 2016, the <a href=\"https:\/\/pdf.ic3.gov\/2016_IC3Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">FBI\u2019s IC<sup>3<\/sup><\/a> reported receiving only \u201c2,673 complaints identified as ransomware with losses of over $2.4 million\u201d \u2014 a number that\u2019s significantly lower than other industry estimates and forecasts. <\/p>\n\n\n\n<p>29. <strong>More Than 750,000,000 Web-Based Attacks Were Thwarted<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/go.kaspersky.com\/Global_Security_Bulletin_2016_Stats_SOC_2016.html?utm_source=securelist&amp;utm_medium=blog&amp;utm_campaign=gl_ksbstats_organic&amp;utm_content=banner&amp;utm_term=gl_securelist_organic_banner_blog_ksbstats\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Kaspersky\u2019s 2016 bulletin reports<\/a> that their software was able to repel 758,044,650 attacks from global resources. Nice job, guys. <\/p>\n\n\n\n<p>30. <strong>Cyber Attacks Cost the U.S. Economy Up to $109 Billion\nin 2016<\/strong><\/p>\n\n\n\n<p>The White House\u2019s Council of Economic Advisers released a report <a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2018\/03\/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">\u201cThe Cost of Malicious Cyber Activity to the U.S. Economy\u201d<\/a> in February 2018 that said the economic impact of such activity was estimated to be between $57 billion and $109 billion. <\/p>\n\n\n\n<p>31. <strong>Hacking of Adult Website Resulted in the Exposure of\n412 Million Users<\/strong><\/p>\n\n\n\n<p>More than 410 million AdultFriendFinder customers found themselves exposed in an undesired way when their user credentials and other information was discovered for sale on the dark web, <a href=\"https:\/\/www.forbes.com\/sites\/kevinanderton\/2017\/03\/29\/8-major-cyber-attacks-of-2016-infographic\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">according to Forbes<\/a>. <\/p>\n\n\n\n<p>32. <strong>Cyber Attacks Measuring 1 Tbps Affected Service\nProviders<\/strong><\/p>\n\n\n\n<p>The same Forbes report indicates that the <a href=\"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/\">DDoS\ncyber attacks<\/a> that targeted Netflix, PlayStation Network, Twitter, and\nothers using compromised endpoint IoT devices measured in at nearly 1 Tbps.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Top Cyber Attack Statistics\nof 2017<\/h3>\n\n\n\n<p>The year 2017 is one that will live in infamy for\ncybersecurity and IT security experts. It was the year of the WannaCry\nransomware attacks targeted businesses, healthcare, and government institutions\nin more than 150 countries. The attack, which resulted from hackers exploiting\nthe eternal blue vulnerability the NSA discovered in Microsoft\u2019s Windows operating\nsystem (OS). <\/p>\n\n\n\n<p>33. <strong>Nearly 1.2 Billion Web-Based Cyber Attacks Repelled<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/securelist.com\/ksb-overall-statistics-2017\/83453\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Kaspersky reports<\/a> repelling 1,188,728,338 browser-based attacks over the year. The same report data shows that nearly 2 million \u201cunique URLs were recognized as malicious by web antivirus components.\u201d<\/p>\n\n\n\n<p>34. <strong>Cybercrime Cost Global Consumers $172 Billion in 2017<\/strong><\/p>\n\n\n\n<p>The Norton Cyber Security Insights Report (Global Results) reported that 978 million people in 20 countries were affected by cybercrime throughout the year. On average, global consumers of these crimes lost $172 billion \u2014 an average of $142 per victim \u2014 and nearly 24 hours dealing with issues that resulted from their victimization. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"452\" height=\"287\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/cybercrime-cyber-attack-statistics.png\" alt=\"\" class=\"wp-image-683 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/cybercrime-cyber-attack-statistics.png 452w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/cybercrime-cyber-attack-statistics-300x190.png 300w\" sizes=\"auto, (max-width: 452px) 100vw, 452px\" \/><\/figure><\/div>\n\n\n\n<p>35. <strong>41% of Consumers Globally Don\u2019t Trust Governments with\nTheir PII<\/strong><\/p>\n\n\n\n<p>In some ways, it doesn\u2019t really come as a surprise in light\nof the Eternal Blue exploit by the NSA (a government agency). However, Norton\u2019s\nCSIR report indicates that they\u2019re more likely to trust identity theft\nprotection services (76%), email service providers (80%), and financial\ninstitutions (82%) than they are their own governments. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Top Cyber Attack\nStatistics of 2018<\/h3>\n\n\n\n<p>2018 was a busy year for hackers \u2014 particularly those who\nprefer using ransomware attacks. Let\u2019s review some of the top cyber attack\nstatistics for the year:<\/p>\n\n\n\n<p>36. <strong>Nearly 1.9 Billion Web-Based Cyber Attacks Repelled <\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-2018-statistics\/89145\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Kaspersky reports<\/a> that their products shut down 1,876,998,691 browser-based attacks from around the world. The same data also indicates that more than 550,000 unique URLs were discovered to be malicious by antivirus solutions. <\/p>\n\n\n\n<p>37. <strong>Information on Up to 500 Million People Exposed in\nMarriott Data Breach<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/marriott.gcs-web.com\/news-releases\/news-release-details\/marriott-announces-starwood-guest-reservation-database-security\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Marriott<\/a> found itself in the crosshairs of both hackers and the media when the information of up to 500 million guests was exposed by the unauthorized access of a database. This occurred because of a vulnerability in the guest reservation database of its recently acquired Starwood properties. The hotel giant estimated that a vast amount of personal and payment card information relating to 327 million of those guests was exposed in the breach. <\/p>\n\n\n\n<p>38. <strong>Ransomware Attack Costs the City of Atlanta $2.6 Million<\/strong><\/p>\n\n\n\n<p>The city of Atlanta virtually came to a halt due to a <a href=\"https:\/\/www.cnn.com\/2018\/03\/27\/us\/atlanta-ransomware-computers\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">SamSam ransomware attack<\/a> that targeted the city\u2019s municipal networks and computer systems. The attackers demanded more than $50,000 in Bitcoin payment. The overall recover costs were approximately $2.6 million once all was said and done. <a href=\"https:\/\/www.npr.org\/2018\/12\/05\/673958138\/georgia-charges-iranians-in-ransomware-attack-on-atlanta\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">NPR reports<\/a> that two Iranian hackers were eventually charged with the cybercrime. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Top Cyber Attack\nStatistics of 2019<\/h3>\n\n\n\n<p>The blight of cyber attacks, data breaches, phishing attacks\nand more seemed to make headlines just about every day in 2019 \u2014 and virtually\nno one was safe. Businesses, city governments, schools, and healthcare\norganizations all experienced the wrath of hackers through malware and\nransomware attacks, and their attacks cost billions globally. In fact, dozens of\ncities in the U.S., South Africa, and other locations around the world have found\nthemselves the targets of such attacks in the last year.<\/p>\n\n\n\n<p>So, without further ado, here are some of the top cyber\nattack statistics of 2019: <\/p>\n\n\n\n<p>39. <strong>$26 Billion Lost to BEC\/EAC Scams<\/strong><\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.ic3.gov\/media\/2019\/190910.aspx\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">FBI\u2019s IC<sup>3<\/sup><\/a> estimates that more than $26 billion dollars was lost between June 2016 and July 2019 due to <a href=\"https:\/\/sectigostore.com\/blog\/whale-of-an-attack-a-guide-to-business-email-compromise\/\">business email compromise<\/a>\/email account compromise scams.<\/p>\n\n\n\n<p>40. <strong>Nearly 1 Billion Web-Based Cyber Attacks Repelled <\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-2019-statistics\/95475\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Kaspersky reports<\/a> that 975,491,360 browser-based attacks from around the world were halted by their products. The same data also indicates that 273,782,113 unique URLs were discovered to be malicious. <\/p>\n\n\n\n<p>41. <strong>More than $675 Million Stolen by North Korean\nNation-State Actors<\/strong><\/p>\n\n\n\n<p>In March 2019, the <a href=\"https:\/\/undocs.org\/S\/2019\/171\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">UN Security Council reported<\/a> more than $678 million in foreign currency and cryptocurrency theft by North Korea between 2015 and 2018. The nation-state actors attempted to steal $1 billion via state-sponsored hacking of companies and cryptocurrency exchanges from companies around the world. <\/p>\n\n\n\n<p>42. <strong>400% Increase in Threats to Mac Devices<\/strong><\/p>\n\n\n\n<p>In its <a href=\"https:\/\/resources.malwarebytes.com\/files\/2020\/02\/2020_State-of-Malware-Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">2020 State of Malware Report<\/a>, Malwarebytes reports that the number of threats against Mac devices increased by 40% from 2018 to 2019. They report an average of 11 threats per Mac device, which is nearly double the 5.8 threat average on Windows endpoint devices. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts on Cyber Attack Statistics by Year<\/h2>\n\n\n\n<p>It\u2019s interesting to see the changes taking place within the\nindustry over the last 10 years. We\u2019ve seen the growth fluctuations in cyber\nattacks, the increasingly large reach of the most recent data breaches and ransomware\nattacks, and the changing attitudes and decreasing levels of trust concerning\ndata privacy and security. <\/p>\n\n\n\n<p>Needless to say, it\u2019ll be interesting to see what the year\n2020 has in store. Stay tuned to Infosec Insights and we\u2019ll help you stay informed\nthroughout the year to come. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you remember what some of the top cyber attacks statistics were over the past decade? We\u2019re here to remind you and to provide a comparison for the year 2020&#8230;<\/p>\n","protected":false},"author":8,"featured_media":684,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","tve_updated_post":"","tve_custom_css":"","tve_user_custom_css":"","tve_globals":{},"tcb2_ready":0,"tcb_editor_enabled":0,"tve_landing_page":"","_tve_header":"","_tve_footer":""},"categories":[13],"tags":[40,31],"class_list":["post-676","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cyber-attacks","tag-statistics","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>42 Cyber Attack Statistics by Year: A Look at the Last Decade - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"Looking for cyber attack statistics from the last decade? We&#039;ve got you covered with cyber attack stats from 2009 to 2019 \u2014 what to know, all in one place.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"42 Cyber Attack Statistics by Year: A Look at the Last Decade - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"Looking for cyber attack statistics from the last decade? We&#039;ve got you covered with cyber attack stats from 2009 to 2019 \u2014 what to know, all in one place.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-21T17:59:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-28T12:02:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/cyber-attack-statistics.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1001\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Casey Crane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Casey Crane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\\\/\"},\"author\":{\"name\":\"Casey Crane\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"headline\":\"42 Cyber Attack Statistics by Year: A Look at the Last Decade\",\"datePublished\":\"2020-02-21T17:59:16+00:00\",\"dateModified\":\"2025-04-28T12:02:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\\\/\"},\"wordCount\":3180,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/cyber-attack-statistics.jpg\",\"keywords\":[\"cyber attacks\",\"statistics\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\\\/\",\"name\":\"42 Cyber Attack Statistics by Year: A Look at the Last Decade - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/cyber-attack-statistics.jpg\",\"datePublished\":\"2020-02-21T17:59:16+00:00\",\"dateModified\":\"2025-04-28T12:02:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"description\":\"Looking for cyber attack statistics from the last decade? We've got you covered with cyber attack stats from 2009 to 2019 \u2014 what to know, all in one place.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/cyber-attack-statistics.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/cyber-attack-statistics.jpg\",\"width\":1600,\"height\":1001,\"caption\":\"Graphic illustrating cyber attack statistics by year\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"42 Cyber Attack Statistics by Year: A Look at the Last Decade\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\",\"name\":\"Casey Crane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"caption\":\"Casey Crane\"},\"description\":\"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"42 Cyber Attack Statistics by Year: A Look at the Last Decade - InfoSec Insights","description":"Looking for cyber attack statistics from the last decade? We've got you covered with cyber attack stats from 2009 to 2019 \u2014 what to know, all in one place.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/","og_locale":"en_US","og_type":"article","og_title":"42 Cyber Attack Statistics by Year: A Look at the Last Decade - InfoSec Insights","og_description":"Looking for cyber attack statistics from the last decade? We've got you covered with cyber attack stats from 2009 to 2019 \u2014 what to know, all in one place.","og_url":"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/","og_site_name":"InfoSec Insights","article_published_time":"2020-02-21T17:59:16+00:00","article_modified_time":"2025-04-28T12:02:38+00:00","og_image":[{"width":1600,"height":1001,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/cyber-attack-statistics.jpg","type":"image\/jpeg"}],"author":"Casey Crane","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Casey Crane","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/"},"author":{"name":"Casey Crane","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"headline":"42 Cyber Attack Statistics by Year: A Look at the Last Decade","datePublished":"2020-02-21T17:59:16+00:00","dateModified":"2025-04-28T12:02:38+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/"},"wordCount":3180,"image":{"@id":"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/cyber-attack-statistics.jpg","keywords":["cyber attacks","statistics"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/","url":"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/","name":"42 Cyber Attack Statistics by Year: A Look at the Last Decade - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/cyber-attack-statistics.jpg","datePublished":"2020-02-21T17:59:16+00:00","dateModified":"2025-04-28T12:02:38+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"description":"Looking for cyber attack statistics from the last decade? We've got you covered with cyber attack stats from 2009 to 2019 \u2014 what to know, all in one place.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/cyber-attack-statistics.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/cyber-attack-statistics.jpg","width":1600,"height":1001,"caption":"Graphic illustrating cyber attack statistics by year"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"42 Cyber Attack Statistics by Year: A Look at the Last Decade"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c","name":"Casey Crane","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","caption":"Casey Crane"},"description":"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=676"}],"version-history":[{"count":0,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/676\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/684"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}