Cyber Incidents tracker
This table displays publicly disclosed cyber incidents.
What does the Cyber Incidents page contain?
The cyber incidents tracker contains data collected from existing public repositories regarding disclosed cyber incidents of several types and severity. All data is open source.
Six different public databases are used:
-
OT specific databases:
- TI Safe Incident Hub
- ICS STRIVE
-
General IT/OT databases:
- KonBriefing
- CISSM Cyber Attacks Database
- Hackmageddon
- European Repository of Cyber Incidents (EuRepoC)
It's important to note that the incidents in the table may appear duplicated due to the aggregation of data from multiple databases. This approach, while efficient for initial analysis, does not involve a thorough deduplication process, which can lead to some redundancy.
Victim profile dataset
This table displays the victim profile dataset with enriched data from incidents and non-incidents used for attractiveness.
What is the victim profile dataset?
This page displays different insights from the dataset built in the DICYME project for developing the Attractiveness concept. You can read about this indicator in Indicators > Attractiveness.
We have built a dataset that contains targeted entities that appear in public databases where confirmed cyber incident victims are reported. These databases are the European Repository of Cyber Incidents (EuRepoC), Hackmageddon, Jam Cyber, TI Safe Incident Hub, KonBriefing, CISSM Cyber Attacks Database, and ICS STRIVE. We complete the dataset with similar entities that have not reported incidents. For the incidents, they can be one of the following four categories:
- Data breach: a threat to confidentiality.
- Destruction: a threat to integrity.
- Denial of service: a threat to availability.
- Ransomware: a potential threat to confidentiality, integrity, and availability.
Which data makes up the dataset?
For each incident or non-incident, we have collected its date, the entity name and the incident type, if so. We have also collected the following information about the entity, divided in three groups:
-
Basal attractiveness: an entity may more attractive to an adversary mainly based on its static features, also called firmographic data.
- Country: headquarters location based on country.
- Category: entity sector provided by RocketReach tool.
- Revenue: annual billing of the entity (USD).
- Earnings: annual profit of the entity (USD).
- Publicly traded: whether it is listed on the stock exchange (true/false).
- Employees: size of the entity regarding the number of employees.
- Profitable: whether it is for-profit (true/false).
-
Online reputation: an entity may be more attractive to an adversary based on its online reputation, defined as the result of what users, customers, or employees write, communicate, and share anywhere on the Internet based on their perceptions and experiences at any moment of their relationship, direct or indirect, with the entity.
The value of Online reputation is dynamic and comes from a formula that takes into account both the Interactions and Reach of each mention of the entity in social media and social networks.
-
Victimisation: an entity may be more attractive to an adversary if it is often mentioned in underground forums or specific dark websites, or perceived as an approachable victim. Additionally, the entity may become more attractive if there are public data breaches. It's made up of two different concepts:
- Critic Info: number of direct mentions in dark web leaks.
- Devices: number of visible devices connected to the Internet.
We hope to include references to scientific papers we have written developing this concept very soon!
Vulnerabilities 1
3
Vulnerabilities 2
49
Intrusion Detection Systems
Data source
Nozomi Networks Guardian
Count of facilities
Count of networks
Count of cyber assets
Threat Actors Indicator
Used databases
Electronic Transactions Development Agency (ETDA)
Extraction dates
Amount of Threat Actors
- 11 Agriculture, Forestry, Fishing and Hunting
- 21 Mining
- 22 Utilities
- 23 Construction
- 31-33 Manufacturing
- 42 Wholesale Trade
- 44-45 Retail Trade
- 48-49 Transportation and Warehousing
- 51 Information
- 52 Finance and Insurance
- 53 Real Estate Rental and Leasing
- 54 Professional, Scientific, and Technical Services
- 55 Management of Companies and Enterprises
- 56 Administrative and Support and Waste Management and Remediation Services
- 61 Educational Services
- 62 Health Care and Social Assistance
- 71 Arts, Entertainment, and Recreation
- 72 Accommodation and Food Services
- 81 Other Services (except Public Administration)
- 92 Public Administration
Extraction date
First activity date
Last activity date
Count of threat actors
Mean actor indicator
What is the Threat Actors Indicator?
The Threat Actors Indicator is a metric that provides an overview of the threat actor regarding a specific target country and industry. Considering public data from the Electronic Transactions Development Agency (ETDA), we compute different partial scores regarding the activity of the actor, its capacity and the target.
The Indicator is composed of three partial scores:
- Activity score: involves the
last_activity_date
field, and decreases as the last activity date gets farther away. - Capacity score: takes into account the different possible values of
objectives
field. - Target score: this score involves the
target_countries
,target_regions
andtarget_industries
, and requires a targetfacility_country
,facility_region
,facility_border_countries
andfacility_industry
.
Attractiveness indicator
Attractiveness
89.40%
Basal Attractiveness
42.10%
Online Reputation
-0.32
Victimization
0/2
What is Attractiveness?
This page allows you to discover the Attractiveness concept and understand which elements does it involve and how do they affect to the final indicator.
Attractiveness is the possession of features or the exhibition of behaviours in entities that raise interest for potential adversaries. Thus, the more significant the attractiveness value is, the greater the proneness of an entity to be attacked.
This attractiveness concept is decomposed into three main branches:
- Basal attractiveness: relevance of the entity in the world.
- Online reputation: the opinion of individuals and the reach of the entity.
- Victimisation: the interest that the entity arouses for potential attackers.
You can read about the dataset used for this concept in Data > Victim profile.
We hope to include references to scientific papers we have written developing this concept very soon!
CVE2TTPs model
CVSS v2
CVSS v3
What is CVE2TTPs?
CVE2TTPs is a Machine Learning model that relates Common Vulnerabilities and Exposures (CVE) to Tactics, Techniques and Procedures (TTPs) from the MITRE ATT&CK framework.
This is an important concept in cybersecurity, as it helps to understand the practical exploitation of vulnerabilities in a structured manner, linking specific software vulnerabilities (CVE entries) to known adversary behaviors TTPs. This practice is crucial for threat intelligence, incident response, and risk management, as it bridges the gap between vulnerabilities in software and how attackers might exploit them in real-world scenarios.
Cyber Risk Quantification Model
About DICYME
DICYME research project
Dynamic Industrial Cyber Risk Modelling based on Evidence (DICYME) research project (CPP2021-009025) addresses the automation of cyber risk and its management in OT cybersecurity environments.
The project examines how threats can differ based on the degree of vulnerability of the target’s infrastructure, the strength of its controls, and external factors such as the interest of the threat agent in conducting an attack.
It is a public-private collaboration project involving the Rey Juan Carlos University and DeNexus TECH SL.
The grant is part of the Spanish State Plan for Scientific, Technical and Innovation Research 2021-2023 and is awarded to public/private programs which seek to promote scientific and technical research. It is part of the wider Recovery, Transformation and Resilience Plan, financed by the European Union’s NextGenerationEU Plan, aimed at building a greener, more digital, and more resilient post-COVID-19 Europe.
DICYME dashboard
This dashboard is part of Activity 3: Visualization and decision-making system.
The goal of the dashboard is to provide a graphical interface that displays data gathered during the project, offering information and aid in decision-making.
Legal disclaimer
All data contained within this website has been acquired from publicly available sources, free of charge, without any restrictions or required credentials; additionally, no private, confidential, proprietary, or classified information (or documentation) from any leaked websites, current or newly discovered, is contained herein.