top of page

Create and Learn Books - a quick and easy way to learn by doing

  • Writer's pictureCreate and Learn

The Most Significant Cyber Attacks from 2006-2020, by Country



This article is published in collaboration with Visual Capitalist



The Briefing


• significant cyber attacks—more than the UK, India, and Germany combined


• A “significant” cyber attack refers to a hack into a country’s government agency, a defense or high-tech company, or a crime with losses of more than $1M


Significant Cyber Attacks from 2006-2020, by Country


Committing a cyber crime can have serious consequences. In the U.S., a cyber criminal can receive up to 20 years in prison for hacking into a government institution if it compromises national security.


Yet, despite the consequences, cyber criminals continue to wreak havoc across the globe. But some countries seem to be targeted more than others.


Using data from Specops Software, this graphic looks at the countries that have experienced the most significant cyber attacks over the last two decades.



The U.S. comes in first place, with 156 recorded cyber attacks. That’s an average of 11 significant attacks per year, which is more than Russia’s had in 14 years.


What are the Most Common Types?


While there are many different types of cyber attacks, Specops highlights the four most commonly used for significant cyber crimes:


Structured Query Language (SQL) Injection Attack

SQL is the code used to communicate with a database. In an SQL injection attack, the hacker writes vindictive SQL code and inserts it into a victim’s database, in order to access private information.


A man-in-the-middle (MitM)

This form of attack happens when a cyber criminal hacks into a communication channel between two people, and eavesdrops on their online exchanges.


Phishing Attack

When a cyber criminal poses as a legitimate institution and emails a victim to gain personal details like login credentials, home address, credit card information.


Denial of Service Attack (DoS)

This involves flooding a victim’s system with traffic, to the point where their network is inaccessible. The hacker doesn’t gain any valuable information from this style of attack.


Start leaning Data Science and Business Intelligence tools:



The 100 Page Book - Python

Uncomplicated and easy to assimilate structure

Python The 100 page book - cover.png

Power BI – Business Intelligence Clinic

One dataset multiple solutions. Start your journey into the Business Intelligence world with this book.

Power BI 2019.jpg

Excel – Business Intelligence Clinic

One dataset multiple solutions. Start your journey into the Business Intelligence world with this book.

Excel BI ebook 2019.jpg

Power BI, Excel and Tableau – BI Clinic

Learn how to create Dashboard using Power BI, Excel and Tableau.

BI Clinic Complete Single cover.jpg

Power BI Academy: HR Recruitment

Create a complete dashboard for Human Resources. Bonus: 10 Templates

ebook.png

Tableau – Business Intelligence Clinic

One dataset multiple solutions. Start your journey into the Business Intelligence world with this book.

Tableau ebook 2019.jpg

Thanks for submitting!

Subscribe to get tips and free material

bottom of page