Cyber espionage: threat action varieties 2016

Leading threat action varieties within global industrial cyber espionage incidents in 2016

by J. Clement, last edited May 16, 2018
Cyber espionage: threat action varieties 2016 This statistic represents the leading threat action varieties within global industrial cyber espionage incidents in 2016. During the survey period, it was found that 181 of cyber espionage incidents involved phishing. The usage of stolen credentials occurred in 28 cyber espionage data breaches.
Show more

Leading threat action varieties within global industrial cyber espionage incidents in 2016

Loading statistic...
Breach count
Social - Phishing181
Hacking - Use of Backdoor or C2138
Malware - C2136
Malware - Backdoor118
Malware - Adminware63
Malware - Capture stored data62
Malware - Export data60
Malware - Downloader53
Malware - Spyware/keylogger51
Hacking - Use of stolen credentials28
Breach count
Social - Phishing181
Hacking - Use of Backdoor or C2138
Malware - C2136
Malware - Backdoor118
Malware - Adminware63
Malware - Capture stored data62
Malware - Export data60
Malware - Downloader53
Malware - Spyware/keylogger51
Hacking - Use of stolen credentials28
Download Settings Share
Download started
Please be patient - this may take a moment
by J. Clement, last edited May 16, 2018
This statistic represents the leading threat action varieties within global industrial cyber espionage incidents in 2016. During the survey period, it was found that 181 of cyber espionage incidents involved phishing. The usage of stolen credentials occurred in 28 cyber espionage data breaches.
Show more
Statista Accounts: Access All Statistics. Starting from $588 / Year
Basic Account
Get to know the platform

You only have access to basic statistics.

Premium Account
Your perfect start with Statista
  • Instant access to 1m statistics
  • Download in XLS, PDF & PNG format
  • Detailed references

$49 / Month *

Corporate Account
Full access

Corporate solution including all features.

* All products require an annual contract.
   Prices do not include sales tax.
Leading companies trust Statista:
paypalgoogleadobepgsamsungtelekom
Related Studies: Available to Download in PDF or PPTX Format
Security software
Security software

All Information
in one Presentation

Security software

Everything On "Security software" in One Document: Edited and Divided into Handy Chapters. Including Detailed References.

I think of Statista as Google for researchers. Statista provides you with the information you search for right away.
Dr. Horst Stipp

Dr. Horst Stipp
EVP, Research & Innovation, Advertising Research Foundation

Statistics on "Security software"
  • Overview
  • Cyber crime and malware infections
  • Mobile security
  • Survey data
Discover Statista
Need help with using Statista for your research? Tutorials and first steps
Further Content: Statistics, Studies, and Topic Pages
Learn more about how Statista can support your business.
Do you have any questions about our business solutions?

We provide you with detailed information about our Corporate Account.