Cyber attacks from US-based IP addresses highest in 3 years

The US serves as a major source of hostile activity, due to the ease of provisioning and low cost of US cloud hosting services
Cyber attacks from US-based IP addresses have increased for the third consecutive year, making the US a major source of hostile cyber activity.
That’s according to the NTT 2016 Global Threat Intelligence Report published today. The annual Report contains security threats gathered during 2015 from 8,000 clients of the NTT Group security companies including Dimension Data, Solutionary, NTT Com Security, NTT R&D, and NTT Innovation Institute (NTTi3). This year’s data is based on 3.5 trillion security logs and 6.2 billion attacks. Data is also gathered from 24 Security Operations Centres and seven research and development centres of the NTT Group.
During 2013, 49% of cyber attacks on IP addresses originated from within the US, and that number increased to 56% in 2014. In 2015, this number increased to a startling 65% across 217 countries that detected attacks.
Matthew Gyde, Dimension Data’s Group Executive – Security says, “The US serves as a major source of hostile activity, due to the ease of provisioning and low cost of US cloud hosting services. While the source IP address is based in the US, the actual attacker could be anywhere in the world. Because of the ease with which attackers can disguise their IP addresses, attack sources can often be more indicative of the country in which the target is located, or perhaps of where the attacker is able to compromise or lease servers, rather than where the attack actually originates.
Because a significant number of the detected attacks target US organisations, so attackers often host such attacks locally in the same geographic region as their victims. This reduces the likelihood that they’ll experience potential geolocation blocking or alerting,” explains Gyde, and points out that the data is derived from correlated log events identifying validated attacks that took place in 2015.
China, which was the source of the second-largest number of attacks (9%) in the 2014, accounted for only 4% of attacks in 2015. Australia, which was in third place in 2014, dropped to eleventh spot (1%) as a source of attacks in 2015.
Meanwhile, the UK became the number one source of non-US based cyberattacks in 2015: the number of attacks from addresses based in the UK rose slightly from 3% in 2014, to 5% 2015, making the country the primary source of non US-based attacks.
Other highlights in the report include:
Organisations in the retail sector experienced nearly three times more attacks as those in the financial sector which topped the list of cyberattacks in the 2015 report. In 2015, cyberattacks on the financial industry dropped to fourteenth position.
Similar to the retail sector, the hospitality, leisure, and entertainment sector also processed high volumes of sensitive information including credit card data. Transactions in the hospitality sector, which includes hotels and resorts, tend to be sizable, which can make those card numbers attractive to attackers.
Cybercriminals are adopting low-cost, highly available, and geographically strategic infrastructure to perpetrate malicious activities. This can be seen by the increase in US-sourced attacks leveraging cloud infrastructure.

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Image provided by Altronix

Altronix Showcases New Technology

Altronix is displaying the company’s latest innovations here at ISC West in booth #11073. Features include integrated power…
Image provided by ASSA ABLOY

ASSA ABLOY Opening Solutions at ISC West

ASSA ABLOY Opening Solutions will showcase a comprehensive range of access solutions at ISC West, the security industry’s premier…
Graphic displaying a lockdown solution

Netgenium debuts next gen display and touchscreen technologies

Power-over-Ethernet (PoE) solutions specialist Netgenium will be showcasing its new range of IP…
Image Provided by Invixium

Invixium showcases new Biometric Solutions to ISC WEST 2025

Invixium is set to exhibit its latest Enterprise Series biometric solutions at ISC WEST. Making its entry into….
Image Provided by Contacta Inc

Contacta Inc bolsters security market with new distribution

Manufacturer of window intercom and assistive listening systems, Contacta Inc, has bolstered its presence in the market with new distribution
Image Provided by AtlasIED

AtlasIED Returns to ISC West

AtlasIED announces its return to ISC West 2025, where it will showcase its comprehensive and renowned Security Technology Solutions Ecosystem
Salto Systems

The new Salto XS4 One S Keypad

Salto’s latest access control offering combines state-of-the-art credential technology with advanced PIN code management for both…
Gunnebo Entrance Control

Gunnebo Entrance Control Unveils Solutions for ISC West 2025

Gunnebo Entrance Control will be exhibiting its latest entrance control technologies at ISC West 2025 in Las Vegas, offering smart…
Copyright: Security Buyer

Facial Recognition: Innovation vs. Accountability

Facial recognition technology is advancing with AI, IoT, and privacy-first security, but regulatory compliance, ethical AI, accountability…
Hospitality

The AI Shift in Hospitality Security

Hannah Larvin assesses how AI-driven security in hospitality enhances surveillance, access control, and incident response, balancing safety..
Scroll to Top