Best Maps of Cyber Threats and DDoS Attacks Worldwide

There are cyber attacks that are carried out on a large scale. An example is the DDoS attack. If you are part of an organization with a high risk of being a victim of this type of attack, the use of maps detailing security threats and cyber attacks is very useful. On the other hand, if you are an enthusiast on the subject, the maps will give you very valuable information on how attacks are carried out. Today in this article we share a list of the best threat and cyberattack maps, which can be consulted at any time.

Kaspersky CyberThreat

It is a dynamic map that is updated in real time in relation to the main cyber threats and attacks . What we can visualize is thanks to various data sources that correspond to the different Kaspersky services. We quote them below:

Best Maps of Cyber Threats and DDoS Attacks Worldwide

  • On-Access Scan: the malware detection logs obtained by opening, copying, executing and saving operations within the antivirus.
  • On-Demand Scan: the malware logs that are obtained each time the user of this antivirus clicks on the “Scan for viruses” button, that is, Scan for threats .
  • Kaspersky Anti-spam: all suspicious email traffic thanks to Reputation Filtering technology.
  • Mail Anti-Virus .
  • Botnet activity detection.
  • Web Anti-Virus .
  • Intrusion Detection Scan.
  • Vulnerability Scan.

One of the highlights of this map is that it works smoothly. It is possible to zoom in, zoom out and choose the country from which we want to know about attack threats. Whenever we choose a country, the first thing we see is what is its position number in the list of the most attacked countries. On the other hand, whenever you choose a country you will see that the number of records is updated in real time according to all the Kaspersky services that we cited above.

This is the view you will get if you choose a country. Let’s use Spain as an example, which appears in position number 9 in the list of countries with the highest number of cyber attacks:

If you need to change the map to a more comfortable view like the flat view, this map from Kaspersky allows you to change it. You can view the map in the most convenient way.

Simply click on the “Switch to Plane View” button to switch to the flat view. Or, to return to the globe view, the “Switch to Globe View” view should appear. It is the first button found in the green button column on the right.

By default, when we enter the map website, it is loaded with a black theme (night theme). The second button on the right (Toggle map color) can change the theme of your site to a light color. This is what the clear theme looks like:

We recommend you visit the official website of the Kaspersky cybermap so that you can access the map whenever you need it. It is not necessary to create an account, you can access as a guest.

Netscout Cyber Threat Horizon

This is a map oriented to the visualization of DDoS attacks that occur around the world. As well as the one we mentioned earlier, this is dynamic, so small animations can be viewed, which serve to have an overview of the origin and destination of the attacks.

From the moment we open the map, we can already know how many DDoS attacks are taking place at that moment. So the displayed data is updated in real time. It has some filters that will help customize the way we view maps. However, in order to customize our map, we must create an account. Fortunately, it’s free and it won’t take long to start having one.

Some of the filters that we can cite are those that have to do with the country, the type of organization that is being the victim of the attack, what type of DDoS attack in particular is being executed and the bandwidth of the traffic generated to attack the victim.

If you need to change the color of the map due to light conditions or you don’t like the dark theme, you can go to light with the button at the top. It is the focus icon itself.

Summaries and Reports

As an added value and to further enrich the data displayed on the map, it is possible to access both DDoS attack summaries, as well as detailed reports. Until the time this article has been written, the reports are from the year 2019, so it is updated annually.

Emphasizing the summary, we can know about the frequency of DDoS, which countries are most affected, the volume that handles each event, the average speed of attacks and much more. If we want a somewhat more personalized summary, filters can be applied by country, region or continent. Just like the map, each filter allows automatically adjusting all the data that we visualize.

You can access this map from the official Netscout Cyber Threat Horizon website . Remember that for general viewing, you don’t need to create an account. This only applies if you want to customize the view of the maps and summaries. In the event that you wish to download the Netscout annual report, you must fill out a small form.

FireEye Cyber Threat Map

Unlike the maps we cited above, this one is geared toward occasional queries. Even though it shows us which attacks, the amount, and the origin and destination locations, you can’t access more information than that. We also don’t know what specific attacks each record refers to.

What we can highlight is that as the numbers of the attacks are updated, there is a small list of the five industries that have been most affected. You can check the map on the official FireEye Cyber Threat Map website , without the need to create an account.

Akamai

Most likely, this is one of the most complete maps. Mainly for the amount of data that we can collect from what it can show us. According to the organization itself, it not only allows you to know about the countries or localities with the most opportunities to be attacked, but also about cities with the slowest Internet connectivity or those that generate the most traffic on the web.

On the one hand, we have the views of attacks and their classification by type. According to this capture, we can highlight that the attack that is having the most prominence is SQL Injection. Nearby is Cross-Site Scripting and other attacks. You can view a world map highlighting the locations of attacks and the number that are given per hour.

A very interesting information that displays is the list of the most affected industries. In this screenshot, it can be seen that the industry most affected is Retail . Let us remember that the Retail industry is one of those considered essential for our day to day. It focuses on the sale of all kinds of consumer products through multiple sales channels.

Continuing with the route of the map, we see that there is a monitor of corporate threats, that is, business threats. The graphics that are displayed allow you to have a high-level panorama, but with the necessary amount of data. This is very useful for organizations to know which security points of their IT infrastructure should be reinforced. This, both from the IT side and from the user side.

Finally, we see additional trend data that is also useful to professionals, specialists or anyone interested. The percentage of adoption of the IPv6 protocol and the use of DNS services considering IPv6 are shown.

It is good to remember that Akamai is one of the best known companies worldwide. Especially for the provision of CDN services, which have become essential components for the good performance of a website in all aspects. You can access the Akamai map from here .

Spamhaus Live Botnet Threat Worldwide

This is a map that is geared towards tracking botnets. Remember that a botnet is a network of infected computers or other network devices. In turn, this botnet is controlled by a Command and Control server, which directs the type of actions it will perform. The same C&C server can be in command of one or more botnets. One of the most popular uses is for executing DDoS attacks. This is yet another example of how much the cyber attack industry has grown.

Despite the fact that they are actions that are illegal under the law, the fairly profitable businesses generated around them are known to anyone who knows about these issues. It is like a lawful industry like any other. When we enter the map, we already have direct access to the color-differentiated references of the activity of the botnet and the C&C servers.

Below, you can see the list of Botnets that have the most activity.

So we can also know which countries have the highest Botnet activity. According to the capture that we have shared, the top 3 has as protagonists India, China and Vietnam.

Originally, this map is a sample to generate interest regarding one of your solutions. It’s called DNS Firewall Threat Feeds and it offers a free 60-day trial. The solution offers protection against all records of malicious traffic, phishing sites and downloads of files containing malware. All of this protection is focused at the DNS server level. If you are interested in viewing the map and perhaps, in the offered DNS solution we suggest accessing the official link of Spamhaus Live Botnet Threat Worldwides .

Threat maps and cyber attacks are extremely useful tools for all types of users who want to know more about these events. Some have a higher level of detail than others. However, there is no doubt that there is a map for every need. We suggest taking a look at these maps and if you have more options, you can tell us about it in the comments so that the list grows.