Today, it seems that computer hacking and data breaches are constantly in the headlines. From Anthem's loss of up to 100 million customer records containing PII, to the massive leak of tech giant Sony's private data, to North Korea's 6,000-strong "cyber army," you might get the impression that the state of security is worse than ever. But you may be surprised to learn that there's a lengthy history of viruses, worms, and hacking attacks ravaging the net and compromising millions of systems.

From the first primitive viruses of the early internet to the hacking of social media accounts, malicious software and actors have been an ever-present threat. And we’ve analyzed current and historical public data on tweets and Google searches revealing trends in these digital exploits over time and across the country. Read on, and see how viruses, malware and perceived hacks have impacted our digital world throughout the past decade.

Who thinks they get hacked or attacked the most?

Leaders in the tech industry aren’t the only ones being targeted, and this map shows the location and quantity of public tweets from 2011 to 2014 by people who tweeted about being hacked – whether it was their email, Facebook, or other accounts which were compromised. Larger, brighter circles show a greater absolute number of tweets related to hacking. As expected, populous states such as those on the east and west coasts show the largest total number of tweets.

In comparison, we can see which states seem to suffer from the most hacks and viruses per capita, as reported by Twitter users via their tweets. Unlike the totals, southern and rural states are often the ones showing a disproportionately greater number of tweets. While California, Texas and Illinois have a great many reports of hacking, it’s West Virginia, Louisiana and Mississippi which are above average. Check out this map, which shows the per capita incidence by state:

A decade of malware

As more and more home PCs were connected to the internet at the turn of the century, malware could spread itself like never before. Worm viruses, exploiting security gaps in popular operating systems, could spread worldwide in hours and create traffic jams that rendered parts of the internet almost unusable. Hijacked PCs were harnessed to send mass amounts of spam email, while shady software was bundled with spyware programs that would track users’ online activity and bombard them with ads. The following maps show the volume of Google searches for keywords related to antivirus software, malware, and spyware, from 2001 to 2013. The state-by-state differences offer a window into how these issues impact individuals on a regional level over time.

Antivirus

Malware

2008: Using Facebook, Skype, Yahoo Messenger, and email, the Koobface worm used compromised PCs to display advertisements, with the ads generating up to $2 million in revenue for the gang that created the worm.

Using Facebook, Skype, Yahoo Messenger, and email, the Koobface worm used compromised PCs to display advertisements, with the ads generating up to $2 million in revenue for the gang that created the worm. 2009: In July of 2009, a network of infected computers was used to send overwhelming traffic to major government and news sites in the US and South Korea, including the White House and Pentagon.

In July of 2009, a network of infected computers was used to send overwhelming traffic to major government and news sites in the US and South Korea, including the White House and Pentagon. 2010: The Waledac worm created a network of hijacked PCs capable of sending over a billion spam emails every day, before finally being taken down by Microsoft in 2010. And the Stuxnet worm, believed to have been created by certain nation-states, attacked industrial control software and ultimately destroyed many of Iran’s centrifuges used for refining nuclear material.

Spyware

2004: The ISP Earthlink found that the average computer contains nearly 28 spyware programs.

The ISP Earthlink found that the average computer contains nearly 28 spyware programs. 2005: The record label Sony BMG placed intrusive, covert copy-protection software onto its music CDs. When loaded on a computer, the discs would install software to interfere with the copying of CDs. The software could not be easily uninstalled, and its security flaws allowed the spread of numerous additional viruses.

The record label Sony BMG placed intrusive, covert copy-protection software onto its music CDs. When loaded on a computer, the discs would install software to interfere with the copying of CDs. The software could not be easily uninstalled, and its security flaws allowed the spread of numerous additional viruses. 2007: In 2007, 850,000 US households had to replace a computer due to spyware. The total damage exceeded $1 billion.

In 2007, 850,000 US households had to replace a computer due to spyware. The total damage exceeded $1 billion. 2009: Searches relating to spyware drop sharply, as Microsoft releases the free Microsoft Security Essentials antivirus program for Windows.

Protecting digital data assets

Malicious software and security vulnerabilities remain a serious threat, with more exploits being found every year, and hacking groups targeting the data from high-profile companies and industry leaders. As enterprises embrace changes like Big Data, cloud storage, and BYOD, they may find themselves more exposed than ever.

Digital Guardian is the only data-centric security platform designed to stop data theft. The Digital Guardian platform performs across traditional endpoints, mobile devices and cloud applications to make it easier to see and stop all threats to sensitive data. For more than 10 years we’ve enabled data-rich organizations to protect their most valuable assets with an on premise deployment or an outsourced managed security program (MSP). Our unique data awareness and transformative endpoint visibility, combined with behavioral threat detection and response, let you protect data without slowing the pace of your business.

Learn More about Preventing Sensitive Data Loss:





