CIRAS: tracking cyber incidents in Europe

Indice

The European Union has an IT incident analysis tool called CIRAS. Let’s take a look at this not always well known tool.

What is CIRAS

CIRAS (Cybersecurity Incident Report and Analysis System) is a tool managed by ENISA that aims to collect, catalogue and analyse cyber incidents occurring in European countries. The tool’s official page reads:

In the EU, critical service providers have to report cyber security incidents with a significant impact to the national authorities in their country. At the end of each year, summary reports on these incidents are collected, anonymised, aggregated and analysed by ENISA. The visualisation tool shows the overall EU statistics. (Source: CIRAS)

Thus, CIRAS is fed by the anonymised data that each authority in each European country sends to ENISA. CIRAS is then responsible for representing cyber security incidents through graphs, statistics and summary views. The sectors under analysis are: energy, transport, banking, finance, health, drinking water supply and distribution, digital communications infrastructure, trust and identification services, digital services, government services, other.

According to CIRAS, the computer incidents over the years reported were as follows:

YEARREPORTS
201277
201395
2014146
2015138
2016159
2017183
2018175
2019185
2020495
2021559
20221083
20231271
202411
Reports sent to CIRAS from 2012 to 2024

What the data tell us

Two interesting phenomena can be seen from this table: the first concerns the transition from 2021 to 2022, when reports almost doubled from 559 to 1083. The second phenomenon is the 11 reports received in 2024. To give a graphic idea of the trend, the situation is as follows. Explaining this phenomenon is important.

Trend chart of reports sent to CIRAS

The 2024 data is being updated: on the date this article was started (14 January), there were 11 reports. On 17 January (3 days later), the figure had risen to 34.

The year 2024

Concerning the 11 accidents reported during 2024, CIRAS offers some rather interesting statistics.

Technical causes of accidents reported in 2024

It is clear that the main technical causes attributable to the accident are:

  • For 45% external causes.
  • For 36% energy losses, flooding/flooding, interruptions in wiring.
  • For 27% strong wind, problematic updates

An interesting aspect that can be observed is that among the most recurring reasons are environmental causes, which, for more than a decade, have prompted ISO 27005 to include them as risk factors. If you want to learn more about this topic, we recommend reading this article on environmental risk.

The year 2023

Due to the update status of 2024, it is important to consider more comprehensive data: 2023 is an ideal year. If we try to compare the data with previous years, we learn that in 2023, 459 incidents were reported in Europe from malicious actions (i.e. 36 per cent of the total).

Comparison of data in the years 2023, 2022, 2021

Looking in more detail at arson accidents in 2023, we learn that the greatest impact of these actions was on the transport sector (27 per cent), followed immediately by the health sector (17 per cent), with only the energy sector in third place (11 per cent).

Impact of arson accidents by sector in 2023

There is one aspect that may come as a surprise to many insiders: the most frequent causes of computer incidents are to be found in phenomena other than malware and ransomware. Of the 1271 total incidents, 459 are attributable to technical causes( culpable and malicious), broken down as follows.

TypePercentage
DDoS18%
More8%
Viruses & Malware8%
Ransomware8%
Vulnerability exploit5%
Identity theft4%
Phishing3%
Supply Chain1%
Technical causes of accidents in 2023

It should be noted that CIRAS makes a distinction between‘malware & viruses‘ and‘ransomware‘ that really should not be there. In fact, ransomware is a type of malware and should therefore be included under‘malware & viruses‘. The government agency CISA (Cybersecurity and Infrastructure Security Agency) writes about this.

Ransomware is a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable.

Ransomware is a form of malware designed to encrypt files on a device, rendering all files and systems that rely on them unusable

Clearly, the CIRAS decision is necessary to give relevance to a particularly widespread threat. Finally, it should be borne in mind that 10 per cent of all such incidents (1271 occurrences) would hit the following technical targets:

AssetPercentage
More15%
Servers and Domain Controllers10%
Websites8%
App7%
Switches and Routers6%
Technical assets impacted by accidents in 2023

Correspondence between CIRAS and NIS 2

The data collected within CIRAS have an almost complete correspondence with those of the highly critical sectors of NIS 2, here is a table for comparison.

CIRASNIS2
MoreSpace1
Banking sectorBanking sector
Energy sectorEnergy sector
Financial sectorFinancial Market Infrastructures
Supply and distribution of drinking waterSupply and distribution of drinking water
Digital infrastructure and communicationDigital infrastructure and communication
HealthHealth sector
Digital ServicesManagement of ICT2 services
Trust and identification servicesDigital infrastructures3
Government ServicesPublic administration
TransportTransport
Comparison between CIRAS sectors and highly critical NIS 2 sectors (Annex 1)

A few aspects should be noted:

Conclusions

Before proceeding to conclusions, the reader should be informed about the 2024 dataset. Since the cause of this incomplete data set is not known precisely, an e-mail was sent to the CIRAS Working Group on 14 January 2025, but as of 17 January 2025 no response had been received. It was therefore not possible to establish why the 2024 data is so out of date, but it was possible to establish the Working Group’s conduct regarding the request for information.

A first point is the real usefulness of these data. CIRAS is certainly an excellent tool, interesting for its potential comprehensiveness. It is perplexing that in mid-January 2025, one cannot have complete data for 2024. Timeliness in data is important, as well as their fundamental quality. In the context of cybersecurity, the data provided by systems such as CIRAS offer important suggestions on how to direct one’s investments, but if this data were incorrect or arrived late, it could simply be considered less useful, if not completely useless.

A second point concerns reliability. As of the year 2023, the ransomware threat would only be a problem in 8% of the reports.

According to CIRAS, only 39 incidents caused by ransomware were reported in 2023

According to CIRAS, there were 39 reports of incidents caused by ransomware in 2023. This is clearly impossible and opens up a front for discussion about the reliability of a European tool that provides critically important data but may be partially incomplete and thus almost meaningless.

A third point concerns traceability. If incidents follow a rigorous process of acquisition, classification and publication, their traceability will be of quality and the data will have value (we speak of data quality management not by chance). Otherwise, this tool will be of little use, if not confusing.

So the question remains: what is the use of a statistical tool that is based on incomplete and late data? To the readers the answer.


Notes

  1. There is no dedicated ‘Space’ sector in the CIRAS system. ↩︎
  2. In the European text, ICT services include‘Managed ServiceProviders’, ‘Managed Security Service Providers‘. ↩︎
  3. Digital Infrastructure’ includes ‘Trust Service Providers’. ↩︎

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.