Last Updated on March 10, 2020

Here’s the first timeline of February covering the main cyber attacks occurred in the first half of this month. This fortnight I have collected quite a long list containing 97 events, including 8 that slipped from the previous month.

Ransomware, and this is not a novelty, continues to dominate the threat landscape: more than one third of the collected events (35) is related to this kind of attack, with more high profile targets joining the unwelcome list.

Another aspect that characterizes this timeline is COVID-19 outbreak. Cyber criminals have immediately (and sadly) seized this opportunity, so multiple campaign exploiting this terrible event have been discovered.

Other remarkable events concerning the cyber crime front include the Business Email Compromise suffered by the Puerto Rico government ($2.6 million stolen), and the compromise of 1.7 million users from a South African bank.

The cyber espionage front is equally crowded with new campaigns carried out by old acquaintances like APT40, Charming Kitten, Gamaredon, the Gaza Cybergang, and the Lazarus Group.

Last but not least, Italy is the only country interested by Hacktivists, who set their unwelcome attention to three primary universities…

That’s all for the summary. As usual the timeline contains all the details that you can browse and share to support my work and spread the risk awareness across the community. And don’t forget to follow @paulsparrows on Twitter, or even connect on Linkedin, for the latest updates.

This Post Has 2 Comments

  1. vijayanand S

    Dear Paolo,

    Greetings !!

    Have a request.,

    Can we use the cyber statistics information published on your website for show casing in our client reports. This can spread awareness on Cyber across industries where we interact.

    Regards
    Vijay

    1. Paolo Passeri

      Hey Vijay,

      thanks for asking. Sure thing! Feel free to use it as needed, I only ask you the courtesy to quote the source.

      Thanks!

      Paolo.

      Paolo.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.