February 2020 Cyber Attacks Statistics

Another day, another set of monthly statistics. Today we have the charts derived from the cyber attacks timelines of February (Part I and Part II). Even if February had only 29 days, I have collected a total of 186 events. This is the probably the higher number that I remember.

The high number of events is immediately visible from the Daily Trend chart, which shows a consistent activity throughout the month (with the predictable breaks during the weekends).

The ransomware campaigns, and the ones related to the COVID-19 pandemic continue to push cyber crime on top of the Motivations Behind Attacks chart with 88.7% (it was 80.8% in January). Cyber Espionage shows a light increase (10.2% vs 8.6%), whilst Cyber Warfare and Hacktivism get a tiny 0.5% each.

And for the same reason the malware category remains on top of the Attack Techniques chart, rising to 40.3% from 35.1%. Account hijackings are still at number two, equally showing an increase to 21% from 15.2%. And targeted attacks are still at number three but their value falls back to values closer to December 2019 (8.1% from 12.6% recorded in January 2020).

Attacks against multiple industries lead the Distribtuion of Targets chart with 17.7% (it was 16.2% in February), ahead of governments (14% vs 16.2% in January) and single individuals (13.4% vs 12.3% in January) and and education (10.2%).

As always bear in mind that the sample refers exclusively to the attacks included in my timelines, which can’t obviously complete, and only aims to provide an high level overview of the threat landscape.

Finally, please support my work, sharing the content, and of course follow @paulsparrows on Twitter for the latest updates. Also feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: