March 2020 Cyber Attacks Statistics

An ingfographic is also available here.

It’s time to publish the statistics derived from the cyber attacks timelines of March (part I and part II). As you will discover soon, the threat landscape continues to be quite complicated due to the multiple campaigns exploiting COVID-19, and in fact in this month I have analyzed 179 events. Despite this number is slightly lower than February (186), the level of activity is still quite sustained.

Even in March, the Daily Trend chart, shows a consistent activity throughout the month, with a peak in the third week, and the usual breaks during the weekends).

The COVID-19 pandemic continues to push cyber crime on top of the Motivations Behind Attacks chart with 86.6% (it was 88.7% in February). Cyber Espionage shows again a light increase (11.7% vs 10.2%), whilst Cyber Warfare gets a tiny 1.1% each, while no events related to Hacktivism have been reported in the timelines this month.

Malware is always on top of the Attack Techniques chart, with 38,5% from 40.3%. Account hijackings remain at number two, but their percentage slides to 16.8% from 21%. And targeted attacks also confirm their third rank with 12,3% from 8.1% recorded in February.

The COVID-19-themed attacks push single individuals on top of the Distribution of Targets chart with 25.1% (they ranked at number three in February with 13.4%), ahead of attacks targeting multiple industries with 21.2% (they were at number one in February with 17.7%), and governments (11.2% vs 14% in February).

As always bear in mind that the sample refers exclusively to the attacks included in my timelines, which can’t obviously complete, and only aims to provide an high level overview of the threat landscape.

Finally, please support my work, sharing the content, and of course follow @paulsparrows on Twitter for the latest updates. Also feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: