Last Updated on July 16, 2020

After the second timeline of May, it’s time to publish the corresponding statistics for the same month. In May, I have collected and analyzed 184 events, a number still in line with the previous months, despite the majority of the events occurred in the first half. Is the minor activity that characterized the second half of May the sign of an inverting trend ? It’s probably too early to tell, but hopefully the next timelines will shed more light.

The Daily Trend chart, shows the higher level of activity during the first half, with a peak in the second week. The second half of the month appears definitely quieter, with a peak in the fourth week.

Cyber crime is always on top of the Motivations Behind Attacks chart with in practice the same percentage of April (87% vs. 86.8%). Cyber Espionage slides to 9.8% from 11.1%, while Hacktivism accounts for 2.7% of the total events (vs. 0.5% of April), at the expense of Cyber Warfare, sliding at 0.5% from 1.6% of April.

Malware is always on top of the Attack Techniques chart, with 34.8% (vs 35.4% in April). Account hijackings are still at number two among the known attack techniques with 16.3% (vs. 19.6% of April). Similarly to Apri, targeted attacks close the top trio of the known attack vectors with 10.9% from 6.9% of April.

Attacks against multiple targets lead the Distribution of Targets chart with 22.3% (it was 25.4% in April), once again ahead of attacks against single individuals, plummeted at 10.9% from 21.2% in April, (they ranked at number one with 25.1% in March). At number three we have, for the first time, targets belonging to “Professional, Scientific, Technical Activities”, with 10.9% as well.

As always bear in mind that the sample refers exclusively to the attacks included in my timelines, which can’t obviously complete, and only aims to provide an high level overview of the threat landscape.

Finally, please support my work, sharing the content, and of course follow @paulsparrows on Twitter for the latest updates. Also feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.