June 2020 Cyber Attacks Statistics

Time to publish the statistics derived from the cyber attacks timelines of June (part I and part II). In total I have collected 187 events, a number comparable to May (184), despite in this case we must consider that 14 events alone related to a mega breach of 14 databases published in the dark web on June 29.

The Daily Trend chart, shows a constant trend (with a clear drop during the weekends), while the peak on the 29 reflects the leak of a trove of 14 databases in the dark web.

Cyber crime is always on top of the Motivations Behind Attacks chart with a percentage similar to May (85.6% vs 87%). Cyber Espionage is back to values similar to April and grows to 10.7% from 9.8%. Hacktivism accounts for 2.1% (in May it was 2.7%) and Cyber Warfare for 1.1% (it was 0.5% in May).

Ransomware attacks push once again malware on top of the Attack Techniques chart with 36.4% (it was 34.8% in May). Account hijackings are still at number two among the known attack techniques with 16% (in May it was 16.3%). Similarly to May, targeted attacks close the top trio of the known attack vectors with 9.1% (down from 10.9% of May).

Once again, attacks against multiple targets lead the Distribution of Targets chart down to 19.3% from 22.3% of May. Governments jump at number two with 13.4%, ahead of single individuals with 12.8% (from 10.9%).

As always bear in mind that the sample refers exclusively to the attacks included in my timelines, available from public sources such as blogs and news sites. Obviously the sample cannot be complete, but only aims to provide an high level overview of the threat landscape.

Finally, please support my work, sharing the content, and of course follow @paulsparrows on Twitter for the latest updates. Also feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: