September 2020 Cyber Attacks Statistics

After the two cyber attacks timelines of September (part I and part II), it’s time to publish the corresponding statistics. In this month I have collected a total of 201 events, which represents the new record, after the 197 of August.

The Daily Trend chart reflects the sustained level of activity, with a peak in the first week.

Breaking down the same chart in terms of motivation shows the expected predominance of events related to cyber crime.

Predominance that is obviously confirmed by the Motivations Behind Attacks chart, where Cyber Crime ranks on top 85.6% (was 86.8% in August). Cyber Espionage accounts grows to 11.4% from 9.6% in Auguest. Hacktivism and Cyber Warfare account for 1.5% both (they were respectively at 2.5% and 1% in August).

Ransomware, once again, pushes malware on top of the Attack Techniques chart up to 46.8% from 38.1% in August. Account hijackings are again at number two among the known attack techniques down to 13.4% from 17.3%. Similarly to August and July, targeted attacks rank at number three with 10.9% from 11.7%.

Similarly to August, attacks against multiple targets lead the Distribution of Targets chart with 19.4% (down from 23.9% in August). Healthcare targets rank at number two with 15.9% (12.2% in August), ahead of government targets (12.4%).

As always bear in mind that the sample refers exclusively to the attacks included in my timelines, available from public sources such as blogs and news sites. Obviously the sample cannot be complete, but only aims to provide an high level overview of the threat landscape.

Finally, please support my work, sharing the content, and of course follow @paulsparrows on Twitter for the latest updates. Also feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: