EVENTS
EVENTS/DAY
0
EVENTS
0
EVENTS/DAY
0

The first cyber attacks timeline of October 2021 is here and let me say that, at least in terms of numbers, I have recorded a new low for this year: 77 events in comparison with 108 of the previous timeline. Nonetheless, ransomware continues to dominate the threat landscape, characterizing, directly or indirectly, 28.6% of events (it was 26.8% in the previous timeline) with more high-profile victims, especially in the healthcare sector, joining the list of the targets.

Vulnerabilities continue to be one of the preferred inital access vectors for attackers for opportunistic and state-sponsored attackers: a Chinese threat actor dubbed IronHusky, was discovered targeting IT companies, military/defense contractors, and diplomatic entities since 2012 using a new 0-day tracked as CVE-2021-40449, the Atom Silo ransomware gang started to target Confluence servers vulnerable to CVE-2021-26084, and even the Apache Software Foundation had to patch its Web Server to address three vulnerabilites, one of which, CVE-2021-41773, was actively exploited by attackers.

But even the mobile operating systems are under attack: Apple released iOS 15.0.2 and iPadOS 15.0.2 to fix CVE-2021-30883, a zero-day vulnerability actively exploited in the wild.

As always the cyber espionage front is rich of events. APT28 is always very active, and Google had to send out email notifications to more than 14,000 Gmail users, victims of a spear-phishing attack orchestrated by the same actor… But they are not the only ones. Besides the above quoted IronHusky, the timeline includes fresh new campaigns by APT35, APT41, the Donot Team, and also a new actor dubbed DEV-0343 targeting the Office 365 tenants of US and Israeli defense technology companies in extensive password spraying attacks.

Expand for details

Enjoy the interactive timeline, and thanks for sharing it, and supporting my work in spreading the risk awareness across the community. Also, don’t forget to follow @paulsparrows on Twitter, or even connect on Linkedin, for the latest updates.

SUPPORT MY WORK!

BREACHOMETER

The “Breachometer” compares the current number of events/day with the max and min values recorded in the previous 12 months.

12 MONTHS TREND
POPULAR POSTS
  • network servers on an enclosureCVEs Targeting Remote Access Technologies

    In this first quarter of 2024, threat actors have been particularly busy in exploiting vulnerabilities (0-days but also old unpatched flaws) targeting traditional remote access technologies. In this blog post I summarized the main CVEs exploited so far in 2024.

  • Free cyber security concept background1-15 March 2024 Cyber Attacks Timeline

    In the first timeline of March 2024, I collected 98 events, once again characterized malware and ransomware attacks. State-sponsored threat actor were equally quite active, but the timeline also features some interesting events related to cyberwarfare.

  • February 2024 Statistics Featured ImageFebruary 2024 Cyber Attacks Statistics

    In February 2024 I collected and analyzed 239 events. Cyber Crime continued to lead the Motivations chart with 68.6%. Operations driven by Cyber Espionage ranked at number two with 16.7%, ahead of Cyber Warfare (4.6%) and Hacktivism (3.3%).

  • The Biggest Data Breaches of 2021

    With this new project I am going to track the biggest data breaches of 2021 extracted from my cyber attack timelines.

  • 2023 Stats Featrured Image2024 Cyber Attacks Statistics

    In 2023, there was a 35% increase in cyber attacks to 4,128 events, with the MOVEit CVE-2023-34362 vulnerability being heavily exploited. Cybercrime dominated as the main motivation at 79%, while malware led attack techniques with 35.9%. Healthcare remained a top target for ransomware. The data ...

FOLLOW ME ON TWITTER

The Perfect Storm

I have decided to create a new timeline tracking the high-impact vulnerabilities targeting both remote access and on-premise technologies exploited…

Continue Reading

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.