EVENTS
EVENTS/DAY
0
EVENTS
0
EVENTS/DAY
0

The second cyber attacks timeline of October 2021 is out and brings us a sharp increase in the number of events (111) after the apparent break in the first half of October when I collected 86 events. Unsurprisingly, ransomware continues to dominate the threat landscape, characterizing, directly or indirectly, 30.6% of the events (34 out of 111), in comparison with 28.6% of the previous timeline.

And rather unsurprisingly, vulnerabilities continue to characterize the threat landscape, being one of the preferred initial access vectors for attackers for opportunistic and state-sponsored attackers: the annus horribilis for the Google Chrome platform continues, and even this fortnight has seen a trove of new vulnerabilities exploited in the wild: CVE-2021-21224, CVE-2021-31956, CVE-2021-38000, and CVE-2021-38003.

The season of the mega breaches is not over yet: this time it has been the turn of 50 million Moscow drivers, who had their data sold on an underground forum for only $800.

And if you think that the weaponization of deepfakes is going to get worse, you won’t be disappointed: a group of fraudsters made off with $35 million after using forged email messages and deepfake audio to convince an employee of a United Arab Emirates company that a director requested the money as part of an acquisition of another organization.

Even he cyber espionage front is particularly rich of events this fortnight, but this isn’t a surprise. The infamous Nobelium group, the one behind the massive Solarwinds supply-chain attack is back with a new widespread campaign targeting 140 managed service providers and cloud service providers attacked and at least 14 breached since May 2021. The North Korean Lazarus Group is back from the shadow with a new campaign targeting a South Korean think tank and a company developing asset monitoring solutions in Latvia. But also new actors emerge such as the Harvester and LightBasin.. And the list does not end up here…

Expand for details

Enjoy the interactive timeline, and thanks for sharing it, and supporting my work in spreading the risk awareness across the community. Also, don’t forget to follow @paulsparrows on Twitter, or even connect on Linkedin, for the latest updates.

SUPPORT MY WORK!

BREACHOMETER

The “Breachometer” compares the current number of events/day with the max and min values recorded in the previous 12 months.

12 MONTHS TREND
POPULAR POSTS
  • 2023 Stats Featrured Image2024 Cyber Attacks Statistics

    In 2023, there was a 35% increase in cyber attacks to 4,128 events, with the MOVEit CVE-2023-34362 vulnerability being heavily exploited. Cybercrime dominated as the main motivation at 79%, while malware led attack techniques with 35.9%. Healthcare remained a top target for ransomware. The data ...

  • computer program language text1-15 February 2024 Cyber Attacks Timeline

    In the cyber attacks timeline of February H1 2024, I collected 139 events dominated by malware attacks. Ransomware and vulnerabilities also played an important role in the threat landscape.

  • Q4 2023 Featured ImageQ4 2023 Cyber Attacks Statistics

    In Q4 2023, cyber attack events decreased by 7.1% to 1029 compared to the previous quarter. Cybercrime remains the primary motive, although slightly reduced, while malware tops attack techniques, increasing from the last quarter. Multiple industries and healthcare are the most targeted sectors. These statistics ...

  • December 2023 Statistics Featured ImageDecember 2023 Cyber Attacks Timeline

    December 2023 saw a decline in cyber events to 260 from November's 390, with Cyber Crime still leading at 75.4%. Cyber Espionage rose to 10.4%, Hacktivism to 7.3%, and Cyber Warfare doubled to 4.2%. Malware attacks led at 38.5%, while Account Takeovers and Targeted Attacks ...

  • close up view of system hacking16-31 January 2024 Cyber Attacks Timeline

    In the second timeline of January 2024 I collected 168 events (10.50 events/day), dominated by ransomware, ahead of malware and the exploitation of vulnerabilities. There were also several mega breaches, multiple operations against fintech organizations, and the usual wave of attacks motivated by cyber espionage.

FOLLOW ME ON TWITTER

The Perfect Storm

I have decided to create a new timeline tracking the high-impact vulnerabilities targeting both remote access and on-premise technologies exploited…

Continue Reading

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.