EVENTS
EVENTS/DAY
0
EVENTS
0
EVENTS/DAY
0

Let’s start this 2022 with the first cyber attacks timeline. The new year begins with a noticeable decrease in the number of collected events. A number (84) that, despite smaller than the previous months, is in line with the value of the first half of January 2021 (88 events). Apparently threat actors take some rest during the Christmas break

But despite the break, ransomware continues to characterize the threat landscape with 26 out of 84 events (corresponding to 30.9%), an important growth compared with 23.6% of the second timeline of December. On the other hand, the number of events carried out exploiting vulnerabilities dropped to 7.1% (6 out of 84 events) from 16.5% of the previous timeline.

Mega breaches seem to be a concerning trend for this early 2022, with million of records siphoned from multiple organizations in the healthcare, entertainment, and multiple other sectors. I am curious to see if this is a short-lived phenomenon, or it will really characterize the whole year.

Lust but not least, an additional fintech company operating in the sector of NFTs, has joined the unwelcome list of the hacked startups that suffered a massive lost of funds by attackers.

Nothing new under the cyber espionage front, with multiple threat actors targeting organizations worldwide. The list includes well-known threat actors such as APT32 (AKA OceanLotus), APT35 (AKA Charming Kittens), APT37, Patchwork, and multiple Russian threat actors targeting local governments in the United States.

Last but not least, Ukraine continues to be a hot front of war, and not only in the real world. In this fortnight the country suffered at least two operations: a massive defacement of multiple sites belonging to various public institutions (a similar operation, allegedly carried out by the Russia-backed GhostWriter also hit Poland) and, even worse, a destructive data-wiping malware dubbed WhisperGate.

Expand for details

Enjoy the interactive timeline, and thanks for sharing it, and supporting my work in spreading the risk awareness across the community. Also, don’t forget to follow @paulsparrows on Twitter, or even connect on Linkedin, for the latest updates.

SUPPORT MY WORK!

BREACHOMETER

The “Breachometer” compares the current number of events/day with the max and min values recorded in the previous 12 months.

12 MONTHS TREND
POPULAR POSTS
  • Featured Image Q1 2024Q1 2024 Cyber Attacks Statistics

    I aggregated the statistics created from the cyber attacks timelines published in the first quarter of 2024. In this period, I collected a total of 833 events (9.15 events/day) dominated by Cyber Crime with 75.2%...

  • Free cyber security concept background1-15 March 2024 Cyber Attacks Timeline

    In the first timeline of March 2024, I collected 98 events, once again characterized malware and ransomware attacks. State-sponsored threat actor were equally quite active, but the timeline also features some interesting events related to cyberwarfare.

  • Free computer code screen image16-31 March 2024 Cyber Attacks Timeline

    In the second timeline of March 2024 I collected 104 events dominated by malware, exploitation of vulnerabilities and ransomware. The threat landscape was also characterized by several mega breaches, multiple cyber espionage operations and also some remarkable events related to cyber warfare.

  • March 2024 MotivationsMarch 2024 Cyber Attacks Statistics

    In March 2024 I collected and analyzed 203 events dominated by malware attacks. Cyber Crime continued to lead the Motivations chart with 72.9%, ahead of Cyber Espionage with 13.3%, Cyber Warfare (5.9%) and Hacktivism (2.5%).

  • network servers on an enclosureCVEs Targeting Remote Access Technologies

    In this first quarter of 2024, threat actors have been particularly busy in exploiting vulnerabilities (0-days but also old unpatched flaws) targeting traditional remote access technologies. In this blog post I summarized the main CVEs exploited so far in 2024.

FOLLOW ME ON TWITTER

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.