The first timeline of February 2022 is out with 98 events. This number represents a 7% decrease with regards to the second timeline of January (105 events), but if compared with the first timeline of the previous month (91 events), shows a 7% increase. However the numbers are considerably lower than this same period one year ago when the peak of activity for 2021 was achieved.

Ransomware continues to dominate the threat landscape, mainly thanks to the BlackCat operation, characterizing 23 out of 98 events (23.4% vs 14.3% and 30.7% respectively for the first and the second timeline of January). Similarly, the exploitation of vulnerabilities continues to characterize this initial part of 2022: 10 out 98 events (10.2%) have been carried out exploiting vulnerabilities of any kind (it was respectively 6.5% and 14.3% for the first and second timeline of January 2022.

Massive hacks against companies operating in the fintech space continue: Wormhole suffered a huge $326M worth loss (but luckily the funds were recovered shortly after), unfortunately KLAYswap and were not so lucky loosing respectively the equivalent of $1.9M and$4.4M in cryptocurrencies.

Inevitably, the war in Ukraine has crossed the boundaries of cyber space. This country was targeted by multiple cyber attacks and influence campaigns allegedly orchestrated by Russia.

The cyber espionage front is also very rich and not only in Ukraine thanks to the Gamaredon group. Multiple well-known threat actors characterize this timeline including APT35 (AKA Phosphorus or Charming Kitten), TA402 (AKA Molerats), ot TA406 (AKA Kimsuky), and Arid Viper (AKA Desert Falcon, Two-tailed Scorpion, or APT C-23).

Expand for details

Enjoy the interactive timeline, and thanks for sharing it, and supporting my work in spreading the risk awareness across the community. Also, don’t forget to follow @paulsparrows on Twitter, or even connect on Linkedin, for the latest updates.



The “Breachometer” compares the current number of events/day with the max and min values recorded in the previous 12 months.

  • January 2016 Cyber Attacks Statistics

    It's time to publish the statistics derived from the Cyber Attacks Timelines of January 2016 (Part I and Part II). As usual let's start from the Country Distribution Chart, which is led by the United States for the categories of Cyber Crime and Hacktivism. United ...

  • January 2022 Cyber Attacks Statistics

    After the cyber attacks timelines of January 2022, I can finally publish the corresponding statistics. In the two timelines...

  • February 2017 Cyber Attacks Statistics

    It's time to publish and comment the cyber attacks statistics for February, derived from the corresponding cyber attacks timelines (Part I and Part II). The level of activity has been stronger in the first half of the month, according to Daily Trend of Attacks chart ...

  • 2022 Cyber Attacks Statistics

    And finally I have aggregated all the data collected in 2022 from the cyber attacks timelines. In the past year I have collected 3074 events...

  • TCP Split Handshake Attack Explained

    Update May 12: TCP Split Handshake: Why Cisco ASA is not susceptible Update May 11: The Never Ending Story Update April 21: Other Considerations on TCP Split Handshake Few days ago, independent security research and testing NSS Labs, issued a comparative report among six network security ...


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.