EVENTS
0
EVENTS/DAY
0
EVENTS
0
EVENTS/DAY

The second timeline of May 2022 is out. In the second half of the month I collected 120 events, corresponding to an average of 7.50 events/day, an important increase compared to the 103 events (7.87 events/day) of the previous fortnight.

The Russian invasion of Ukraine continues to characterize the cyber space, and this timeline is no exception: among the events you will find multiple cyber espionage campaigns targeting assets directly or indirectly related to the conflict, disinformation campaigns, and even several DDoS attacks (most of all in Italy) fueled by the pro-Russian Killnet collective.

Q3 2023 Cyber Attacks Statistics

Q3 2023 Cyber Attacks Statistics

The third quarter of 2023 saw a 6.5% increase in cyber attacks with 1,108 events. Cybercrime led the charts with 79.7% of motives, mostly using malware techniques. Exploitation of vulnerabilities ranked second, majorly affecting multiple industries and healthcare and financial sectors.

Continue Reading

Ransomware attacks continue to be a constant presence in the timeline, after the break of the previous fortnight, we are back at important percentages with 18.3% of events charcterized by this attack vector (a level similar to April after the 14.85% of the previous timeline.) Even the exploitation of vulnerabilities is back to the levels of April, with 10% of events (from 7.9% of the previous timeline) occurred leveraging a security hole in a software component.

And similarly, the attacks against Decentralized Finance platforms continue to characterized this troubled 2022: this time it was turn of the Mirror Protocol, which suffered the theft of more than $2 worth of cryptocurrency. Always related to fintech, are the numerous campaigns targeting collectors of NFTs, a consolidated presence even in this second timeline of May.

Analyzing the campaigns motivated by cyber espionage, the landscape is quite rich of events, even without considering those related to the conflict in Ukraine .For example the attackers, such as the Chinese group TA413 started to immediately exploit the so-called ‘Follina’ vulnerability (CVE-2022-30190). Similarly an unknown threat actor conducted several campaigns, against targets in Egypt, Armenia, Greece, Madagascar, Côte d’Ivoire, Serbia, Spain and Indonesia, exploiting multiple vulnerabilities to install the ‘Predator’ spyware.

After this short summary, you can enjoy the interactive timeline. Thanks for sharing it, and supporting my work in spreading the risk awareness across the community. Also, don’t forget to follow @paulsparrows on Twitter, or even connect on Linkedin, for the latest updates.

Expand for details

SUPPORT MY WORK!

BREACHOMETER

The “Breachometer” compares the current number of events/day with the max and min values recorded in the previous 12 months.

12 MONTHS TREND
POPULAR POSTS
  • Q3 2023 Cyber Attacks StatisticsQ3 2023 Cyber Attacks Statistics

    The third quarter of 2023 saw a 6.5% increase in cyber attacks with 1,108 events. Cybercrime led the charts with 79.7% of motives, mostly using malware techniques. Exploitation of vulnerabilities ranked second, majorly affecting multiple industries and healthcare and financial sectors.

  • September 2023 Cyber Attacks Statistics

    In September 2023, cyber crime continued to lead with 77.1% of total events, but showed a decrease. Cyber Espionage grew to 11.6%, while Hacktivism significantly dropped. Malware remains the leading attack technique and multiple organizations are the top targets.

  • Photo by Towfiqu barbhuiya on UnsplashThe Biggest Data Breaches of 2023

    Similarly to what I have done in 2022 and 2021, I am collecting the main mega breaches...

  • 2022 Cyber Attacks Statistics

    And finally I have aggregated all the data collected in 2022 from the cyber attacks timelines. In the past year I have collected 3074 events...

  • Q1 2023 Cyber Attacks Statistics

    I have aggregated the statistics created from the cyber attacks timelines published in the first three months of 2023. In total...

FOLLOW ME ON TWITTER

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.