EVENTS
0
EVENTS/DAY
0
EVENTS
0
EVENTS/DAY
0

After the corresponding cyber attacks timelines (part I and part II), it’s time to publish the statistics of May 2022 once again, unsurprisingly, characterized by the events that are happening in Ukraine. In May I have Ascollected 223 events, perfectly in line with the results of April (when the total was 222 events.)

As always, Cyber Crime leads the Motivations chart with 70.4%, an important increase compared to 65.5% of April. Despite the value is growing, it is still lower than the average (around 80%) normally recorded before the Russian invasion in Ukraine. In particular, during May, the campaigns motivated by Cyber Espionage played a very important role (13.5% essentially in line with the 13.6% of April), at the expenses of Hacktivism that fell to 9.9% from 15%. On the other hand, Cyber Warfare shows a small increase to 4,5% from 4.1% in April.)

Malware continues to lead the Attack Techniques chart with 29.1% (it was 28,2%  in April, changing for the first time, the declining trend of the last months. Once again, account takeovers rank at second place among the known attack techniques with 15.2% (it was 14.1% in April): the phishing attacks against NFT collectors seem to be fruitful. And, the opposite of what happened in April, targeted attacks confirm their value at 10.3% (it was 1o.5% in April), and swap their place with vulnerabilities that slide at rank number four (among the known attack vectors) with 7.6% (down from 10.9%.)

There is no surprise in the Target Distribution chart, since it is led, once again, by attacks against multiple targets with 25.1% (it was 22.7% in April) ahead of healthcare organizations (yes the ransomware attacks are back) with 13.5%, a value similar to April when it was 13.9%. Governments rank at number three with 12.6% (down from 13.6% of April) and individuals (10.8% vs. 12.3%).

Check out the interactive charts and the statistics, also available as an infographic.

As always bear in mind that the sample refers exclusively to the attacks included in my timelines, available from public sources such as blogs and news sites. Obviously the sample cannot be complete, but only aims to provide an high level overview of the threat landscape.

Geo Map May 2022

Finally, please support my work, sharing the content, and of course follow @paulsparrows on Twitter for the latest updates.

Support my work! Make a donation!

Popular Posts
  • 2023 Stats Featrured Image2024 Cyber Attacks Statistics

    In 2023, there was a 35% increase in cyber attacks to 4,128 events, with the MOVEit CVE-2023-34362 vulnerability being heavily exploited. Cybercrime dominated as the main motivation at 79%, while malware led attack techniques with 35.9%. Healthcare remained a top target for ransomware. The data ...

  • computer program language text1-15 February 2024 Cyber Attacks Timeline

    In the cyber attacks timeline of February H1 2024, I collected 139 events dominated by malware attacks. Ransomware and vulnerabilities also played an important role in the threat landscape.

  • January 2024 Cyber Attacks Statistics

    In January 2024 I collected 288 events, with Cyber Crime continuing to lead the motivations, and ransomware leading the known attack techniques, ahead of Malware.

  • Q4 2023 Featured ImageQ4 2023 Cyber Attacks Statistics

    In Q4 2023, cyber attack events decreased by 7.1% to 1029 compared to the previous quarter. Cybercrime remains the primary motive, although slightly reduced, while malware tops attack techniques, increasing from the last quarter. Multiple industries and healthcare are the most targeted sectors. These statistics ...

  • network servers on an enclosureCVEs Targeting Remote Access Technologies

    In this first quarter of 2024, threat actors have been particularly busy in exploiting vulnerabilities (0-days but also old unpatched flaws) targeting traditional remote access technologies. In this blog post I summarized the main CVEs exploited so far in 2024.

Twitter Timeline
April 2022 Infographic
Stats April 2022 Infographic

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.