After the corresponding cyber attacks timelines (part I and part II), it’s time to publish the statistics of September 2022 where I have collected and analyzed 281 events, a lower value than August, but equally considerable if compared with the average of the last 12 months, an additional proof that this period is quite complicated (and not only from a threat landscape standpoint)

Cyber Crime leads the Motivations chart with a percentage stable around 80% (80.1%), despite in slight decrease compared to 82.4% of August. The operations driven by Cyber Espionage experienced a growth to 9.6% from 6.5% of the previous month. Hacktivism showed a light decrease to 5% from 6.2% similarly events motivated by Cyber Warfare got a tiny 2.1% from 2.6%.

Malware is steadily on top of the Attack Techniques, but its percentage dropped to 31.7% from 38.9% of August, ahead (again) of  Account Takeovers with 17.4% from 14.7% and (again) Vulnerabilities (8.5% vs 5.6% of August) and Targeted Attacks that jump to 7.8% from 4.6%).

The Target Distribution chart is led, once again, by attacks against multiple targets with 19.6%, close to 21.9% of August, ahead of Governments (12.8%, slightly up from 11.8%) and Healthcare, the privileged target of ransomware attacks (11.4%).

Check out the interactive charts and the statistics, also available as an infographic.

As always bear in mind that the sample refers exclusively to the attacks included in my timelines, available from public sources such as blogs and news sites. Obviously the sample cannot be complete, but only aims to provide an high level overview of the threat landscape.

Geo Map September 2022


Finally, please support my work, sharing the content, and of course follow @paulsparrows on Twitter for the latest updates.

Support my work! Make a donation!

Popular Posts
  • Photo by Tima Miroshnichenko from PexelsThe Biggest Data Breaches of 2022

    Similarly to what I have done in 2021, I am collecting all the mega breaches (with more than 1 million records leaked). The information is derived from the cyber attacks timelines...

  • Leaky Buckets in 2022

    Similarly to what I have done in 2021, I am now collecting the incidents due to cloud misconfigurations and leading to the exposure of data.

  • 2022 Cyber Attacks Statistics

    And finally I have aggregated all the data collected in 2022 from the cyber attacks timelines. In the past year I have collected 3074 events...

  • Image by Pete Linforth from Pixabay1-15 January 2023 Cyber Attacks Timeline

    Let’s kick off this infosec year with the first cyber attacks timeline for January 2023. In this fortnight I have collected...

  • Photo by Soumil Kumar from PexelsCloud-Native Threats in 2022

    This blog post lists the main cloud-native threats, that is those cyber events exploiting the cloud in one or more stage of the kill chain. I have collected...

Twitter Timeline
August 2022 Infographic

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.