EVENTS
0
EVENTS/DAY
0
EVENTS
0
EVENTS/DAY

In the second timeline of October, I have collected 130 events (corresponding to 8.13 events/day), a noticeable drop compared to the 144 of the previous timeline. I wonder if this is a temporary decrease or the beginning of a new trend. 

Ransomware is a primary attack vector even in this timeline, and its percentage reaches again the higher values of 2022 with 31.5% (41 out of 130 events), a sharp increase compared to 20.8% of the first half of October. Instead the impact of vulnerabilities remains stable at 10%, very close to 9.7% of the first half of this month.

computer program language text

1-15 January 2024 Cyber Attacks Timeline

I am back with the first timeline of 2024, with some changes: ransomware counted as a specific attack technique, and an optimization of the sources. With this new methodology I collected 116 events, and for the first time, the threat landscape was dominated by account takeovers, a consequence of the numerous crypto scams that have flooded X (previously Twitter), ahead of Ransomware and malware (16.4%), and exploitation of vulnerabilities (9.5%).

Continue Reading

The toll to Decentralized Finance platforms continue to grow: in this timeline two organizations, Moola Market and Team Finance, fell victim of the attackers, with a total loss of nearly 24 million worth of cryptocurrency (respectively 9 million and 14.5 million.) Ironically, as if the massive crash was not enough, the FTX users were victim of a phishing campaign.

And despite the impact of the cyber campaigns related to Ukraine seems to decrease (at least the ones that are visible), the cyber espionage front continues to be quite hot. The list of the known threat actors active in this period include: APT41 (AKA Winnti, Chinese attribution), Domestic Kitten (Iran), Sidewinder (Pakistan), Kimsuky (North Korea). Instead the new threat actors revealed in this timeline include: DiceyF and Cranefly. Two additional events to notice in this timeline include the alleged hack of the cellphone of the previous UK Prime Minister Liz Truss (by suspected Russian threat actors), and the constant presence of Coordinated Inauthentic Behavior operations aiming to undermine the public opinion of western contries. It is also interesting to notice that yet another ransomware gang (Cuba) turned its unwelcome intentions to Ukraine

Even in this fortnight, the list is too long to be summarized in few words (this one in particular), so my suggestion is to enjoy the interactive timeline and the tabular format, and obviously thanks for sharing it, and supporting my work in spreading the risk awareness across the community. As always, don’t forget to follow @paulsparrows on Twitter, or even connect on Linkedin, for the latest updates.

Expand for details

Geo Map October H2 2022
SUPPORT MY WORK!
BREACHOMETER

The “Breachometer” compares the current number of events/day with the max and min values recorded in the previous 12 months.

12 MONTHS TREND
POPULAR POSTS
  • 2023 Stats Featrured Image2024 Cyber Attacks Statistics

    In 2023, there was a 35% increase in cyber attacks to 4,128 events, with the MOVEit CVE-2023-34362 vulnerability being heavily exploited. Cybercrime dominated as the main motivation at 79%, while malware led attack techniques with 35.9%. Healthcare remained a top target for ransomware. The data ...

  • computer program language text1-15 January 2024 Cyber Attacks Timeline

    I am back with the first timeline of 2024, with some changes: ransomware counted as a specific attack technique, and an optimization of the sources. With this new methodology I collected 116 events, and for the first time, the threat landscape was dominated by account ...

  • The Biggest Data Breaches of 2021

    With this new project I am going to track the biggest data breaches of 2021 extracted from my cyber attack timelines.

  • Photo by Towfiqu barbhuiya on UnsplashThe Biggest Data Breaches of 2023

    Similarly to what I have done in 2022 and 2021, I am collecting the main mega breaches...

  • Leaky Buckets: a List of Cloud Misconfigurations

    Cloud services are playing a crucial role to guarantee business continuity during this complicated period...

FOLLOW ME ON TWITTER

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.