Attack Distribution February H1 2023

No Data Found

Attack Techniques February H1 2023

No Data Found

The first cyber attacks timeline of February 2023 is out setting a new maximum. In the first half of the month I collected 182 events (12.13 events/day.) This is the new maximum for the last 12 months and corresponds to nearly a 20% increase compared to the previous timeline.

Ransomware-driven events were up to 25.8% (47 out of 182 events), up from 22.8%, whilst 14 events were characterized by the exploitation of vulnerabilities (corresponding to 7.7%),  thanks primarily to the massive exploitation of CVE-2021-21974 targeting VMware ESXi servers.

Malvertising events taking advantage of SEO poisoning continued to play an important role with 5 events characterized by this technique.

In the fintech space, Webaverse suffered the theft of $4 million worth of assets, while crypto investors continued to be the targets of multiple campaigns.

And the mega breaches continued to characterize the threat landscape: AT&T, Verizon, and USCellular suffered the leak of customer records, threat actors stole a database with 20 million records from PeopleConnect, the Heritage Provider Network suffered a ransomware attack exposing the data of 3.3 million patients, and finally Weee! suffered a breach exposing the information of 1.1 million customers.

The Cyber Espionage space was quite crowded as usual, with Ukraine being the center of multiple campaigns by Russian threat actors such as: UAC-0050, UAC-0114 and UAC-0056 (AKA Nodaria). Other threat actors particularly active include Seaborgium (AKA Cold River and Calisto), APT29, APT34 (AKA OilRig), APT37, the Lazarus Group and Mustang Panda.

But state-sponsored threat actors continued to back their countries with multiple campaigns in the cyber space with inevitable connections with the Ukrainian situation, such as a campaign targeting Ukrainian refugees abroad, and also fake bomb alerts aimed to destabilize Moldova. Other unearthed operations included an attack launched by the Chernovite group against a dozen of U.S. electric and gas facilities, and Spamouflage, a campaign where Chinese state-aligned actors used AI-generated broadcasters to distribute content that promotes the interests of the Chinese Communist Party.

And last but not least, and once again unsurprisingly, the hacktivist front was always hot, fueled by the campaigns of pro-Russian threat actors such as Killnet.

In this fortnight in particular, the list is really too long to be summarized in few words (this one in particular), so my suggestion is to enjoy the interactive timeline and the tabular format, and obviously thanks for sharing it, and supporting my work in spreading the risk awareness across the community. As always, don’t forget to follow @paulsparrows on Twitter, or even connect on Linkedin, for the latest updates.

Geo Map February H1 2023

No Data Found


No Data Found

The “Breachometer” compares the current number of events/day with the max and min values recorded in the previous 12 months.


No Data Found

  • 2022 Cyber Attacks Statistics

    And finally I have aggregated all the data collected in 2022 from the cyber attacks timelines. In the past year I have collected 3074 events...

  • Leaky Buckets in 2022

    Similarly to what I have done in 2021, I am now collecting the incidents due to cloud misconfigurations and leading to the exposure of data.

  • The Biggest Data Breaches of 2021

    With this new project I am going to track the biggest data breaches of 2021 extracted from my cyber attack timelines.

  • 2020 Cyber Attacks Statistics

    As promised, I have pulled together some statistics from the data collected in 2020. The master table is available at the end of the post after the charts.

  • Photo by Towfiqu barbhuiya on UnsplashThe Biggest Data Breaches of 2023

    Similarly to what I have done in 2022 and 2021, I am collecting the main mega breaches...


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.