Motivations October H1 2023

No Data Found

Attack Techniques October H1 2023

No Data Found

After the decrease observed in the second timeline of September, the in the first half of October 2023 the number of recorded events returned to go grow to a value close to the ones of June 2023, when the effects of the MOVEit CVE-2023-34362 vulnerability. started to emerge. More in detail, in the first half of October I collected 185 events, corresponding to 12,83 events/day, a 7.6% increase from 172 of the previous fortnight (11.47 events/day).

Ransomware continued to characterize the threat landscape, and consequently malware attacks led the chart of the attack techniques with 34.1% (63 out of 185 events), very close to 34.3% of the previous timeline. On the other hand, the impact of vulnerabilities was 15.1%, exactly the same number recorded in the preceding fortnight.

Cyber attack against organizations operating in the fintech space showed an apparent break (if we can use this term) with “just” to two remarkable operations against Stars Arena (more than $1 million worth of crypto assets stolen,) and Gaixe (nearly $500,000 worth stolen.)

An apparent good news is that for the first time in a long time, no mega breaches occurred, however, threat actors driven by cyber espionage were quite active even in the first half of October with multiple operations carried out by known attackers such as APT27, APT41, and Sandworm, but also new threat actors such as Grayling. And obviously the war in the Middle East also influenced the cyber espionage landscape with the discovery of a campaign carried out by a Gaza-based threat actor tracked as Storm-1133.

But obviously the war in Middle East was also the trigger for multiple operations carried out by Hacktivists on both sides (including some well-known actors such as Killnet and Anonymous Sudan,) with Israel being targeted by multiple attacks.

Of course, my suggestion is always the same: browse the timeline, and obviously share it to support my work in spreading the risk awareness across the community. And don’t forget to follow @paulsparrows on Twitter, or even connect on Linkedin, or Mastodon for the latest updates.

Geo Map September H2 2023

No Data Found



Creating the timelines is a very time-consuming task.

Any little helps!


No Data Found

The “Breachometer” compares the current number of events/day with the max and min values recorded in the previous 12 months.


No Data Found

  • Free cyber security concept background1-15 March 2024 Cyber Attacks Timeline

    In the first timeline of March 2024, I collected 98 events, once again characterized malware and ransomware attacks. State-sponsored threat actor were equally quite active, but the timeline also features some interesting events related to cyberwarfare.

  • network servers on an enclosureCVEs Targeting Remote Access Technologies

    In this first quarter of 2024, threat actors have been particularly busy in exploiting vulnerabilities (0-days but also old unpatched flaws) targeting traditional remote access technologies. In this blog post I summarized the main CVEs exploited so far in 2024.

  • 2023 Stats Featrured Image2024 Cyber Attacks Statistics

    In 2023, there was a 35% increase in cyber attacks to 4,128 events, with the MOVEit CVE-2023-34362 vulnerability being heavily exploited. Cybercrime dominated as the main motivation at 79%, while malware led attack techniques with 35.9%. Healthcare remained a top target for ransomware. The data ...

  • February 2024 Statistics Featured ImageFebruary 2024 Cyber Attacks Statistics

    In February 2024 I collected and analyzed 239 events. Cyber Crime continued to lead the Motivations chart with 68.6%. Operations driven by Cyber Espionage ranked at number two with 16.7%, ahead of Cyber Warfare (4.6%) and Hacktivism (3.3%).

  • blue and red galaxy artwork16-29 February 2024 Cyber Attacks Timeline

    In the second timeline of February 2024 I collected 100 events characterized by a majority of malware and ransomware attacks and by a plethora of cyber espionage and cyber warfare campaigns.


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.