EVENTS
EVENTS/DAY
0
EVENTS
0
EVENTS/DAY
0

Motivations February H1 2024

No Data Found

Attack Techniques February H1 2024

No Data Found

In the first timeline of February 2024 I collected 139 events (9.27 events/day), in contrast to 168 events (10.50 events/day) collected during the second timeline of January.

In terms of attack techniques, malware took the lead with 25.2%, a sharp increase compared to 16.1%, at the expenses of ransomware that slipped at number two with 16.5% (it was 17.9% in the previous timeline but one should consider that in some cases ransomware attacks were generically classified as ransomware), and vulnerabilities at number three with 12.9% (it was 11.9% in the previous fortnight), which continued to be fueled by the massive exploitation of the Ivanti vulnerabilities.

France was characterized by a mega breaches affecting two healthcare services (Almerys and Viamedis) impacting a total of 33 million individuals. Another massive breach hit the Iraqi Independent High Electoral Commission (IHEC) leading to the compromise of the records of 24.3 million citizens.

In the fintech sector, unknown threat actors used a stolen private key to mint and steal over 1.79 billion PLA tokens (equivalent to $290.4 million) from PlayDapp,

And in this fortnight the threat actors driven by cyber espionage were quite active, not only Meta removed multiple accounts linked to several spyware firms and used to test their weapons, but also numerous campaigns were uncovered, carried out by threat actors from Russia (Coldriver, Shuckworm, Turla), North Korea (Kimsuky), India (Patchwork), China (Volt Typhoon and others), Iran (Charming Kitten).

In terms of cyber warfare, this fortnight saw the discovery of multiple disinformation campaigns, and a cyberattack, carried out by the U.S. against MV Behshad, an Iranian military ship.

Last but not least, the complex geopolitical situation continued to influence the hacktivism, with multiple operations against organizations supporting Israel or Ukraine.

For the details, feel free to browse the timeline, and obviously share it to support my work in spreading the risk awareness across the community. And don’t forget to follow @paulsparrows on X (formerly Twitter,) or even connect on Linkedin, or Mastodon for the latest updates.

Geo Map February H1 2024

No Data Found

BE NOTIFIED OF NEW POSTS

SUPPORT MY WORK!
MAKE A DONATION

Creating the timelines is a very time-consuming task.

Any little helps!

BREACHOMETER

No Data Found

The “Breachometer” compares the current number of events/day with the max and min values recorded in the previous 12 months.

12 MONTHS TREND

No Data Found

POPULAR POSTS
  • 2023 Stats Featrured Image2024 Cyber Attacks Statistics

    In 2023, there was a 35% increase in cyber attacks to 4,128 events, with the MOVEit CVE-2023-34362 vulnerability being heavily exploited. Cybercrime dominated as the main motivation at 79%, while malware led attack techniques with 35.9%. Healthcare remained a top target for ransomware. The data ...

  • computer program language text1-15 February 2024 Cyber Attacks Timeline

    In the cyber attacks timeline of February H1 2024, I collected 139 events dominated by malware attacks. Ransomware and vulnerabilities also played an important role in the threat landscape.

  • Q4 2023 Featured ImageQ4 2023 Cyber Attacks Statistics

    In Q4 2023, cyber attack events decreased by 7.1% to 1029 compared to the previous quarter. Cybercrime remains the primary motive, although slightly reduced, while malware tops attack techniques, increasing from the last quarter. Multiple industries and healthcare are the most targeted sectors. These statistics ...

  • 2021 Cyber Attacks Statistics

    And finally I have aggregated all the data collected in 2021 from the cyber attacks timelines. In the past year I have collected 2539 events, meaning...

  • January 2024 Cyber Attacks Statistics

    In January 2024 I collected 288 events, with Cyber Crime continuing to lead the motivations, and ransomware leading the known attack techniques, ahead of Malware.

X

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.