
BlackFog collected threat statistics on a global basis for the first 6 months of 2019. What follows is a summary of the data exfiltration across all endpoints across Windows, Mac, Android and iOS devices.
Dark Web
BlackFog saw some trends from Q1 with a significant increase in Dark Web exfiltration representing 5.67% of traffic, a 40% increase from Q1. BlackFog also saw a 44% decrease in Powershell attacks over the same period moving from 6.34% to 3.51% of all threats. This is most likely due to the changes implemented by Microsoft in recent Windows updates to eliminate some of the known execution vulnerabilities with PowerShell.
Geographic Data Exfiltration
BlackFog also saw the most dramatic changes this quarter in the amount of data exfiltrated to Russia which has now risen by more than 26% from 15.22 to 19.22% of all traffic. Interestingly, this peaked in April and May at 20.81 and 21.69% respectively before settling down at 15.16% in June. During the same period we saw a significant decrease in exfiltration to China from 4.58 to 2.65% a decrease of approximately 42% from Q1.
Direct IP’s and Spyware
No significant changes were found with other core statistics. Spyware represented 2.39%, and the use of direct IP’s for communicating with servers represented 43.26% of all attacks.
Major Threat Vectors
Related Posts
The State of Ransomware 2025
BlackFog's state of ransomware report 2025 measures publicly disclosed and non-disclosed attacks globally.
Iran Hacked Trump Campaign: A Deep Dive into the Cyberattack
An overview of how Iranian IRGC hackers penetrated Trump's campaign through spear-phishing, leaked sensitive data to influence opponents, and the DOJ's subsequent response.
Microsegmentation: Strengthening Network Security Against Zero Day Exploits
Find out why microsegmentation is an increasingly popular option for supporting zero trust networking approaches.
Patch Management: An Essential Part of Data Security
Ensuring you have a strong patch management strategy in place is essential in minimizing the risks posed by known vulnerabilities.
Layered Security – How a Defense-in-Depth Approach Guards Against Unknown Threats
Make sure your systems are fully protected from threats at every level by incorporating these six key layered security defense strategies.
Zero Trust Data Protection: Securing Your Data in a Perimeterless World
What should firms know about zero trust data protection and how can they ensure it is implemented effectively?