BlackFog collected threat statistics on a global basis for the first 9 months of 2019 (threat statistics Q3 2019). What follows is a summary of the data exfiltration across all endpoints including Windows, Mac, Android and iOS devices.
Dark Web
BlackFog saw a steady decline in Dark Web exfiltration over the quarter representing 1.69% of traffic, a decrease from both Q1 and Q2. However, BlackFog saw a dramatic increase in PowerShell attacks in Q3 at 7.86%, which is the highest we have seen for the year, up from 3.51% in the previous quarter. This reflects the increased use of the PowerShell for fileless attacks and the increase in the number of ransomware attacks globally.
Geographic Exfiltration
BlackFog reported a decrease in data exfiltrated to Russia this quarter, totaling 13.5% compared to 19.43% in the previous quarter. Exfiltration to China remained relatively stable at 2.13% compared with 2.62% in the previous quarter.
Direct IP’s and Spyware
No significant changes were found with other core statistics. Spyware represented 1.57%, and the use of direct IP’s for communicating with servers represented 37.03% of all attacks.
Major Threat Vectors
Related Posts
What Causes Victims to Pay in a Ransomware Attack? The Psychology
Learn the main reasons why victims of a ransomware attack are forced to pay, such as the need to avoid operational disruption or the deceptive methods used by attackers to establish confidence.
BlackFog Announces SOC 2 Type II and TX-RAMP Certifications
BlackFog earns SOC 2 Type II and TX-RAMP certifications, boosting trust in its ADX technology for robust data security and ransomware prevention.
The Hidden Crisis: How Stress is Forcing 1 in 4 Chief Information Security Officers to Quit
A Hidden Crisis A Chief Information Security Officer (CISO) has always had huge responsibility. But with increased cyberthreats and a growing workload, security leaders are under siege. According to research we [...]
Ransomware Detection: Effective Strategies and Tools
What ransomware detection tools and techniques should businesses be using in order to improve their security?
Understanding Double Extortion Ransomware: Prevention and Response
What is double extortion ransomware and what should firms know in order to protect against this threat?
Key Steps for Effective Enterprise Data Protection
How must firms adapt to a challenging enterprise data protection landscape in 2023 and beyond?