Throughout Q2 2023, the Vulnerability Detection and Cyber Incident and Cyberattack Response System detected 122 million suspicious information security events (at initial analysis), and processed 55,000 critical information security events (potential cyber incidents detected through filtering suspicious IS events and secondary analysis). In addition, 191 cyber incidents were recorded and processed through security analysts directly.
Compared to Q1 2023, the number of information security events categorized as “Malicious Code” grew by 95.8%, and those categorized as “Phishing” grew by 35.8%. The total number of critical information security events grew by 38.1%.
Overall, Q2 2023 showed a downtrend in the total number of cyberattacks targeting Ukrainian organizations of various sectors and forms of ownership, observed since early 2023.
During the reporting period, Agent Tesla, Formbook, SmokeLoader Snake Keylogger and Remcos dominate among the malware families detected in IS events under the category “02 Malicious software code”.
Narodnaia CyberArmia, WE ARE BlOODNET, Solntsepiok, Xaknet, and NoName057(16) are the most active pro-russian hacktivist groups, with the number of attacks launched by them during Q2 2023 being 89% of the total number of recorded attacks launched by similar groups.
At that, the largest number of attacks were targeted at finance, governmental, media, energy and telecom sectors.
By topic «Security»
More news