
BlackFog collected threat statistics on a global basis for the first 6 months of 2019. What follows is a summary of the data exfiltration across all endpoints across Windows, Mac, Android and iOS devices.
Dark Web
BlackFog saw some trends from Q1 with a significant increase in Dark Web exfiltration representing 5.67% of traffic, a 40% increase from Q1. BlackFog also saw a 44% decrease in Powershell attacks over the same period moving from 6.34% to 3.51% of all threats. This is most likely due to the changes implemented by Microsoft in recent Windows updates to eliminate some of the known execution vulnerabilities with PowerShell.
Geographic Data Exfiltration
BlackFog also saw the most dramatic changes this quarter in the amount of data exfiltrated to Russia which has now risen by more than 26% from 15.22 to 19.22% of all traffic. Interestingly, this peaked in April and May at 20.81 and 21.69% respectively before settling down at 15.16% in June. During the same period we saw a significant decrease in exfiltration to China from 4.58 to 2.65% a decrease of approximately 42% from Q1.
Direct IP’s and Spyware
No significant changes were found with other core statistics. Spyware represented 2.39%, and the use of direct IP’s for communicating with servers represented 43.26% of all attacks.
Major Threat Vectors
Share This Story, Choose Your Platform!
Related Posts
BlackFog ADX Instinct: Your Virtual CISO
ADX Instinct, our expert-led virtual CISO service provides strategic guidance, risk management and tailored compliance support.
BlackFog Report Reveals 36% Increase in Q3 Ransomware Attacks YoY
BlackFog report reveals 36% YoY increase in Q3 ransomware attacks 2025, with healthcare, government and technology among the hardest hit.
2025 Q3 Ransomware Report
BlackFog’s 2025 Q3 Ransomware Report - global cyber battlefield heats up as ransomware groups escalate attacks. Download full report for key insights.
How To Prevent Phishing: Essential Strategies for Businesses
Find out everything you need to know about how to prevent phishing attacks from impacting your business in our comprehensive guide.
Spear Phishing Explained: How To Recognize And Prevent Targeted Cyberattacks
Targeted spear phishing attacks remain a threat to every business. Make sure your employees know how to spot them and what to do to minimize the risk.
What Is Clone Phishing? How To Detect And Prevent This Overlooked Cyberthreat
Clone phishing is a subtle but dangerous attack that's easy to miss. Learn how it works, how it differs from other threats and what to do if someone falls victim.





