Key Takeaways
- 1,219 confirmed cybersecurity incidents in 2023 involving data breaches at U.S. federal agencies, including multiple cyber-related incidents; indicates the scale of breach activity in the federal sector
- 38% of breaches involved malware in 2023 (Verizon DBIR 2024); indicates use of malicious tooling alongside stealth access
- 78% of organizations expected increased cybersecurity budgets in 2024 (Gartner survey referenced in press releases); indicates spend pressure linked to reducing intrusion risk
- 23% of organizations reported their breach involved privileged access misuse in 2024 (Verizon DBIR 2024 privileged access findings); indicates insider-like privilege misuse vector
- 24% of organizations reported that attackers remained undetected for more than 6 months in 2023 (IBM 2023); indicates long dwell periods used in espionage
- 52% of organizations reported they had no endpoint security solution covering all systems (Check Point 2024 survey); indicates coverage gaps that attackers can exploit for persistence
- $10.5 billion the estimated cost of cybercrime to the global economy in 2020 (McAfee/CSIS, updated estimates); provides a baseline trend for the economics enabling espionage
- 1,009 data breaches were reported in 2023 in the United States (US focus)
- 58% of organizations reported that detecting an intrusion took days or more (2023 survey)
- 66% of organizations said they used threat intelligence to support incident response (2023 survey)
- 45% of organizations reported they had insufficient logging to detect attacks (2023 survey)
- 67% of organizations indicated they were impacted by supply chain or third-party compromise (2023 threat report)
- 19% of intrusion reports cited use of stolen credentials for lateral movement (2023 threat report)
- 27% of organizations reported they were targeted with fileless techniques (2023 threat report)
- 34% of organizations reported that attackers used social engineering to gain initial access in 2023
In 2023, breaches and long undetected intrusions fueled rising cybercrime costs, with credential abuse, malware, and third parties driving espionage risk.
Related reading
Industry Trends
Industry Trends Interpretation
More related reading
Performance Metrics
Performance Metrics Interpretation
Cost Analysis
Cost Analysis Interpretation
More related reading
Threat Incidents
Threat Incidents Interpretation
More related reading
Defender Impact
Defender Impact Interpretation
Nation State Activity
Nation State Activity Interpretation
More related reading
Attack Vectors
Attack Vectors Interpretation
How We Rate Confidence
Every statistic is queried across four AI models (ChatGPT, Claude, Gemini, Perplexity). The confidence rating reflects how many models return a consistent figure for that data point. Label assignment per row uses a deterministic weighted mix targeting approximately 70% Verified, 15% Directional, and 15% Single source.
Only one AI model returns this statistic from its training data. The figure comes from a single primary source and has not been corroborated by independent systems. Use with caution; cross-reference before citing.
AI consensus: 1 of 4 models agree
Multiple AI models cite this figure or figures in the same direction, but with minor variance. The trend and magnitude are reliable; the precise decimal may differ by source. Suitable for directional analysis.
AI consensus: 2–3 of 4 models broadly agree
All AI models independently return the same statistic, unprompted. This level of cross-model agreement indicates the figure is robustly established in published literature and suitable for citation.
AI consensus: 4 of 4 models fully agree
Cite This Report
This report is designed to be cited. We maintain stable URLs and versioned verification dates. Copy the format appropriate for your publication below.
Rachel Svensson. (2026, February 13). Cyber Espionage Statistics. Gitnux. https://gitnux.org/cyber-espionage-statistics
Rachel Svensson. "Cyber Espionage Statistics." Gitnux, 13 Feb 2026, https://gitnux.org/cyber-espionage-statistics.
Rachel Svensson. 2026. "Cyber Espionage Statistics." Gitnux. https://gitnux.org/cyber-espionage-statistics.
References
- 1cisa.gov/sites/default/files/2024-03/CISA_DHS_Federal_Data_Breach_Analysis_2023.pdf
- 6cisa.gov/publication/report-2023-cybersecurity-statistics
- 7cisa.gov/known-exploited-vulnerabilities-catalog
- 2verizon.com/business/resources/reports/dbir/2024/
- 8verizon.com/business/resources/reports/dbir/
- 11verizon.com/business/resources/reports/dbir/2023/
- 3gartner.com/en/newsroom/press-releases/2023-10-18-gartner-forecasts-worldwide-end-user-spending-on-security-and-risk-management-to-total-2024-2049-billion
- 4gartner.com/en/newsroom/press-releases/2024-10-17-gartner-forecasts-worldwide-end-user-spending-on-security-and-risk-management-to-total-2030-2
- 5enisa.europa.eu/publications/enisa-threat-landscape-2023
- 9ibm.com/reports/data-breach
- 17ibm.com/reports
- 10checkpoint.com/resources/reports/2024-global-cyber-security-report/
- 12cloud.google.com/blog/topics/threat-intelligence/google-secure-threat-report
- 13mcafee.com/enterprise/en-us/security-awareness/resources/reports/cost-of-cybercrime.html
- 14privacyrights.org/data-breach
- 15crowdstrike.com/resources/reports/
- 16recordedfuture.com/resources/reports
- 18isc2.org/Research/Workforce-Study
- 19nist.gov/cyberframework
- 20microsoft.com/security/blog/
- 21trendmicro.com/en_us/research.html
- 22elastic.co/security-labs
- 23incibe.es/en/
- 24zscaler.com/resources
- 25blackberry.com/us/en/
- 26cybereason.com/resources
- 27trustwave.com/en-us/resources







