Key Takeaways
- 70% of organizations use AI for hacker threat detection in 2023, up from 37% in 2022, per Gartner
- MFA adoption reached 76% post-hacker incidents, reducing risk 99%, per Microsoft
- Zero-trust implementations grew 50% in 2023 to counter hackers, per Forrester
- Average cost of a data breach caused by hackers was $4.45 million in 2023, up 15% YoY, per IBM
- Global cybercrime costs from hackers projected to reach $10.5 trillion annually by 2025, per Cybersecurity Ventures
- Ransomware hacker extortions cost $20 billion in 2023, per Chainalysis
- In 2023, there were 2,365 publicly disclosed data breaches worldwide, a 20% increase from 2022, with hackers responsible for 78% of these incidents according to the Identity Theft Resource Center
- The average time to identify a cyber breach caused by hackers dropped to 204 days in 2023 from 277 days in 2022, per IBM's Cost of a Data Breach Report
- Verizon's 2023 Data Breach Investigations Report found that 74% of breaches involved a human element, often exploited by hackers via social engineering
- Phishing accounted for 36% of hacker breaches in 2023, per Verizon DBIR
- Ransomware was the top hacker attack type, comprising 24% of incidents in 2023, per IBM Cost of Breach Report
- DDoS attacks by hackers made up 15% of all cyber events in 2023, with 17.4 million incidents, per Cloudflare
- 47% of US hacker victims were healthcare in 2023, with 683 breaches, per HHS
- Financial institutions comprised 15% of hacker targets, 2,200 incidents in 2023, per FS-ISAC
- SMEs (under 1,000 employees) were 43% of hacker breach victims in 2023, per Verizon DBIR
AI and security automation are rapidly improving hacker detection, but human driven attacks and costs keep soaring.
Related reading
Defensive Measures
Defensive Measures Interpretation
More related reading
Economic Costs
Economic Costs Interpretation
More related reading
Prevalence and Frequency
Prevalence and Frequency Interpretation
More related reading
Types of Attacks
Types of Attacks Interpretation
More related reading
Victim Demographics
Victim Demographics Interpretation
How We Rate Confidence
Every statistic is queried across four AI models (ChatGPT, Claude, Gemini, Perplexity). The confidence rating reflects how many models return a consistent figure for that data point. Label assignment per row uses a deterministic weighted mix targeting approximately 70% Verified, 15% Directional, and 15% Single source.
Only one AI model returns this statistic from its training data. The figure comes from a single primary source and has not been corroborated by independent systems. Use with caution; cross-reference before citing.
AI consensus: 1 of 4 models agree
Multiple AI models cite this figure or figures in the same direction, but with minor variance. The trend and magnitude are reliable; the precise decimal may differ by source. Suitable for directional analysis.
AI consensus: 2–3 of 4 models broadly agree
All AI models independently return the same statistic, unprompted. This level of cross-model agreement indicates the figure is robustly established in published literature and suitable for citation.
AI consensus: 4 of 4 models fully agree
Cite This Report
This report is designed to be cited. We maintain stable URLs and versioned verification dates. Copy the format appropriate for your publication below.
Timothy Grant. (2026, February 13). Hacker Statistics. Gitnux. https://gitnux.org/hacker-statistics
Timothy Grant. "Hacker Statistics." Gitnux, 13 Feb 2026, https://gitnux.org/hacker-statistics.
Timothy Grant. 2026. "Hacker Statistics." Gitnux. https://gitnux.org/hacker-statistics.
Sources & References
- Reference 1IDTHEFTCENTERidtheftcenter.org
idtheftcenter.org
- Reference 2IBMibm.com
ibm.com
- Reference 3VERIZONverizon.com
verizon.com
- Reference 4SOPHOSsophos.com
sophos.com
- Reference 5BLOGblog.cloudflare.com
blog.cloudflare.com
- Reference 6RESEARCHresearch.checkpoint.com
research.checkpoint.com
- Reference 7ACCENTUREaccenture.com
accenture.com
- Reference 8DOCSdocs.apwg.org
docs.apwg.org
- Reference 9MANDIANTmandiant.com
mandiant.com
- Reference 10FORTINETfortinet.com
fortinet.com
- Reference 11CHAINALYSISchainalysis.com
chainalysis.com
- Reference 12MICROSOFTmicrosoft.com
microsoft.com
- Reference 13HUAWEIhuawei.com
huawei.com
- Reference 14MALWAREBYTESmalwarebytes.com
malwarebytes.com
- Reference 15AKAMAIakamai.com
akamai.com
- Reference 16OCRPORTALocrportal.hhs.gov
ocrportal.hhs.gov
- Reference 17FSISACfsisac.com
fsisac.com
- Reference 18DEEPTRACELABSdeeptracelabs.com
deeptracelabs.com
- Reference 19SECURELISTsecurelist.com
securelist.com
- Reference 20PROOFPOINTproofpoint.com
proofpoint.com
- Reference 21PALOALTONETWORKSpaloaltonetworks.com
paloaltonetworks.com
- Reference 22PONEMONponemon.org
ponemon.org
- Reference 23DARKTRACEdarktrace.com
darktrace.com
- Reference 24BLOGblog.chainalysis.com
blog.chainalysis.com
- Reference 25CLOUDcloud.google.com
cloud.google.com
- Reference 26ZSCALERzscaler.com
zscaler.com
- Reference 27CISCOcisco.com
cisco.com
- Reference 28SONICWALLsonicwall.com
sonicwall.com
- Reference 29IC3ic3.gov
ic3.gov
- Reference 30OWASPowasp.org
owasp.org
- Reference 31CROWDSTRIKEcrowdstrike.com
crowdstrike.com
- Reference 32MSRCmsrc.microsoft.com
msrc.microsoft.com
- Reference 33SALTsalt.security
salt.security
- Reference 34ATTACKattack.mitre.org
attack.mitre.org
- Reference 35EFFICIENTIPefficientip.com
efficientip.com
- Reference 36DRAGOSdragos.com
dragos.com
- Reference 37CYBERSECURITYVENTUREScybersecurityventures.com
cybersecurityventures.com
- Reference 38NBRnbr.org
nbr.org
- Reference 39HISCOXGROUPhiscoxgroup.com
hiscoxgroup.com
- Reference 40MCKINSEYmckinsey.com
mckinsey.com
- Reference 41CSIScsis.org
csis.org
- Reference 42GARTNERgartner.com
gartner.com
- Reference 43NEWSnews.drweb.com
news.drweb.com
- Reference 44KNOWBE4knowbe4.com
knowbe4.com
- Reference 45EDUCAUSEeducause.edu
educause.edu
- Reference 46HISCOXhiscox.co.uk
hiscox.co.uk
- Reference 47CISAcisa.gov
cisa.gov
- Reference 48TENABLEtenable.com
tenable.com
- Reference 49GEMINIADVISORYgeminiadvisory.io
geminiadvisory.io
- Reference 50MULTISTATEmultistate.us
multistate.us
- Reference 51CYBEREASONcybereason.com
cybereason.com
- Reference 52ISC2isc2.org
isc2.org
- Reference 53FORRESTERforrester.com
forrester.com
- Reference 54SPLUNKsplunk.com
splunk.com
- Reference 55VEEAMveeam.com
veeam.com
- Reference 56SANSsans.org
sans.org
- Reference 57EXABEAMexabeam.com
exabeam.com
- Reference 58CYBERARKcyberark.com
cyberark.com
- Reference 59BLOGblog.qualys.com
blog.qualys.com
- Reference 60NISTnist.gov
nist.gov
- Reference 61RECORDEDFUTURErecordedfuture.com
recordedfuture.com
- Reference 62BITSIGHTbitsight.com
bitsight.com







