G DATA CyberDefense AG | Press Center
  • Press releases
    • Press Releases
  • Media
    • Logo
  • Contact
Go
  •  0
    • 0 Files in Lightbox
  • EN
    • Deutsch
    • English
    • Nederland
G DATA Presse Center

Terms of use

Welcome to the G DATA CyberDefense newsroom.
We look forward to supporting you with your reporting and are always at your disposal for questions and comments.

Please mind our terms of use.

In summary, it is about the following: We ask you primarily to observe copyright and usage rights and not to use the content available in the newsroom for advertising purposes. If you want to use content from the newsroom for purposes other than non-advertising, journalistic purposes, please contact us at presse@gdata.de.

A service for publicists

The content available here is made available to you by G DATA Cyberdefense AG, Königsallee 178, D-44799 Bochum for journalists and other media professionals.

In the G DATA CyberDefense newsroom you have access to texts, images, sound and film material (content). By using the newsroom, you assure that you will use the content and materials offered exclusively for the purpose of your journalistic work. The content provided is free to use.

Right of Use and Purpose
Any further use for commercial purposes of any kind or use in particular for advertising purposes without express permission is prohibited.

Content may be edited and changed as long as it remains clearly recognizable and no changes are made to the content that might favor a different meaning than that originally intended. The content may not be reproduced in a meaningless context.

The content may not be used in an objectionable or illegal context.

Copyright and Privacy Rights and Legal Notice

All content and the design itself are protected by copyright, usage and personality rights, registered trademark rights and other laws related to intellectual property rights.

All content provided in the newsroom is owned by G DATA CyberDefense or external owners who provide content and are named in the newsroom. When using images, films or other illustrations, please cite the specified source.

Provision of Service and Content

Content may contain links to other websites. We have no control over any linked content and are not responsible for their content or for any loss or damage which may arise from your use of any such link.

Registration for press distribution lists

Information that you provide as part of the inclusion in the press mailing list must be based on correct and up-to-date data, correspond to the truth and be complete. If your data or main topics change, you can simply send us an e-mail to presse@gdata.de.

We reserve the right, at our sole discretion, to refuse to be included in the press mailing list; we are not obliged to give reasons.

Specimen copy

If you have used the content provided for a publication, we would be pleased if you emailed us a link to presse@gdata.de or sent a specimen copy free of charge to the postal address (G DATA Cyberdefense AG, Königsallee 178, D- 44799 Bochum).

  • Press releases /
  • Press Releases
  • Alle
  • Text
  • Images
  • Documents
01.02.2022 | 1 Image 1 Document

G DATA threat report: cyber attacks increase by 25 percent

Cyber defence experts identify a total of more than 23 million different malware samples for 2021
G DATA Security Evangelist Tim Berghoff
G DATA Security Evangelist Tim Berghoff © G DATA CyberDefense

Tim Berghoff is Security Evangelist at G DATA CyberDefense AG. In his position at G DATA, he forms the interface between technical complexity and the user. He is responsible for clear communication of G DATA to the security community, press, dealers, resellers and end customers and he speaks frequently at national and international events. Tim Berghoff has worked at G DATA since 2009, first in support for enterprise customers, later in consulting for international B2B distributors, partners and end customers.

This press release has:

The current G DATA threat report again records a renewed strong increase in averted attack attempts on companies and private users. From the third to the fourth quarter of 2021, the number of attempted attacks increased by 25 percent. The return of Emotet and major security vulnerabilities in internet-facing systems services are just the tip of the iceberg.

Press release Plain text

The number of averted cyber attacks rose sharply again towards the end of 2021. Cyber defence experts at G DATA recorded an increase of more than 25 percent for the fourth quarter of 2021 compared to the third quarter. Private users were increasingly the focus of cyber criminals here. The number of averted attacks rose by 29 percent, while the increase for business customers was only 15 percent. One explanation for this is that attackers traditionally use promotional days, such as Black Friday and the pre-Christmas period, specifically to invite consumers to visit websites using fake offers.

“The increase at the end of the year comes as no surprise,” says Tim Berghoff, Security Evangelist at G DATA CyberDefense. “In particular, the return of Emotet is a clear warning signal that cyber criminals will be increasing their attack efforts again in the future. In addition, there are critical security vulnerabilities such as Hafnium or Log4Shell, which act as an invitation for attackers. This is where companies are called on to audit their systems and make them crisis-proof.”

Emotet: there's life in the old dog yet

After a coordinated takedown in January 2021, Emotet was back again in November 2021. An analysis by G DATA identified more new variants of the malware for the first time. In recent years, Emotet had earned a reputation as one of the most dangerous malwares in existence because it is specifically used as a bridgehead for cyber attacks on companies of all sizes. In the past, an initial infection with the malware was often followed by an attempt to extort money from previously compromised companies through the use of an encryption Trojan. A look at the Malware Top 10 shows how great the danger is. Although Emotet was in fact only active for three months of the year (January, November and December), the malware already holds a top position in the ranking.

Multiple threats every second

However, the following figure shows how great the danger of cyber attacks still is: security experts identified more than 23.7 million different malware samples in 2021. Compared to 2020, this is an increase of over 47 percent, which shows that cyber criminals are continuing to keep up the pace. They have been publishing almost 65,000 new variants of their malware every day - that's 45 new attack vectors per minute - in the hope that antivirus solutions will not detect the “disguised” attackers and will allow them to infiltrate the PC or laptop.

Multiple reasons for the decline in averted attack attempts

Following massive growth rates during the first year of coronavirus, the number of averted attack attempts declined significantly year-on-year. Overall, the cyber defence experts at G DATA recorded 65.3 percent fewer averted cyber attacks in 2021 than in 2020. In the case of private users, attack attempts were reduced by 69 percent, and by 39.1 percent in the case of corporate customers. The reasons for this significant decline are complex. On the one hand, attackers have refined their methods and attacked companies via unsecured remote access or vulnerabilities in public-facing services using attacks such as Log4Shell. But the return of many employees to the office after working from home, as well as the temporary discontinuation of Emotet, have also led to a decline.

Malware Top 10 - old acquaintances and new threats

The Malware Top 10 has changed considerably compared to 2020. On the one hand, there are many new malware families - a total of six of the ten most common malware strains are new. On the other, many different types of malware are represented in this ranking. Until recently, remote access Trojans have always made up a large part of the most frequent types of attack. One explanation for the ranking is that attackers are combining different types of malware with each other to increase profit. For example, they use Emotet as a malware distributor for the initial infection, derive data from the company with an information stealer such as Dridex, and then encrypt the systems with ransomware such as Shade.

The Malware Top 10 at a glance:

 

Position

Name

Proportion in percent

Type

1 (9)

Dridex

26.3

Information Stealer

2 (1)

Emotet

14.1

Malware Distributor

3 (-)

Tofsee

11.0

Bot

4 (-)

Bodelph

6.3

Backdoor

5 (6)

Trickbot

6.0

Malware Distributor

6 (-)

Bladabindi

5.1

Remote Access Trojan

7 (-)

Shade

5.1

Ransomware

8 (-)

BlackShades

5.0

Remote Access Trojan

9 (7)

AgentTesla

4.6

Information Stealer

10 (-)

Pistolar

4.3

Dropper

Previous year’s position in brackets

“The return of Emotet and vulnerabilities in systems accessible from the Internet are just two of the myriad challenges companies will have to deal with this year,” says Tim Berghoff. “Managers must face reality and make provisions for an IT emergency - just as they must have contingency plans for a fire. The probability of falling victim to a cyber attack is definitely higher than a fire in the office. And those who prepare for it are also able to act in a worst-case scenario and are back in action again more quickly.”

Print page Send link
G DATA CyberDefense
With holistic cyber defence services, G DATA CyberDefense makes you defensible against cybercrime. The renowned IT security company protects with AI technologies, endpoint protection, security monitoring and offers penetration tests, incident response and awareness training in order to secure companies in the best possible way.

G DATA CyberDefense AG supports its customers in every security situation. From the headquarters in Bochum, more than 550 employees ensure the digital security of companies, critical infrastructures such as hospitals or airports as well as millions of private users. With almost 40 years of expertise in malware analysis, G DATA has become a top player in the cybersecurity world and conducts research and software development exclusively in Germany. This also applies to service and support, which is available around the clock for customers all over the world. G DATA security solutions are available in more than 90 countries and have received numerous awards from independent test institutes.

 

All contents of this press release as .zip:

Direct download

Release text (5054 Characters)

Plain text Copy release text

Images (1)

G DATA Security Evangelist Tim Berghoff
G DATA Security Evangelist Tim Berghoff
5 978 x 3 985 © G DATA CyberDefense
File size: 6,8 MB | .jpg
| | All sizes
G DATA Security Evangelist Tim Berghoff
G DATA Security Evangelist Tim Berghoff

Tim Berghoff is Security Evangelist at G DATA CyberDefense AG. In his position at G DATA, he forms the interface between technical complexity and the user. He is responsible for clear communication of G DATA to the security community, press, dealers, resellers and end customers and he speaks frequently at national and international events. Tim Berghoff has worked at G DATA since 2009, first in support for enterprise customers, later in consulting for international B2B distributors, partners and end customers.

© G DATA CyberDefense

Documents (1)

  • G DATA Threat Analysis 2021
    .pdf | 657,8 KB © G DATA CyberDefense

Related

  • 05.09.2022
    G DATA threat report: Significant increase in Linux ransomware
  • 07.02.2022
    Safer Internet Day 2022: Parents, protect your children online!

Contact

(3) Stefan Karpenstein
Stefan Karpenstein
Public Relations Manager

+49 234 9762 - 517
stefan.karpenstein@gdata.de

G DATA Security Evangelist Tim Berghoff

G DATA Security Evangelist Tim Berghoff (. jpg )

Tim Berghoff is Security Evangelist at G DATA CyberDefense AG. In his position at G DATA, he forms the interface between technical complexity and the user. He is responsible for clear communication of G DATA to the security community, press, dealers, resellers and end customers and he speaks frequently at national and international events. Tim Berghoff has worked at G DATA since 2009, first in support for enterprise customers, later in consulting for international B2B distributors, partners and end customers.

© G DATA CyberDefense
Measures Size
5978 x 3985 6,8 MB
1200 x 800 195 KB
600 x 400 69,6 KB
x Loading
Direct download
Save to lightbox
G DATA Threat Analysis 2021

G DATA Threat Analysis 2021

© G DATA CyberDefense
.pdf 657,8 KB
Direct Download
Save to Lightbox
SIGN UP
If you would like to receive our latest press releases automatically, just sign up for our mailing list here:

Mailing list

GTC
Privacy Policy
Imprint
Press contact
Vera Haake
Pressesprecherin/ Spokesperson

+49 234 9762 - 376
vera.haake@gdata.de