main logo icon

Published on

April 25, 2026

|

24 min read

Malware Attack Statistics 2026: The Verified Numbers

Verified 2025-2026 malware statistics from AV-TEST, Mandiant M-Trends, IBM X-Force, CrowdStrike, Microsoft, Sophos, ESET, SonicWall, Verizon DBIR, ENISA, Coveware, Recorded Future, NCC Group, Cisco Talos, FBI IC3, CISA, abuse.ch, and Anthropic.

Arafat Afzalzada

Arafat Afzalzada

Founder

Network SecurityWeb App SecuritySocial EngineeringAdvisories

Summarize with AI

ChatGPTPerplexityGeminiGrokClaude

TL;DR

AV-TEST's malware database surpassed 1.56 billion known samples in March 2025, with daily new-sample additions running between 450,000 and 560,000. CrowdStrike measured 79% of all 2024 attack detections as malware-free, climbing to 81% of intrusions in H1 2025 as adversaries pivoted to valid-credential abuse and living-off-the-land techniques. Sophos found compromised credentials behind 41% of incident-response cases and exploited vulnerabilities in 32% of ransomware attacks. Mandiant's 2024 IR data put global median dwell time at 11 days, with backdoors (36%) ahead of downloaders (11%) and ransomware (10%) in the malware-role mix. IBM X-Force ranked Lumma, RisePro, Vidar, Stealc, and RedLine as the top five infostealers by dark-web listing volume, with the top-five group alone producing more than 8 million advertisements in 2024. Recorded Future indexed 1.95 billion malware-sourced credentials in 2025, of which 276 million carried active session cookies that bypass MFA on import. NCC Group counted a record 7,874 ransomware victims in 2025 (+50% YoY), with Qilin (1,022 attacks, 13%), Akira, and Cl0p leading. Coveware's Q4 2025 ransom-payment rate fell to 20% (a historic low) while the median payment jumped 132% to US$325,000. The FBI IC3 logged US$16.6B in total 2024 cybercrime losses, +33% YoY. This post assembles 110+ numeric claims, every one cited to a named primary publisher, in a single 2026 reference page for CISOs, security buyers, and journalists.

The malware threat surface in 2026 is a paradox. AV-TEST has indexed more than 1.56 billion unique malware samples and registers another 450,000 to 560,000 new ones every single day. Yet CrowdStrike's 2025 Global Threat Report found 79% of attack detections in 2024 involved no malware at all, climbing to 81% of interactive intrusions in the first half of 2025. Adversaries are signing in with stolen credentials, abusing valid sessions, and living off the land while vendor labs collect record sample counts.

Three forces drive 2026 malware activity. A record 7,874 ransomware victims tracked in 2025 (+50% year over year), per NCC Group. 1.95 billion stolen credentials indexed from infostealer logs in 2025, with 276 million carrying live session cookies that defeat MFA on import, per Recorded Future. And the first publicly disclosed state-sponsored AI-orchestrated cyber-espionage campaign, in which a Chinese-aligned group used Claude Code to execute 80% to 90% of tactical operations against roughly 30 global targets, per Anthropic, November 2025. The headline numbers for CISOs, security buyers, and journalists are below.

This post is the Stingrai research team's canonical 2026 reference for malware activity. It assembles 110+ numeric claims from 26 named primary publishers, including AV-TEST, Mandiant M-Trends, IBM X-Force, CrowdStrike, Microsoft Digital Defense, Sophos Active Adversary, ESET, SonicWall, Verizon DBIR, ENISA, Coveware, Recorded Future, NCC Group, Cisco Talos, FBI IC3, CISA KEV, abuse.ch, and Anthropic. Lead data is full-year 2025 telemetry, the freshest available; primary publishers have not yet released full-year 2026 reports as of April 2026. Every stat carries its source, year, and methodology window so any claim can be audited inline.

TL;DR: 12 labeled key stats

Key takeaways

  • The malware library is now an artifact of automation, not a count of campaigns. AV-TEST's 1.56 billion sample tally and 450,000-to-560,000 daily new-sample rate reflect packers, mutators, and AI-assisted variant generation, not 1.56 billion distinct attack campaigns. CrowdStrike's 79% malware-free intrusion rate is the more useful operational signal.

  • Compromised credentials are now the canonical opening move. Sophos clocked compromised credentials in 41% of IR cases (the second consecutive top-spot finish), Verizon found credential abuse in 22% of breaches, and 30% of infostealer-compromised systems were enterprise-licensed devices, per the Verizon 2025 DBIR. Recorded Future indexed 1.95 billion malware-sourced credentials in 2025 alone.

  • Infostealers are the load-bearing prerequisite for ransomware. The Verizon 2025 DBIR found 54% of ransomware-victim domains had appeared in infostealer logs before the attack, and 40% had corporate email addresses exposed. The chain is mostly stealer log to access broker to ransomware operator now, not phishing email to immediate ransomware.

  • Ransomware volume is up but ransom-payment rates have collapsed. NCC Group counted a record 7,874 ransomware victims in 2025 (+50% YoY) while Coveware's Q4 2025 payment rate fell to 20%, a level the industry has never seen. The signal: defenders are getting marginally better at restoration and refusal, but the leak-site corpus keeps growing because operators are pricing in walk-aways.

  • AI is now both a defender's tool and a documented attack medium. Microsoft's 2025 Digital Defense Report found 1 in 6 IBM-tracked breaches involved attackers using AI (37% for phishing, 35% for deepfakes per IBM's 2025 Cost of a Data Breach Report). Anthropic disclosed an autonomous AI-orchestrated espionage campaign in November 2025 in which a state-sponsored group used Claude Code to execute 80% to 90% of tactical operations against roughly 30 global targets.

Methodology

Sources used: AV-TEST Institute (live malware-sample counter and AV-ATLAS database, accessed April 2026); Mandiant / Google Cloud (M-Trends 2025, IR caseload calendar 2024, published April 2025); IBM X-Force (Threat Intelligence Index 2025, IR + telemetry calendar 2024, published April 2025); IBM Cost of a Data Breach Report 2025 (Ponemon survey of 600 breached organizations, March 2024 to February 2025, published August 2025); CrowdStrike (Global Threat Report 2025 published February 2025; Threat Hunting Report 2025 published August 2025); Microsoft (Digital Defense Report 2025, telemetry through H1 2025, published October 2025); Sophos (State of Ransomware 2025 published June 2025; Active Adversary Report 2025 "It takes two" published April 2025, 400+ IR / MDR cases calendar 2024); ESET (Threat Report H1 2025 published June 2025, LiveGrid telemetry Dec 2024 to May 2025); SonicWall (2025 Cyber Threat Report, Capture Labs telemetry calendar 2024, published February 2025); Verizon Business (2025 DBIR covering 22,052 incidents and 12,195 confirmed breaches Nov 2023 to Oct 2024, published April 2025); ENISA (Threat Landscape 2025, 4,875 EU incidents Jul 2024 to Jun 2025, published October 2025); Coveware (Q4 2025 quarterly ransomware report, IR caseload Q4 2025, published January 2026); Recorded Future (2025 Identity Threat Landscape Report, full-year 2025 stealer-log indexing, published March 2026); NCC Group (Annual Cyber Threat Intelligence 2025, leak-site monitoring + telemetry calendar 2025, published January 2026); Cisco Talos (2025 Year in Review and IR Trends quarterly posts, calendar 2025, published April 2026); FBI Internet Crime Complaint Center (2024 Internet Crime Report, victim complaints calendar 2024, published April 2025); CISA (Known Exploited Vulnerabilities catalog updates calendar 2025); abuse.ch URLhaus and MalwareBazaar (live community trackers); and Anthropic (Threat Intelligence Report August 2025 and "Disrupting the first reported AI-orchestrated cyber espionage campaign" published November 2025).

Date cutoff: April 25, 2026. Statistics are reported with their primary publisher's data window. We lead with full-year 2024 or 2025 figures wherever a primary source has released them. Statistics that could not be reached on at least one verification pass against a named primary source were dropped rather than estimated. Vendor blogs and aggregators that restate other publishers' numbers without adding methodology were not used as primary sources.

Chart Malware Volume

Figure 1: AV-TEST cumulative malware sample count, end-of-year, 2020 through March 2025. The library crossed 1.56 billion samples in March 2025. Source: AV-TEST Malware Statistics & Trends Report.

How big is the malware problem in 2026?

Three datasets anchor the answer.

Sample volume (AV-TEST and abuse.ch)

AV-TEST's live malware tracker shows the cumulative known-sample count at over 1.56 billion as of March 2025, with the institute registering between 450,000 and 560,000 new malware and potentially-unwanted-application samples per day. The Windows-only AV-ATLAS database grew 8% year over year between 2024 and 2025, from 920 million to 995 million Windows samples.

Volume of unique samples is a poor proxy for attack volume because most of those samples are automated variants, packers, and re-obfuscations of a small set of operational families. The community-run abuse.ch URLhaus project tracks roughly 3.65 million malicious URLs as of April 2026, a more useful indicator of distinct distribution endpoints than raw sample counts.

Malware-free intrusions (CrowdStrike)

CrowdStrike's 2025 Global Threat Report, released in February 2025, found 79% of all attack detections in 2024 were malware-free. That share has climbed steadily from 40% in 2019. The 2025 Threat Hunting Report, released in August 2025 and based on H1 2025 OverWatch hunt telemetry, put the malware-free share of interactive intrusions at 81%. eCrime activity made up 73% of all interactive intrusions in the same period.

The same CrowdStrike report quantified the speed of those intrusions: average eCrime breakout time (the gap between initial endpoint compromise and the first lateral movement) dropped to 48 minutes in 2024, with the fastest recorded breakout at 51 seconds. Interactive intrusion campaigns grew 35% YoY in 2024.

Caseload composition (Mandiant)

Mandiant's M-Trends 2025, published April 2025, reports global median dwell time of 11 days for the 2024 IR caseload, up from 10 days in 2023. The asymmetry of how breaches are detected is the most actionable number in the report:

Detection path

2024 median dwell time

Source

External notification

26 days

Mandiant M-Trends 2025

Internal discovery

10 days

Mandiant M-Trends 2025

Adversary notification (typically ransom note)

5 days

Mandiant M-Trends 2025

JAPAC region

9 days (fastest)

Mandiant M-Trends 2025

EMEA region

22 days (slowest)

Mandiant M-Trends 2025

Mandiant's malware-role taxonomy gives a cleaner read on what families IR teams are actually pulling out of compromised environments than market-share guesses.

Chart Malware Roles

Figure 2: Share of malware families observed in Mandiant 2024 IR investigations by role. Backdoors dominate at 36%, ahead of downloaders (11%), ransomware (10%), droppers (10%), and credential stealers (9%). Source: Mandiant M-Trends 2025.

Malware role

2024 share of Mandiant-observed malware families

Source

Backdoors

36%

Mandiant M-Trends 2025

Downloaders

11%

Mandiant M-Trends 2025

Ransomware

10%

Mandiant M-Trends 2025

Droppers

10%

Mandiant M-Trends 2025

Credential stealers

9%

Mandiant M-Trends 2025

Other

24%

Mandiant M-Trends 2025

Ransomware's 10% share in 2025 is down from 14% in 2024, a small movement that aligns with Cisco Talos's 2025 Year in Review finding that, for the first time in over a year, commodity malware narrowly surpassed ransomware as the top threat in Cisco Talos Incident Response engagements. Talos credits the closure of several ransomware groups, both voluntary and law-enforcement-driven, for that flip.

BEACON, the implant from Cobalt Strike, continues to be the single most-frequently-observed malware family in Mandiant cases at 5.4% of all 2024 intrusions. That figure is down sharply from 28% in 2021, an erosion Mandiant attributes to Operation MORPHEUS, the 2024 multi-vendor takedown of cracked Cobalt Strike infrastructure.

Initial access vectors

Initial access is where defenders have the most leverage. The 2024 and 2025 publications converge on a small handful of vectors and disagree mostly on the exact percentage split.

Publisher

Top initial access vector(s), most-recent annual report

Share

Mandiant M-Trends 2025 (calendar 2024 IR)

Exploits

33%

Mandiant M-Trends 2025 (calendar 2024 IR)

Stolen credentials

16%

IBM X-Force Threat Intelligence Index 2025 (calendar 2024 IR)

Exploit of public-facing app (tied)

30%

IBM X-Force Threat Intelligence Index 2025 (calendar 2024 IR)

Valid account credentials (tied)

30%

Sophos Active Adversary Report 2025 (calendar 2024 IR / MDR)

Compromised credentials

41%

Sophos Active Adversary Report 2025 (calendar 2024 IR / MDR)

Exploited vulnerabilities

21.79%

Sophos Active Adversary Report 2025 (calendar 2024 IR / MDR)

Brute force

21.07%

Verizon 2025 DBIR (Nov 2023 to Oct 2024 breaches)

Compromised credentials

22%

Verizon 2025 DBIR (Nov 2023 to Oct 2024 breaches)

Vulnerability exploitation

20%

ENISA Threat Landscape 2025 (Jul 2024 to Jun 2025 EU incidents)

Phishing

60%

ENISA Threat Landscape 2025 (Jul 2024 to Jun 2025 EU incidents)

Vulnerability exploitation

21%

Cisco Talos IR Q1 2025

Phishing

50%

Cisco Talos IR Q2 2025

Public-facing app exploitation

60%

Cisco Talos IR Q2 2025

Phishing

33%

The numbers are not directly comparable because the corpora are different (Mandiant IR vs IBM IR vs DBIR breach corpus vs ENISA EU-incident logs vs Sophos IR / MDR), and "vector" is defined slightly differently in each. The shared signal: exploits, valid credentials, and phishing each carry double-digit share in every dataset, with credentials and exploits tied or near-tied at the top in three of the five major reports.

Sophos's State of Ransomware 2025, based on a Vanson Bourne survey of 3,400 IT and security leaders across 17 countries, isolates the ransomware-specific causation chain. For the third consecutive year, exploited vulnerabilities are the most common root cause of ransomware incidents at 32%, followed by compromised credentials (down from 29% in 2024 to 23% in 2025), malicious email at 19%, and phishing at 18%.

Living-off-the-land tooling

The 79%-malware-free CrowdStrike number gets its plumbing from Sophos's Active Adversary Report 2025, which decomposes what attackers run instead of malicious binaries. RDP appeared in 84% of 2024 cases as the most-abused Microsoft tool. Living-off-the-land binary (LOLBin) abuse grew 126% YoY in 2024, total abused-tool count grew 80% YoY, and the residual "other" tooling category grew 28%. cmd.exe took the lead from RDP as the single most-abused LOLBin in the MDR caseload.

Sophos describes a class of "EDR killer" tools circulating in the criminal marketplace: kernel-driver utilities designed to gain privileged access and terminate protected endpoint-security processes so ransomware can deploy unimpeded. Sophos MDR has tied EDR-killer activity to recent ransomware playbooks and to malvertising campaigns associated with DanaBot, Lumma Stealer, and GootLoader (the same campaigns Microsoft and ESET took down jointly in May 2025).

Infostealers: the load-bearing layer

Infostealers are the most operationally important malware category in the 2024 and 2025 data, and they barely show up in vendor marketing. They run in the background, harvest credentials and session cookies, send the loot to a C2 server, and feed an access-broker marketplace that the ransomware operators buy from.

Chart Infostealer Ranking

Figure 3: IBM X-Force's 2024 ranking of the top five infostealers by dark-web listing volume. Together the five families produced more than 8 million advertisements. Source: IBM X-Force Threat Intelligence Index 2025.

Rank

Infostealer

Source

1

Lumma

IBM X-Force Threat Intelligence Index 2025

2

RisePro

IBM X-Force Threat Intelligence Index 2025

3

Vidar

IBM X-Force Threat Intelligence Index 2025

4

Stealc

IBM X-Force Threat Intelligence Index 2025

5

RedLine

IBM X-Force Threat Intelligence Index 2025

IBM's X-Force Threat Intelligence Index 2025 measured an 84% YoY uptick in phishing emails delivering infostealers on a weekly basis, and a 12% rise in infostealer credentials for sale on the dark web. The top-five group together produced more than 8 million dark-web advertisements in 2024.

Lumma Stealer is the canonical recent case study. Microsoft's Digital Defense Report 2025 calls it the most prevalent infostealer in the October 2024 to October 2025 telemetry window. Lumma was disrupted in May 2025 by a coalition of Microsoft Digital Crimes Unit, the US Department of Justice, Europol, ESET, BitSight, Lumen, Cloudflare, CleanDNS, and GMO Registry. ESET's Threat Report H1 2025 records Lumma growing 21% in early 2025 (before the takedown), Danabot up 52% in the same window (also disrupted), and SnakeStealer overtaking Agent Tesla as the most-detected infostealer on ESET telemetry, doubling 111% vs H2 2024.

ClickFix and FakeCaptcha (the social-engineering technique where a fake "verify you are human" page tells the user to paste a hidden PowerShell command into Run dialog) became one of the most active malware delivery vectors in early 2025 per ESET, surging 517% in six months and now accounting for 8% of ESET-blocked attacks. The payload at the end of a ClickFix attack varies (infostealer, ransomware, RAT, nation-state malware), and the technique now targets Windows, Linux, and macOS.

Recorded Future's 2025 Identity Threat Landscape Report puts the infostealer economy in concrete numbers. In 2025, Recorded Future indexed:

Metric

2025 figure

Source

Malware combo-list credential exposures

1.95 billion

Recorded Future Identity Threat Landscape 2025

Database combo-list credential exposures

36 million

Recorded Future Identity Threat Landscape 2025

Credentials with active session cookies (MFA-bypassable on import)

276 million (31% of malware-sourced)

Recorded Future Identity Threat Landscape 2025

Credentials indexed within 1 week of exfiltration

53%

Recorded Future Identity Threat Landscape 2025

Credentials indexed within 24 hours of exfiltration

36.4%

Recorded Future Identity Threat Landscape 2025

Credentials with identifiable auth URLs

7 million

Recorded Future Identity Threat Landscape 2025

Auth URLs tied to authentication systems

63.2%

Recorded Future Identity Threat Landscape 2025

H2 2025 vs H1 2025 credential-exposure growth

+50%

Recorded Future Identity Threat Landscape 2025

Q4 2025 vs Q1 2025 credential-exposure growth

+90%

Recorded Future Identity Threat Landscape 2025

The most operationally important number in that table is 276 million. Active session cookies on import means the attacker imports the cookie into their own browser and lands inside the target's authenticated session without re-authenticating. MFA does not interrupt that path.

Verizon's 2025 DBIR closes the loop. The team found 25% of all tested malware contained credentials harvested from password stores (Apple Keychain, browser stores, Windows Credential Manager, password managers). It also reported that 30% of infostealer-compromised systems were enterprise-licensed devices, that 54% of ransomware-victim domains had appeared in infostealer logs before the ransomware attack, and that 40% of ransomware victims had corporate email addresses exposed in those logs. The chain looks like infostealer to access broker to ransomware operator, in roughly that sequence.

Malware-free intrusions: what the 79% figure actually means

CrowdStrike's headline number is the most-cited malware statistic of 2025, and it is also the most-misread. Malware-free does not mean "no offensive tooling." It means the initial access and lateral movement happened without dropping a malicious binary on disk that an EDR could match against signatures or behavioral rules. Hands-on-keyboard activity, abuse of legitimate remote-access tools, valid-credential reuse, and OS-native administration utilities all count as malware-free.

Chart Malware Free Intrusions

Figure 4: CrowdStrike's malware-free share of attack detections, end of year. The trend shifted sharply between 2022 and 2024 as adversaries pivoted to identity-driven intrusions. H1 2025 figure is from the Threat Hunting Report, which measures malware-free share of interactive intrusions specifically. Sources: CrowdStrike Global Threat Report 2025 and CrowdStrike Threat Hunting Report 2025.

Year

Malware-free share

Notes

2019

40%

CrowdStrike historical baseline

2024

79%

All CrowdStrike-observed detections

H1 2025

81%

CrowdStrike interactive-intrusions only

Two data points from CrowdStrike's 2025 Threat Hunting Report make the operational implication clear:

  • Cloud intrusions surged 136% in H1 2025 vs all of 2024. Misconfigurations, exposed secrets, and trusted federations are the path. Endpoint AV is not in the trust chain.

  • FAMOUS CHOLLIMA, a DPRK-nexus adversary, infiltrated 320+ companies over the past year, +220% YoY. The technique was synthetic identities and AI-generated personas applying to remote engineering jobs at US Fortune 500 firms. No malware was needed to land inside the network. The interview was the intrusion.

The 79%-figure is essentially a verdict on the tradecraft shift: adversaries put more effort into identity, less into custom binaries, because the identity path bypasses the largest single category of detection investment.

Industry impact

IBM X-Force's 2025 Threat Intelligence Index ranks attack share by industry as follows.

Chart Malware Industry Impact

Figure 5: Share of IBM X-Force-observed attacks by industry, 2024. Manufacturing is the most-targeted vertical for the fourth consecutive year. Source: IBM X-Force Threat Intelligence Index 2025.

Industry

2024 IBM X-Force attack share

Source

Manufacturing

26%

IBM X-Force Threat Intelligence Index 2025

Finance and insurance

23%

IBM X-Force Threat Intelligence Index 2025

Energy

10%

IBM X-Force Threat Intelligence Index 2025

Transportation

7%

IBM X-Force Threat Intelligence Index 2025

In manufacturing specifically, IBM found 40% of 2024 attacks involved data theft targeting financial assets and intellectual property, including trade secrets. Verizon's 2025 DBIR corroborates the manufacturing surge: espionage-motivated breaches in the sector jumped from 3% in the prior year to 20% in 2024, and ransomware attacks against manufacturing grew 61%, making it the single most targeted sector globally in the DBIR corpus.

Healthcare presents a different shape. Verizon's 2025 DBIR contained 1,710 healthcare incidents and 1,542 confirmed healthcare breaches. 90% were financially motivated, but 16% had an espionage motive (up from 1% the year before). SonicWall's 2025 Cyber Threat Report recorded 198 million Americans impacted by ransomware in healthcare in 2024 alone, in part driven by the Change Healthcare breach.

Mandiant's M-Trends 2025 ranks the most-targeted industries differently because its caseload is IR-heavy, not breach-corpus-driven. The Mandiant 2024 ranking was financial (17.4%), business and professional services (11.1%), high tech (10.6%), government (9.5%), and healthcare (9.3%).

ENISA's Threat Landscape 2025 is EU-specific. Across the 4,875 EU incidents in the analysis window, the top three ransomware strains deployed against manufacturing were Akira (48.7% of manufacturing-targeted ransomware), Qilin (20.5%), and FOG (10.3%). Phishing was the dominant intrusion vector at 60% of all incidents.

Ransomware: where the malware-free narrative breaks down

Ransomware is the malware story's exception to the malware-free trend. By the time ransomware payloads run, the operator already has hands-on-keyboard control of the environment, but the detonation event itself is still a malicious binary, and that binary is what gets counted in family-share charts.

NCC Group's 2025 Annual Cyber Threat Intelligence Report documented 2025 as a record year:

Metric

2025 figure

Source

Tracked ransomware victims (leak sites + telemetry)

7,874

NCC Group Annual Cyber Threat Intelligence 2025

YoY growth in attack volume

+50%

NCC Group Annual Cyber Threat Intelligence 2025

Most active group: Qilin attacks

1,022 (13%)

NCC Group Annual Cyber Threat Intelligence 2025

Industrials target share

28%

NCC Group Annual Cyber Threat Intelligence 2025

North America regional share

56%

NCC Group Annual Cyber Threat Intelligence 2025

Qilin, Akira, and Cl0p were the top three by attack volume in 2025. Verizon's 2025 DBIR recorded ransomware in 44% of all reviewed breaches, up from 32% in the prior year, and 75% of system-intrusion breaches. The asymmetry by company size is striking: ransomware was present in 39% of large-enterprise breaches but 88% of SMB breaches. Ransomware was the top threat for 92% of industries in the DBIR's industry-vertical analysis. Third-party breaches (where the breach entered via a vendor or service provider) rose to 30% of all cases, double the prior year's share.

Sophos's State of Ransomware 2025 captures ransom payment economics from 3,400 organizations:

Metric

2025 figure

Source

Average recovery cost (excluding ransom)

US$1.53M (-44% YoY)

Sophos State of Ransomware 2025

Share of victims that paid the ransom

49% (down from 56% in 2024)

Sophos State of Ransomware 2025

Share of attacks that resulted in data encryption

50% (down from 70% in 2024)

Sophos State of Ransomware 2025

Median ransom paid, state and local government

US$2.5M

Sophos State of Ransomware 2025

Median ransom paid, healthcare

US$150,000

Sophos State of Ransomware 2025

Average payment vs initial demand

85% of demand

Sophos State of Ransomware 2025

Coveware's Q4 2025 quarterly report tells a sharper story for the most-recent quarter:

Metric

Q4 2025

Source

Median ransom payment

US$325,000 (+132% QoQ)

Coveware Q4 2025

Average ransom payment

US$591,988 (+57% QoQ)

Coveware Q4 2025

Ransom payment rate

20% (historic low)

Coveware Q4 2025

The 20% payment rate is the headline. Coveware's 12-quarter trend shows organizations getting better at restoring operations without paying, and the tail of organizations that do pay is small but expensive (the average is multiples of the median because a few large settlements drag the mean upward).

IBM's Cost of a Data Breach Report 2025, published August 2025 from a Ponemon Institute survey of 600 breached organizations, puts the global average cost of a data breach at US$4.44M (down 9% from US$4.88M in 2024) but the average cost of an extortion or ransomware-specific incident at US$5.08M, with 63% of organizations now refusing to pay ransom demands (up from 59% the prior year). In the United States specifically, the average breach cost rose to US$10.22M, a record high.

Vulnerability exploitation: the CISA KEV signal

CISA's Known Exploited Vulnerabilities (KEV) catalog is the public-sector counterpart to vendor-IR malware reporting. CISA added 245 vulnerabilities to the KEV catalog in 2025, bringing the cumulative total to 1,484. That is more than 30% above the steady pace of 187 (2023) and 185 (2024) annual additions. CISA flagged 24 of the 2025 additions as known to be exploited by ransomware groups, including CVE-2025-5777 (CitrixBleed 2) and a cluster of Oracle E-Business Suite vulnerabilities that CL0P leveraged.

SonicWall's 2025 Cyber Threat Report tracks the speed of weaponization at the network-firewall layer. SonicWall found 75% of exploits occur within four days of public proof-of-concept disclosure, with 61% striking inside 48 hours. Average organizations take between 120 and 150 days to apply a patch, leaving a four-month exposure window in which attackers know the exploit and defenders have not yet closed it.

SonicWall's RTDMI engine identified 210,258 unique never-before-seen malware variants in 2024, an average of more than 630 per day, and recorded an 8% YoY rise in overall malware blocked. North America saw an 8% YoY increase in ransomware; LATAM saw a 259% surge.

Specific corporate cost data: the FBI IC3 baseline

The FBI Internet Crime Complaint Center's 2024 Internet Crime Report, published April 2025, is the largest-corpus public dataset of US victim losses. The 2024 numbers:

Metric

2024 figure

Source

Total reported cybercrime losses

US$16.6B (+33% YoY)

FBI IC3 2024 Internet Crime Report

Complaints filed

859,532

FBI IC3 2024 Internet Crime Report

Cyber-enabled fraud share of complaints

38% (333,981 complaints)

FBI IC3 2024 Internet Crime Report

Cyber-enabled fraud share of losses

83% (US$13.7B)

FBI IC3 2024 Internet Crime Report

Tech support fraud losses

US$1.6B

FBI IC3 2024 Internet Crime Report

Ransomware complaint growth YoY

+9%

FBI IC3 2024 Internet Crime Report

Reported losses from "general malware" category

US$1.3M

FBI IC3 2024 Internet Crime Report

Reported losses from "botnets" category

US$9M

FBI IC3 2024 Internet Crime Report

The "general malware" and "botnet" categories carry suspiciously low totals because the FBI's reporting taxonomy classifies most ransomware, BEC, and infostealer-driven losses under those incident types directly, not under malware-as-a-vector. The US$16.6B headline is the comprehensive number; the US$1.3M malware-line is a residual.

Microsoft daily-telemetry baselines

Microsoft's Digital Defense Report 2025 publishes the only consistently-collected vendor telemetry at internet scale. Microsoft processes more than 100 trillion signals per day, blocks approximately 4.5 million new malware attempts, analyzes 38 million identity-risk detections, and screens 5 billion emails for malware and phishing. The report's H1 2025 finding: identity-based attacks surged 32% YoY, and 97% of identity attacks were password-spray attempts. Microsoft's accompanying announcement puts extortion and ransomware at over half of all observed cyberattacks in the same window.

AI as malware: the new attack surface

The cleanest 2025 data on AI in attack chains comes from IBM's Cost of a Data Breach Report 2025. 1 in 6 IBM-tracked breaches involved attackers using AI, most commonly for phishing (37%) and deepfake impersonation (35%). Shadow AI (the unsanctioned use of AI by employees) was a factor in 20% of breaches, adding US$670,000 to average costs.

Anthropic's August 2025 Threat Intelligence Report and November 2025 incident report on the first AI-orchestrated cyber espionage campaign are the most concrete published evidence of generative-AI-orchestrated malicious activity:

Anthropic-published finding, 2025

Detail

Source

Ransomware-package marketplace pricing

US$400 to US$1,200 per package

Anthropic Threat Intelligence Report August 2025

Chinese state-sponsored AI-orchestrated targets

~30 global targets

Anthropic Disrupting AI Espionage, November 2025

Share of tactical operations executed autonomously by AI

80% to 90%

Anthropic Disrupting AI Espionage, November 2025

North Korean operative use case

Synthetic identities + Claude-assisted technical assessments to land remote roles at US Fortune 500 firms

Anthropic Threat Intelligence Report August 2025

The November 2025 incident is the watershed: a state-sponsored adversary used Claude Code as a multi-agent orchestration platform that ran 80% to 90% of tactical operations independently, with humans reviewing and approving high-stakes decisions only. The campaign hit roughly 30 global targets. Anthropic says the campaign was disrupted; the model is not.

Verizon's 2025 DBIR found malicious emails crafted with generative AI doubled in the last two years. 14% of employees were using GenAI tools on corporate devices, and 72% of those users were authenticating to GenAI services with personal emails or unauthenticated sessions, leaving the corporate side blind to what was being shared.

Detection and dwell time

Five numbers compress the entire detection picture for 2024 and 2025:

Number

Source

11 days global median dwell time, 2024

Mandiant M-Trends 2025

26 days dwell time when externally notified

Mandiant M-Trends 2025

5 days dwell time when adversary notified (typical ransomware case)

Mandiant M-Trends 2025

48 minutes average eCrime breakout time, 2024

CrowdStrike Global Threat Report 2025

51 seconds fastest recorded eCrime breakout time

CrowdStrike Global Threat Report 2025

Five days is faster than dwell time has ever been, but it is also the worst outcome (the "adversary-notified" case is the ransom-note case). External notification is the second-worst outcome and is twice as slow as internal discovery. The signal: organizations that detect breaches internally are still ahead of the adversary, but only barely, and only on average.

Cisco Talos's quarterly IR Trends reports add quarter-by-quarter granularity. Q1 2025 saw phishing in half of all engagements; Q2 2025 saw public-facing-app exploitation in over 60% of engagements as phishing fell to 33%. Q3 2025 introduced two new high-signal numbers: MFA weakness was found in 35% of engagements (a quarter-over-quarter rise), and fraudulent device registration grew 178% YoY, with attackers convincing administrators to register devices on their behalf at three times the rate of users.

Frequently Asked Questions

Who publishes the most-cited malware statistics for 2026?

For raw sample volume, AV-TEST (1.56 billion cumulative samples through March 2025) is the canonical reference. For breach corpus, the Verizon 2025 DBIR (12,195 confirmed breaches Nov 2023 to Oct 2024) is the largest publicly-released dataset. For incident-response telemetry, Mandiant's M-Trends 2025 is the most-quoted IR number, alongside IBM's X-Force Threat Intelligence Index 2025. For the malware-free intrusion shift, CrowdStrike's 2025 Global Threat Report and 2025 Threat Hunting Report own the most-cited figure (79% of 2024 detections, 81% of H1 2025 interactive intrusions). For ransomware specifically, Sophos's State of Ransomware 2025, NCC Group's Annual Cyber Threat Intelligence 2025, and Coveware's Q4 2025 report are the top three.

How big is the malware database in 2026?

AV-TEST registered its 1.56 billionth cumulative malware sample in March 2025, with daily new-sample registrations between 450,000 and 560,000. The Windows-only AV-ATLAS database grew 8% YoY between 2024 and 2025, from 920 million to 995 million Windows samples. abuse.ch's URLhaus tracks roughly 3.65 million malicious URLs as of April 2026. Volume of unique samples is a poor proxy for attack volume because most additions are automated variants, packed re-issues, and AI-assisted mutations of a small set of operational families.

What is the most-prevalent infostealer in 2026?

Microsoft's Digital Defense Report 2025 names Lumma Stealer as the most prevalent infostealer in its October 2024 to October 2025 telemetry. Lumma was disrupted by a multi-vendor takedown in May 2025. IBM's X-Force Threat Intelligence Index 2025 ranks the top five infostealers by dark-web listing volume as Lumma, RisePro, Vidar, Stealc, and RedLine, together producing more than 8 million dark-web ads in 2024. ESET's Threat Report H1 2025 reports SnakeStealer overtaking Agent Tesla as the most-detected infostealer in ESET telemetry, with a 111% jump vs H2 2024.

What share of attacks involve no malware in 2026?

CrowdStrike measured 79% of all 2024 attack detections as malware-free and 81% of H1 2025 interactive intrusions as malware-free. The number rose from 40% in 2019. Malware-free does not mean attackers used no offensive tooling; it means initial access and lateral movement happened without dropping a malicious binary on disk that endpoint protection could match against signatures or behavioral rules. Sophos's Active Adversary Report 2025 decomposes the same trend: living-off-the-land binary abuse grew 126% YoY in 2024, RDP abuse appeared in 84% of cases, and 56% of all Sophos IR / MDR cases involved attackers logging in via valid credentials rather than breaking in.

What initial access vectors lead to the most malware-driven breaches in 2026?

Across the major 2024 and 2025 reports, exploitation of public-facing applications, valid account credentials, and phishing each carry double-digit share. IBM X-Force's Threat Intelligence Index 2025 tied exploits and valid credentials at 30% each in calendar 2024. Mandiant's M-Trends 2025 found exploits at 33% and stolen credentials at 16%. Sophos's Active Adversary Report 2025 put compromised credentials at 41% and exploits at 21.79%. Verizon's 2025 DBIR reported credential abuse in 22% and vulnerability exploitation in 20% of all reviewed breaches. ENISA's Threat Landscape 2025 put phishing at 60% and vulnerability exploitation at 21% of EU incidents.

Which industries are hit hardest by malware in 2026?

IBM X-Force ranked 2024 attack share by industry as manufacturing 26%, finance and insurance 23%, energy 10%, and transportation 7%. Manufacturing has held the top spot for four consecutive years. In manufacturing specifically, 40% of attacks involved data theft targeting financial assets and intellectual property. Verizon's 2025 DBIR saw espionage-motivated breaches in manufacturing rise from 3% to 20% YoY and ransomware attacks against manufacturing grow 61%. Mandiant's M-Trends 2025 ranks the most-targeted IR-engagement industries differently: financial 17.4%, business and professional services 11.1%, high tech 10.6%, government 9.5%, healthcare 9.3%.

How fast do attackers move once they get a foothold?

CrowdStrike's 2025 Global Threat Report measured an average eCrime breakout time of 48 minutes in 2024, with the fastest recorded breakout at 51 seconds. Breakout time is the gap between initial endpoint compromise and the first lateral movement. Interactive intrusion campaigns grew 35% YoY in 2024. Mandiant's M-Trends 2025 clocked global median dwell time at 11 days for the 2024 IR caseload (10 days the year before), but the asymmetry by detection path matters more than the headline: 26 days when external entities notified the victim, 5 days when the adversary themselves notified (typically via ransom note), 10 days when the organization discovered the breach internally. JAPAC was fastest at 9 days, EMEA slowest at 22 days.

Coveware's Q4 2025 quarterly report put the ransom payment rate at a historic low of 20% in Q4 2025, with the median ransom payment rising to US$325,000 (+132% QoQ) and the average to US$591,988 (+57% QoQ). Sophos's State of Ransomware 2025 found 49% of victims paid the ransom in the survey window, down from 56% in 2024. IBM's Cost of a Data Breach Report 2025 reported 63% of breached organizations now refuse to pay ransom demands (up from 59% the prior year). The bifurcation: more victims walk away, but those that do pay are paying significantly more, with state and local government leading at a US$2.5M median per Sophos.

How much credential theft is happening in 2026?

Recorded Future's 2025 Identity Threat Landscape Report indexed 1.95 billion malware-sourced combo-list credentials and 36 million database combo-list credentials in 2025. Of the 1.95 billion, 276 million (31%) carried active session cookies, meaning attackers can import the cookie into their own browser and bypass MFA on entry. 53% of all stolen credentials were indexed within one week of exfiltration; 36.4% within 24 hours. The H2 2025 was 50% larger than H1 2025; Q4 2025 was 90% larger than Q1 2025. Verizon's 2025 DBIR corroborates that 25% of all tested malware contained credentials harvested from password stores, that 30% of infostealer-compromised systems were enterprise-licensed, and that 54% of ransomware-victim domains had appeared in infostealer logs before the attack.

How is AI changing the malware landscape in 2026?

IBM's Cost of a Data Breach Report 2025 found 1 in 6 breaches involved attackers using AI, most commonly for phishing (37%) and deepfake impersonation (35%). Shadow AI (unsanctioned use by employees) was a factor in 20% of breaches, adding US$670,000 to average costs. Microsoft's Digital Defense Report 2025 documents adversary use of generative AI for social engineering scaling, automated lateral movement, and vulnerability discovery. Anthropic disclosed in November 2025 the first publicly-documented AI-orchestrated cyber espionage campaign, in which a Chinese state-sponsored group used Claude Code to execute 80% to 90% of tactical operations against roughly 30 global targets autonomously. Verizon's 2025 DBIR found malicious emails crafted with generative AI doubled in the last two years.

What does CISA say about exploited vulnerabilities and malware in 2026?

CISA added 245 vulnerabilities to its Known Exploited Vulnerabilities catalog in 2025, bringing the cumulative total to 1,484. The 2025 add-rate is more than 30% above the steady pace of 187 (2023) and 185 (2024). 24 of the 2025 additions were marked as known to be exploited by ransomware groups, including CitrixBleed 2 (CVE-2025-5777) and Oracle E-Business Suite vulnerabilities targeted by CL0P. SonicWall's 2025 Cyber Threat Report found 75% of exploits occur within four days of public proof-of-concept disclosure, with 61% striking inside 48 hours, while average organizations take 120 to 150 days to apply a patch.

What can organizations do to defend against malware-driven breaches in 2026?

Five practical steps that the data supports.

First, treat infostealers as a credential-harvest vector, not a Windows-AV problem. The Verizon 2025 DBIR's 54% infostealer-precedes-ransomware figure says credential rotation, session-cookie invalidation on infostealer-detection events, and FIDO2 hardware-key MFA close the largest single attack chain in the data.

Second, assume valid credentials and living-off-the-land tradecraft are the default. CrowdStrike's 79% malware-free intrusion rate and Sophos's 56% logged-in-vs-broke-in figure mean signature-based EDR is necessary but not sufficient. Identity-threat detection (anomalous sign-ins, impossible travel, session-cookie heuristics) and behavioral telemetry on RDP and PowerShell are where defenders need budget in 2026.

Third, patch what CISA names. The 245 KEV additions in 2025 are a finite, ranked list of vulnerabilities that adversaries are actively using. The 24 ransomware-flagged subset is the highest-priority list. SonicWall's 75%-within-four-days exploit window means a 30-day patch SLA is structurally late.

Fourth, exercise the assumed-breach scenario. Mandiant's 5-day adversary-notified dwell time is the worst-case outcome, and 26-day external-notification dwell time is the second-worst. Internal discovery (10 days median) is the only path that gives defenders meaningful response window. Tabletop exercises that include valid-credential-driven lateral movement, infostealer-then-ransomware chains, and EDR-killer scenarios are the highest-leverage prep.

Fifth, audit GenAI usage. The Verizon 2025 DBIR's 14%-employees-on-corp-devices and 72%-personal-account figures put a measurable risk on shadow AI, and IBM's US$670,000-extra-breach-cost from shadow AI is a clear ROI case for sanctioned, monitored GenAI access.

For a deeper procedural walkthrough of how Stingrai's red-team and PTaaS engagements simulate the exact valid-credential and infostealer-driven chains in this report, see our PTaaS service overview and Stingrai's complete penetration testing methodology. Buyers comparing managed offensive-security partners can review our 2026 ranking of the best PTaaS providers and the best penetration testing companies in 2026.

References

1 views

1

X

Related reading

Top Penetration Testing Companies in 2026: A Ranked Buyer's Guide
Web App SecurityNetwork Security

Top Penetration Testing Companies in 2026: A Ranked Buyer's Guide

Compare the best penetration testing companies in 2026. Independent rankings for CISOs and procurement: services, PTaaS, AI agents, and compliance fit.

18 min read

Adversary Simulation in Telecom: Case Study
Web App SecurityNetwork Security

Adversary Simulation in Telecom: Case Study

Explore how adversary simulation helps telecom networks identify and address critical vulnerabilities, enhancing cybersecurity against evolving threats.

8 min read

What is Penetration Testing Service?
Web App SecurityNetwork Security

What is Penetration Testing Service?

Protect your business from cyber threats with expert penetration testing. Discover vulnerabilities, strengthen security, and ensure compliance today.

8 min read

Contents

    X