This statistic represents malware functionality within global industrial cyber espionage incidents in 2014. During the survey period, it was found that 39.9 percent of cyber espionage incidents involving malware could be traced back to e-mail attachments.
Malware installation vectors within global industrial cyber espionage incidents in 2014
Characteristic
Percentage of cyber espionage incidents with malware installations
Profit from the additional features of your individual account
Currently, you are using a shared account. To use individual functions (e.g., mark statistics as favourites, set
statistic alerts) please log in with your personal account.
If you are an admin, please authenticate by logging in again.
Learn more about how Statista can support your business.
Verizon. (April 14, 2015). Malware installation vectors within global industrial cyber espionage incidents in 2014 [Graph]. In Statista. Retrieved February 14, 2025, from https://www.statista.com/statistics/221387/share-of-malware-functionality-across-organizations/?__sso_cookie_checker=failed
Verizon. "Malware installation vectors within global industrial cyber espionage incidents in 2014." Chart. April 14, 2015. Statista. Accessed February 14, 2025. https://www.statista.com/statistics/221387/share-of-malware-functionality-across-organizations/?__sso_cookie_checker=failed
Verizon. (2015). Malware installation vectors within global industrial cyber espionage incidents in 2014. Statista. Statista Inc.. Accessed: February 14, 2025. https://www.statista.com/statistics/221387/share-of-malware-functionality-across-organizations/?__sso_cookie_checker=failed
Verizon. "Malware Installation Vectors within Global Industrial Cyber Espionage Incidents in 2014." Statista, Statista Inc., 14 Apr 2015, https://www.statista.com/statistics/221387/share-of-malware-functionality-across-organizations/?__sso_cookie_checker=failed
Verizon, Malware installation vectors within global industrial cyber espionage incidents in 2014 Statista, https://www.statista.com/statistics/221387/share-of-malware-functionality-across-organizations/?__sso_cookie_checker=failed (last visited February 14, 2025)
Malware installation vectors within global industrial cyber espionage incidents in 2014 [Graph], Verizon, April 14, 2015. [Online]. Available: https://www.statista.com/statistics/221387/share-of-malware-functionality-across-organizations/?__sso_cookie_checker=failed