Emotet was the most common malware attacking the infrastructure of companies in Poland. At the end of 2021, cybercriminals infected one in ten companies with it.
Most popular cyber attack methods to infect a company's infrastructure in Poland in 2021
Profit from the additional features of your individual account
Currently, you are using a shared account. To use individual functions (e.g., mark statistics as favourites, set
statistic alerts) please log in with your personal account.
If you are an admin, please authenticate by logging in again.
Learn more about how Statista can support your business.
PMR. (January 28, 2022). Most popular cyber attack methods to infect a company's infrastructure in Poland in 2021 [Graph]. In Statista. Retrieved January 08, 2025, from https://www.statista.com/statistics/1317699/poland-top-cyberattack-methods-to-infect-the-company/
PMR. "Most popular cyber attack methods to infect a company's infrastructure in Poland in 2021." Chart. January 28, 2022. Statista. Accessed January 08, 2025. https://www.statista.com/statistics/1317699/poland-top-cyberattack-methods-to-infect-the-company/
PMR. (2022). Most popular cyber attack methods to infect a company's infrastructure in Poland in 2021. Statista. Statista Inc.. Accessed: January 08, 2025. https://www.statista.com/statistics/1317699/poland-top-cyberattack-methods-to-infect-the-company/
PMR. "Most Popular Cyber Attack Methods to Infect a Company's Infrastructure in Poland in 2021." Statista, Statista Inc., 28 Jan 2022, https://www.statista.com/statistics/1317699/poland-top-cyberattack-methods-to-infect-the-company/
PMR, Most popular cyber attack methods to infect a company's infrastructure in Poland in 2021 Statista, https://www.statista.com/statistics/1317699/poland-top-cyberattack-methods-to-infect-the-company/ (last visited January 08, 2025)
Most popular cyber attack methods to infect a company's infrastructure in Poland in 2021 [Graph], PMR, January 28, 2022. [Online]. Available: https://www.statista.com/statistics/1317699/poland-top-cyberattack-methods-to-infect-the-company/