• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Chrome sandbox escape nets security researcher $250,000 reward

 | 

Smart Buses flaws expose vehicles to tracking, control, and spying

 | 

MedusaLocker ransomware group is looking for pentesters

 | 

Google confirms Salesforce CRM breach, faces extortion threat

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

 | 

Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Embargo Ransomware nets $34.2M in crypto since April 2024

 | 

Germany limits police spyware use to serious crimes

 | 

Phishing attacks exploit WinRAR flaw CVE-2025-8088 to install RomCom

 | 

French firm Bouygues Telecom suffered a data breach impacting 6.4M customers

 | 

Columbia University data breach impacted 868,969 people

 | 

SonicWall dismisses zero-day fears after Ransomware probe

 | 

Air France and KLM disclosed data breaches following the hack of a third-party platform

 | 

CISA, Microsoft warn of critical Exchange hybrid flaw CVE-2025-53786

 | 

Microsoft unveils Project Ire: AI that autonomously detects malware

 | 

CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector

 | 

Over 100 Dell models exposed to critical ControlVault3 firmware bugs

 | 

How CTEM Boosts Visibility and Shrinks Attack Surfaces in Hybrid and Cloud Environments

 | 

WhatsApp cracks down on 6.8M scam accounts in global takedown

 | 

Trend Micro fixes two actively exploited Apex One RCE flaws

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Malware
  • AV-TEST estimates 12 million new malware variants per month

AV-TEST estimates 12 million new malware variants per month

Pierluigi Paganini January 17, 2015

The Independent institute AV-Test issued an analysis that recorded 143 Million new malware samples in 2014 and 12 million new variants per month.

The German independent IT security institute AV-Test has published an interesting statistic on the current diffusion of malicious code, the data reveal that experts noticed 12 million new variants per month.

AV-Test provides professional evaluations of security software, its analysis focuses on the detection capability of principal security applications, the data are published on daily bases.

The organization focuses on malware designed to infect Windows and Android systems that are most targeted OS due to their diffusion. The data have been compiled by the independent institute AV-Test that extracted them from its analysis tools Sunshine and VTEST. Every single threat detected by the analysis systems is classified and information collected by AV-Test.

12 million fresh strains of malware detected every month are just one aspect of the interesting analysis, AV-Test also revealed that every second four samples are available in the wild.

Analyzing data related to the last 12 months, the month with the greatest number of new threats was August, when over 18 million new samples were identified by AV-Test.

As for the total number of threats caught last year, more than 325 million pieces were analyzed during the month of December alone.

AV-Test new malware 2014

The statistics reported a total amount of new malware in 2014 of 143 million, an amazing quantity if we consider the portion of malicious code that is detected by principal Antivirus software.

“The AV-TEST Institute registers over 390,000 new malicious programs every day. These are examined using the analysis tools Sunshine and VTEST, classified according to their characteristics and saved. Visualisation programs then transform the results into diagrams that can be updated and produce current malware statistics.” reads the official page published by AV-Test.

AV-Test malware 2014

The data shows a constant increase in new cyber threats recorded over the years, the AV-Test twitted an interesting graph that resume the situation since 2010. The graph below shows that the number of new malware in 2014 is significantly greater respect the number of new strains of malware observed in the previous years.

In 2014, AV-TEST has registered more than 143 million new malware. That’s more than 4 new samples every second! pic.twitter.com/F5N1DJVDRs

— AV-TEST GmbH (@avtestorg) 8 Gennaio 2015

Compared to 2013, AV-Test statistics show that the difference in new threats is of about 60 million, meanwhile in 2010 the institute recorded only 17.5 million malware.

Pierluigi Paganini

(Security Affairs –  AV-TEST,malware)


facebook linkedin twitter

AV-TEST malware statistics

you might also like

Pierluigi Paganini August 12, 2025
Researchers cracked the encryption used by DarkBit ransomware
Read more
Pierluigi Paganini August 11, 2025
MedusaLocker ransomware group is looking for pentesters
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Researchers cracked the encryption used by DarkBit ransomware

    Malware / August 12, 2025

    Chrome sandbox escape nets security researcher $250,000 reward

    Hacking / August 11, 2025

    Smart Buses flaws expose vehicles to tracking, control, and spying

    Hacking / August 11, 2025

    MedusaLocker ransomware group is looking for pentesters

    Hacking / August 11, 2025

    Google confirms Salesforce CRM breach, faces extortion threat

    Data Breach / August 10, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT