{"id":119251,"date":"2022-11-03T10:30:00","date_gmt":"2022-11-03T09:30:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=119251"},"modified":"2024-01-19T11:23:45","modified_gmt":"2024-01-19T10:23:45","slug":"rise-from-75-percent","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/rise-from-75-percent\/","title":{"rendered":"Increase of 75 percent"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Ransomware attacks on Linux<\/h2>\n\n\n\n<p>In the first half of 2022, the Japanese IT security specialist blocked 63 billion threats worldwide. This is an increase of 52 percent compared to the same period last year. The public sector, manufacturing and healthcare were the most common targets for malware attacks. <\/p>\n\n\n\n<p>Detection of ransomware-as-a-service attacks jumped in the first half of 2022, especially from large players: LockBit saw a 500 percent year-over-year increase, and detections from Conti nearly doubled in six months. This trend is likely to continue. A 75 percent increase in ransomware attacks on Linux and embedded systems is particularly striking.<\/p><div id=\"great-569645754\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"571\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/Trend-Micro_Ransomware_H1-2022.jpg\" alt=\"Detection figures of selected ransomware groupings\" class=\"wp-image-119253\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/Trend-Micro_Ransomware_H1-2022.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/Trend-Micro_Ransomware_H1-2022-768x548.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/Trend-Micro_Ransomware_H1-2022-100x71.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/Trend-Micro_Ransomware_H1-2022-480x343.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/Trend-Micro_Ransomware_H1-2022-640x457.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/Trend-Micro_Ransomware_H1-2022-720x514.jpg 720w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption><em>Year-on-year detection figures for selected ransomware groupings (H1 2021-1H 2022). Source: Trend Micro.<\/em><\/figcaption><\/figure>","protected":false},"excerpt":{"rendered":"<p>63 billion threats were blocked by Trend Micro in the first half of 2022 - and the attacks aren't getting any less.<\/p>","protected":false},"author":38,"featured_media":119255,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"0","footnotes":""},"categories":[2,41842],"tags":[67,41871,3862],"coauthors":[19920],"class_list":["post-119251","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-22-10","tag-linux","tag-mag-22-10","tag-ransomware","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz.jpg",1200,540,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz-80x80.jpg",80,80,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz.jpg",1200,540,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz-1168x526.jpg",1168,526,true],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz.jpg",1200,540,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz.jpg",1200,540,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz.jpg",1200,540,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz.jpg",1200,540,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz.jpg",1200,540,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz.jpg",1200,540,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz.jpg",1200,540,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_1642749928_Golden_Dayz-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>63 Milliarden Bedrohungen wurden im ersten Halbjahr 2022 durch Trend Micro blockiert \u2013 und die Angriffe werden nicht weniger.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/sap-news\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-22-10\/\" rel=\"category tag\">Mag 22-10<\/a>","author_info_v2":{"name":"E-3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/119251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=119251"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/119251\/revisions"}],"predecessor-version":[{"id":137469,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/119251\/revisions\/137469"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/119255"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=119251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=119251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=119251"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=119251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}