Germany has once again become the epicenter of cyber extortion in Europe. New data from Google Threat Intelligence (GTI) reveals that while data leak site (DLS) posts rose nearly 50% globally in 2025, German infrastructure is bearing the brunt of the surge. This marks a sharp return to the high-pressure levels seen in 2022 and 2023, following a brief period when the UK led in DLS victims. Here are six key shifts driving this alarming trend.
1. Germany Reclaims Top Spot in European Data Leak Targets
In 2025, Germany moved back to the forefront of European data leak victims. After a 2024 lull where the UK dominated, German organizations now account for the highest percentage of DLS posts within Europe. This pivot is not simply due to market size—Germany has fewer active enterprises than France or Italy. Instead, its allure lies in its status as an advanced economy with a highly digitized industrial base, making it a prime hunting ground for extortion groups.

2. A 92% Surge in Leaks Outpaces European Average
The speed of escalation is staggering. Germany saw a 92% growth in documented data leak victims in 2025 compared to 2024. That rate triples the European average, signaling a concentrated shift in cybercriminal focus. This dramatic increase follows a period of relative calm in 2024, suggesting threat actors are actively rerouting their efforts toward German targets.
3. Language Barriers No Longer Protect German Firms
Historically, language barriers offered some defense, as non-English speaking nations were harder to target with convincing ransom notes and phishing lures. But that protection is fading. A clear contrast emerged in 2025: while UK-based organizations saw a cooling in leak volumes, German and other non-English speaking nations experienced a surge. The maturation of the cyber criminal ecosystem—including the use of AI to automate high-quality localization—is eroding this advantage.
4. AI-Powered Localization Fuels Cyber Criminal Expansion
Artificial intelligence is a game-changer for cybercriminals. Automated translation and culturally tailored messaging now allow extortion groups to craft convincing communications in perfect German. This removes the previous friction that limited attacks to English-speaking victims. The result: German companies are facing unprecedented volumes of sophisticated phishing, social engineering, and ransom demands that sound native.

5. The Mittelstand: A Ripe Market for Extortion
As large “big game” targets in North America and the UK bolster their security postures or use cyber insurance to settle incidents privately, threat actors are pivoting toward the German Mittelstand—the country’s small- and medium-sized enterprises (SMEs). These firms often combine robust digitization with weaker security budgets, making them attractive targets. GTI data confirms that this shift is driving the overall increase in German DLS posts.
6. Threat Actors Advertise to Target German Companies Directly
Google Threat Intelligence Group (GTIG) has observed multiple cybercriminal groups posting advertisements seeking access to German companies. They offer a cut of any extortion fees obtained from victims. For instance, since November 2024, the threat actor known as Sarcoma has actively targeted businesses in highly developed nations, including Germany. This open marketplace for initial access highlights how organized the ecosystem has become.
These six shifts paint a clear picture: Germany is under renewed cyber extortion pressure. The combination of AI-driven localization, a shift toward smaller targets, and a mature criminal ecosystem means the threat is likely to persist. Organizations, especially in the Mittelstand, must prioritize cyber hygiene, employee training, and incident response planning to defend against this evolving landscape.