- The State of Ransomware in 2026
- Major Active Ransomware Groups
- The Ransomware-as-a-Service Business Model
- Common Initial Access Vectors
- The Double and Triple Extortion Model
- Most Targeted Industries
- Ransomware Defense Framework
- The Role of Law Enforcement Takedowns
- Cyber Insurance Considerations
- How to Stay Informed
Ransomware remains the most financially impactful cyber threat facing organizations worldwide. What began as simple screen-locking malware over a decade ago has evolved into a sophisticated criminal ecosystem with its own supply chains, affiliate programs, and negotiation services. In 2026, the ransomware landscape is more complex, more professionalized, and more geopolitically intertwined than ever before.
This guide provides security professionals with a comprehensive overview of the current ransomware landscape, the threat actors driving it, the tactics they employ, and the defensive strategies that work. Whether you run a SOC, manage risk for a CISO, or advise leadership on threat exposure, this resource is designed to give you actionable context.
The State of Ransomware in 2026
The ransomware ecosystem has undergone a fundamental transformation over the past several years. The days of indiscriminate, spray-and-pray encryption campaigns are largely behind us. Today's ransomware operations are targeted, methodical, and built on extensive pre-attack reconnaissance. Threat actors spend days or weeks inside victim networks before deploying encryption, mapping out critical assets, exfiltrating sensitive data, and identifying the maximum leverage they can extract.
The shift from pure encryption to multi-extortion has been the defining evolution. Encryption alone is no longer sufficient for threat actors because organizations with mature backup strategies can recover without paying. Instead, ransomware groups now routinely exfiltrate data before encryption and threaten to publish it on leak sites, contact customers or regulators directly, launch DDoS attacks against victim infrastructure, and sell stolen data to competitors or other criminal groups. This layered pressure makes ransomware incidents significantly harder to manage and increases the incentive to pay.
By 2026, the majority of ransomware incidents involve data exfiltration in addition to encryption. Pure encryption-only attacks now represent the minority of cases, as threat actors have learned that stolen data provides sustained leverage even when backups are available.
Ransom demands have also escalated. While the median payment has fluctuated year to year, the upper end of demands continues to climb, with eight-figure demands now routine against large enterprises and critical infrastructure operators. The total economic cost of ransomware, including downtime, recovery, legal fees, regulatory fines, and reputational damage, dwarfs the ransom payments themselves.
Major Active Ransomware Groups
The ransomware ecosystem is dominated by a relatively small number of prolific groups that operate at scale through affiliate programs. Understanding who these groups are, how they operate, and what makes each one distinct is essential for threat intelligence and defense planning. CyberGeoDigest tracks these groups daily, reporting on new victims, infrastructure changes, and law enforcement actions as they unfold.
LockBit
LockBit has been one of the most prolific ransomware operations in history. Despite significant law enforcement disruption through Operation Cronos in early 2024, the group's operator, known as LockBitSupp, has repeatedly attempted to reconstitute the operation. LockBit pioneered several innovations in the RaaS space, including a bug bounty program for its encryptor, automated data exfiltration tooling, and aggressive affiliate recruitment. Its variants have targeted Windows, Linux, and VMware ESXi environments. The group's resilience in the face of law enforcement action has made it a case study in the difficulty of permanently dismantling ransomware operations.
BlackCat / ALPHV
BlackCat, also tracked as ALPHV, distinguished itself by developing its ransomware payload in Rust, a programming language that offers cross-platform compilation and makes analysis more difficult for defenders. The group operated a sophisticated affiliate program with generous payment splits and was responsible for several high-profile attacks against healthcare, financial services, and technology companies. Following FBI disruption in late 2023 and an apparent exit scam in early 2024, former affiliates dispersed across the ecosystem, carrying their operational tradecraft into new groups and contributing to the broader diffusion of advanced techniques.
Cl0p
Cl0p has carved out a unique niche in the ransomware landscape by specializing in mass exploitation of zero-day vulnerabilities in file transfer platforms. The group's campaigns against MOVEit Transfer, GoAnywhere MFT, and Accellion FTA demonstrated a model where a single vulnerability could yield hundreds of victims simultaneously. Rather than deploying traditional encryption, Cl0p increasingly focuses on pure data theft and extortion, a reflection of the broader trend toward extortion without encryption. Their campaigns have disproportionately impacted organizations that rely on managed file transfer for sensitive data exchange.
Play
The Play ransomware group, also known as PlayCrypt, has steadily grown in volume and sophistication since its emergence in mid-2022. Play is known for exploiting vulnerabilities in FortiOS and Microsoft Exchange for initial access, and for its use of custom tooling for network discovery and data exfiltration. The group maintains a leak site and follows the standard double-extortion playbook. Play has been particularly active against mid-market organizations in North America and Europe, filling a niche below the largest enterprise targets.
Royal / BlackSuit
Royal ransomware emerged in late 2022 with strong links to former Conti operators. The group rebranded to BlackSuit in 2023, carrying over its infrastructure, tactics, and personnel. BlackSuit targets large enterprises and critical infrastructure, with a particular focus on healthcare and manufacturing. The group is notable for its callback phishing technique, where victims receive emails directing them to call a phone number, at which point social engineers guide them through installing remote access software. This human-operated approach to initial access distinguishes BlackSuit from groups that rely primarily on technical exploitation.
Akira
Akira appeared in early 2023 and quickly established itself as a serious threat, particularly against small and mid-sized organizations. The group has demonstrated proficiency in exploiting VPN vulnerabilities, particularly in Cisco ASA and FortiGate products, for initial access. Akira operates both a Windows encryptor and a Linux variant targeting VMware ESXi. The group's ransom demands are generally lower than the largest operations but are calibrated to be within the perceived ability of smaller victims to pay, maximizing the likelihood of payment.
Black Basta
Black Basta is another group with strong links to the former Conti operation. Since its emergence in April 2022, it has maintained a consistent and high-volume tempo of attacks across multiple sectors. Black Basta is known for its use of the QakBot and DarkGate malware families for initial access, sophisticated Active Directory enumeration, and rapid lateral movement. The group has been particularly aggressive in targeting critical infrastructure and has been the subject of multiple joint advisories from CISA and FBI.
Rhysida
Rhysida gained international attention through attacks against government institutions, healthcare systems, and cultural organizations, including the British Library. The group operates as a RaaS platform and has shown a willingness to target sectors that other groups historically avoided. Rhysida's operations have notable overlaps with the Vice Society group, suggesting either shared personnel or a direct evolution. The group's targeting of public sector and healthcare victims has drawn particular scrutiny from law enforcement and policy makers.
| Group | Notable Trait | Primary Targets | Initial Access |
|---|---|---|---|
| LockBit | Most prolific RaaS; survived law enforcement disruption | Cross-sector, global | Affiliates vary; RDP, phishing, exploits |
| BlackCat/ALPHV | Rust-based payload; cross-platform | Healthcare, finance, tech | Compromised credentials, exploits |
| Cl0p | Mass zero-day exploitation; data theft focus | File transfer platform users | Zero-day vulnerabilities |
| Play | Custom tooling; steady growth | Mid-market, North America/Europe | FortiOS, Exchange exploits |
| BlackSuit | Conti successor; callback phishing | Healthcare, manufacturing | Callback phishing, social engineering |
| Akira | VPN exploitation specialist | SMBs across sectors | Cisco ASA, FortiGate VPN exploits |
| Black Basta | High volume; Conti links | Critical infrastructure | QakBot, DarkGate, phishing |
| Rhysida | Public sector targeting; Vice Society links | Government, healthcare, education | Phishing, valid credentials |
The Ransomware-as-a-Service Business Model
The professionalization of ransomware is best understood through the Ransomware-as-a-Service (RaaS) model, which has become the dominant operational structure in the ecosystem. RaaS mirrors legitimate software-as-a-service businesses in its structure, complete with developer teams, affiliate programs, customer support, and even brand management.
In a RaaS operation, the core developers build and maintain the ransomware payload, the leak site infrastructure, the negotiation portal, and the payment processing systems. They recruit affiliates, who are the operators that actually conduct intrusions, move laterally through victim networks, exfiltrate data, and deploy the encryptor. Revenue is split between the developers and the affiliate, typically with the affiliate receiving 70-80% of the ransom payment and the developers taking the remainder.
This model has several consequences for defenders. First, it dramatically lowers the barrier to entry for conducting ransomware attacks. Affiliates do not need to develop malware, build infrastructure, or manage negotiations. They only need to gain access to networks and deploy the payload. Second, it creates a highly resilient ecosystem. When one RaaS platform is disrupted, affiliates simply migrate to another, carrying their skills and access with them. Third, it means that different attacks attributed to the same ransomware family may exhibit very different TTPs, because different affiliates bring different skill sets and toolkits to the operation.
The typical RaaS affiliate split is 70-80% to the affiliate and 20-30% to the developers. Top-performing affiliates may negotiate even more favorable terms. Some groups, like former LockBit operations, offered up to 80% affiliate share to attract the most skilled operators.
Common Initial Access Vectors
Understanding how ransomware operators gain their initial foothold is critical for prevention. While techniques evolve, several vectors consistently dominate.
Phishing and Social Engineering
Phishing remains one of the most reliable initial access methods. Ransomware affiliates use targeted spear-phishing emails with malicious attachments or links to deliver initial-stage malware such as QakBot, IcedID, or DarkGate. Callback phishing, where victims are directed to call a phone number and are then socially engineered into installing remote access tools, has become an increasingly prevalent technique, particularly among groups like BlackSuit.
Exploitation of Internet-Facing Vulnerabilities
Vulnerabilities in VPN appliances, firewalls, and remote access gateways are a primary entry point for ransomware operators. Cisco ASA, Fortinet FortiOS, Citrix NetScaler, and Ivanti Connect Secure have all been exploited at scale by ransomware groups. These devices sit at the network perimeter and, when compromised, provide direct access to internal networks. Patching these devices promptly is one of the highest-impact defensive actions an organization can take.
Compromised Remote Desktop Protocol (RDP)
Exposed RDP services with weak or reused credentials remain a common entry point, particularly for less sophisticated affiliates. Credential stuffing attacks, brute-force attacks, and the purchase of stolen credentials from initial access brokers on dark web marketplaces all feed this vector. Organizations that expose RDP to the internet without multi-factor authentication are at acute risk.
Supply Chain and Third-Party Compromise
Supply chain attacks have become a force multiplier for ransomware operations. By compromising a managed service provider (MSP), a software vendor, or a widely used platform, a single intrusion can provide access to hundreds or thousands of downstream victims. Cl0p's exploitation of file transfer platforms is the most prominent example, but attacks through compromised MSPs and IT management tools continue to be a significant vector.
The Double and Triple Extortion Model
The evolution from simple encryption to multi-layered extortion has fundamentally changed the ransomware threat model and the calculus that victims face when deciding how to respond.
Single extortion involves encrypting data and demanding payment for the decryption key. This was the original ransomware model and is increasingly rare as a standalone tactic because organizations with good backups can recover without paying.
Double extortion adds data exfiltration to encryption. Before deploying the encryptor, the threat actor copies sensitive data to infrastructure they control. If the victim refuses to pay for decryption, the threat actor threatens to publish the data on a leak site. This creates a secondary pressure point that backups cannot address. Double extortion is now the standard operating model for most ransomware groups.
Triple extortion layers additional pressure on top of double extortion. This can include DDoS attacks against the victim's infrastructure, direct contact with the victim's customers, patients, or business partners to inform them of the breach, threats to report the breach to regulators, or selling the stolen data to competitors. Some groups have even contacted journalists or posted on social media to maximize public pressure on victims.
This escalation means that even organizations with excellent backup and recovery capabilities must treat every ransomware incident as a data breach, with all the regulatory, legal, and reputational consequences that entails.
Most Targeted Industries
While ransomware affects every sector, certain industries face disproportionate targeting due to their perceived ability to pay, the criticality of their operations, and the sensitivity of the data they hold.
Healthcare
Healthcare remains one of the most heavily targeted sectors. The combination of life-safety urgency, sensitive patient data, legacy systems, and often limited security budgets makes healthcare organizations attractive targets. Disruption to clinical operations creates immediate pressure to pay, and the regulatory consequences of patient data exposure under HIPAA and similar frameworks add additional leverage.
Education
Schools, universities, and research institutions are frequently targeted due to their large, open networks, limited security resources, and the volume of personally identifiable information they hold. K-12 school districts are particularly vulnerable, as they often lack dedicated security staff entirely.
Manufacturing
Manufacturing organizations are targeted because operational technology (OT) disruption can halt production lines, causing immediate and quantifiable financial losses. The convergence of IT and OT networks means that a ransomware infection in the IT environment can cascade into operational shutdowns. Many manufacturers pay quickly because the cost of downtime exceeds the ransom.
Government
State and local government entities are frequent targets, particularly in North America. Limited budgets, aging infrastructure, and the essential nature of government services create a favorable risk-reward calculation for attackers. Attacks on government entities also generate significant media attention, which some groups use to enhance their reputation in criminal forums.
Ransomware Defense Framework
Defending against ransomware requires a layered approach that addresses prevention, detection, response, and recovery. No single control is sufficient; the goal is to create defense in depth that makes successful attacks less likely and limits their impact when they do occur.
Backup Strategy
Backups are the foundation of ransomware resilience, but only if they are properly designed and tested. Follow the 3-2-1-1 rule: maintain at least three copies of data, on two different media types, with one offsite and one immutable or air-gapped. Critically, backups must be tested regularly through actual restoration exercises. A backup that cannot be restored in a timely manner under pressure is not a backup.
Network Segmentation
Flat networks allow ransomware to spread rapidly once an attacker gains initial access. Effective network segmentation limits lateral movement by dividing the network into zones with enforced access controls between them. Pay particular attention to segmenting IT from OT environments, isolating sensitive data stores, and restricting administrative access to dedicated management networks.
Endpoint Detection and Response (EDR)
Modern EDR solutions are one of the most effective tools against ransomware. They provide behavioral detection that can identify ransomware activity even from previously unknown variants, along with the ability to isolate compromised endpoints and support forensic investigation. Ensure EDR is deployed across all endpoints, including servers, and that it is actively monitored. Unmonitored EDR is almost as ineffective as no EDR at all.
Incident Response Planning
Every organization should have a ransomware-specific incident response plan that has been tested through tabletop exercises. The plan should address technical containment and eradication, communication protocols for internal stakeholders, executives, legal counsel, and regulators, the decision framework for ransom payment, engagement of forensic and legal counsel, and notification requirements. The worst time to develop an incident response plan is during an incident.
Vulnerability and Patch Management
Given the prevalence of vulnerability exploitation as an initial access vector, timely patching of internet-facing systems is critical. Prioritize based on real-world exploitation data rather than CVSS scores alone. CISA's Known Exploited Vulnerabilities (KEV) catalog is an essential resource for this prioritization.
Identity and Access Management
Enforce multi-factor authentication on all remote access, email, VPN, and administrative interfaces. Implement the principle of least privilege for all accounts. Monitor for and respond to credential theft indicators. Disable or restrict RDP access, and audit service accounts regularly.
The Role of Law Enforcement Takedowns
Law enforcement operations against ransomware groups have intensified significantly, with coordinated international efforts achieving notable disruptions. Operation Cronos against LockBit, the FBI's action against BlackCat/ALPHV infrastructure, the takedown of the Hive ransomware group, and the disruption of QakBot infrastructure have all demonstrated that law enforcement can impose meaningful costs on ransomware operators.
However, the impact of these operations is often temporary. Ransomware groups have proven remarkably resilient, with operators rebuilding infrastructure, affiliates migrating to competing platforms, and new groups emerging to fill vacuums. The RaaS model's distributed nature means that disrupting the core platform does not eliminate the affiliates, who retain their skills and access.
The most durable impacts come from operations that combine technical disruption with arrests, asset seizures, and sanctions. When threat actors face personal consequences, the deterrent effect is stronger. International cooperation, particularly between Western law enforcement agencies and their counterparts in jurisdictions where threat actors operate, remains the critical bottleneck. The geopolitical dimension of ransomware, with many operators based in countries that are uncooperative with Western law enforcement, means that purely technical solutions are insufficient. This intersection of cybersecurity and geopolitics is a core focus of CyberGeoDigest's daily coverage.
Cyber Insurance Considerations
The cyber insurance market has matured significantly in response to the ransomware epidemic, and its evolution has important implications for how organizations approach ransomware defense.
Insurers have dramatically tightened underwriting requirements. Where policies were once available with minimal security scrutiny, insurers now routinely require evidence of specific controls before issuing coverage: multi-factor authentication, EDR deployment, offline backups, network segmentation, and incident response plans. Organizations that cannot demonstrate these controls face higher premiums, reduced coverage limits, or outright denial of coverage.
Several important considerations for organizations evaluating or managing cyber insurance:
- Understand your policy's scope. Not all policies cover ransom payments, regulatory fines, or business interruption losses in the same way. Read the exclusions carefully.
- Maintain compliance with policy requirements. If your policy requires specific security controls and those controls lapse, your claim may be denied.
- Insurance is not a substitute for security. It transfers financial risk but does not prevent incidents or reduce their operational impact.
- Engage your insurer's resources. Many policies include access to pre-approved incident response firms, legal counsel, and negotiation specialists. Know who these are before an incident occurs.
- Consider the ethical and legal dimensions of ransom payments. OFAC sanctions may make payments to certain threat actors illegal, regardless of what your insurance covers.
How to Stay Informed
The ransomware landscape changes rapidly. Groups emerge, rebrand, and dissolve. New vulnerabilities create new attack surfaces. Law enforcement operations reshape the threat actor ecosystem. Staying current is not optional for security professionals; it is a core job requirement.
Effective approaches to staying informed include:
- Daily threat intelligence briefings. CyberGeoDigest provides daily coverage of ransomware incidents, law enforcement actions, and the geopolitical context behind threat actor operations. It is designed for security professionals who need to stay current without spending hours aggregating information from multiple sources.
- Government advisories. CISA, FBI, and NSA regularly publish joint advisories on active ransomware groups with detailed technical indicators and recommended mitigations. These should be required reading for any security team.
- Threat intelligence platforms and feeds. Integrate threat intelligence feeds into your security tooling so that indicators from active ransomware campaigns are automatically available for detection and blocking.
- Industry ISACs. Information Sharing and Analysis Centers provide sector-specific threat intelligence and facilitate peer information sharing. Participation in your industry's ISAC is one of the highest-value intelligence investments available.
- Incident post-mortems and research reports. Vendors, research groups, and law enforcement periodically publish detailed analyses of ransomware operations. These reports provide deep technical understanding that strengthens defensive capabilities.
The ransomware threat is not going away. It is evolving, professionalizing, and becoming more deeply intertwined with geopolitical dynamics. Organizations that invest in understanding the threat, building layered defenses, and staying informed are in the strongest position to manage the risk. Browse the CyberGeoDigest archive to see how we cover these developments every day, providing the strategic context that security leaders need to make better decisions.
Stay ahead of ransomware threats
CyberGeoDigest delivers daily ransomware intelligence and geopolitical cyber threat coverage to your inbox. Free, curated, and built for security professionals.
Subscribe free →