Resources

The Ransomware Landscape in 2026: Groups, Tactics, and Defenses

An authoritative guide for security professionals covering active ransomware threat actors, multi-extortion models, and a practical defense framework.

Table of Contents
  1. The State of Ransomware in 2026
  2. Major Active Ransomware Groups
  3. The Ransomware-as-a-Service Business Model
  4. Common Initial Access Vectors
  5. The Double and Triple Extortion Model
  6. Most Targeted Industries
  7. Ransomware Defense Framework
  8. The Role of Law Enforcement Takedowns
  9. Cyber Insurance Considerations
  10. How to Stay Informed

Ransomware remains the most financially impactful cyber threat facing organizations worldwide. What began as simple screen-locking malware over a decade ago has evolved into a sophisticated criminal ecosystem with its own supply chains, affiliate programs, and negotiation services. In 2026, the ransomware landscape is more complex, more professionalized, and more geopolitically intertwined than ever before.

This guide provides security professionals with a comprehensive overview of the current ransomware landscape, the threat actors driving it, the tactics they employ, and the defensive strategies that work. Whether you run a SOC, manage risk for a CISO, or advise leadership on threat exposure, this resource is designed to give you actionable context.

The State of Ransomware in 2026

The ransomware ecosystem has undergone a fundamental transformation over the past several years. The days of indiscriminate, spray-and-pray encryption campaigns are largely behind us. Today's ransomware operations are targeted, methodical, and built on extensive pre-attack reconnaissance. Threat actors spend days or weeks inside victim networks before deploying encryption, mapping out critical assets, exfiltrating sensitive data, and identifying the maximum leverage they can extract.

The shift from pure encryption to multi-extortion has been the defining evolution. Encryption alone is no longer sufficient for threat actors because organizations with mature backup strategies can recover without paying. Instead, ransomware groups now routinely exfiltrate data before encryption and threaten to publish it on leak sites, contact customers or regulators directly, launch DDoS attacks against victim infrastructure, and sell stolen data to competitors or other criminal groups. This layered pressure makes ransomware incidents significantly harder to manage and increases the incentive to pay.

Key Trend

By 2026, the majority of ransomware incidents involve data exfiltration in addition to encryption. Pure encryption-only attacks now represent the minority of cases, as threat actors have learned that stolen data provides sustained leverage even when backups are available.

Ransom demands have also escalated. While the median payment has fluctuated year to year, the upper end of demands continues to climb, with eight-figure demands now routine against large enterprises and critical infrastructure operators. The total economic cost of ransomware, including downtime, recovery, legal fees, regulatory fines, and reputational damage, dwarfs the ransom payments themselves.

Major Active Ransomware Groups

The ransomware ecosystem is dominated by a relatively small number of prolific groups that operate at scale through affiliate programs. Understanding who these groups are, how they operate, and what makes each one distinct is essential for threat intelligence and defense planning. CyberGeoDigest tracks these groups daily, reporting on new victims, infrastructure changes, and law enforcement actions as they unfold.

LockBit

LockBit has been one of the most prolific ransomware operations in history. Despite significant law enforcement disruption through Operation Cronos in early 2024, the group's operator, known as LockBitSupp, has repeatedly attempted to reconstitute the operation. LockBit pioneered several innovations in the RaaS space, including a bug bounty program for its encryptor, automated data exfiltration tooling, and aggressive affiliate recruitment. Its variants have targeted Windows, Linux, and VMware ESXi environments. The group's resilience in the face of law enforcement action has made it a case study in the difficulty of permanently dismantling ransomware operations.

BlackCat / ALPHV

BlackCat, also tracked as ALPHV, distinguished itself by developing its ransomware payload in Rust, a programming language that offers cross-platform compilation and makes analysis more difficult for defenders. The group operated a sophisticated affiliate program with generous payment splits and was responsible for several high-profile attacks against healthcare, financial services, and technology companies. Following FBI disruption in late 2023 and an apparent exit scam in early 2024, former affiliates dispersed across the ecosystem, carrying their operational tradecraft into new groups and contributing to the broader diffusion of advanced techniques.

Cl0p

Cl0p has carved out a unique niche in the ransomware landscape by specializing in mass exploitation of zero-day vulnerabilities in file transfer platforms. The group's campaigns against MOVEit Transfer, GoAnywhere MFT, and Accellion FTA demonstrated a model where a single vulnerability could yield hundreds of victims simultaneously. Rather than deploying traditional encryption, Cl0p increasingly focuses on pure data theft and extortion, a reflection of the broader trend toward extortion without encryption. Their campaigns have disproportionately impacted organizations that rely on managed file transfer for sensitive data exchange.

Play

The Play ransomware group, also known as PlayCrypt, has steadily grown in volume and sophistication since its emergence in mid-2022. Play is known for exploiting vulnerabilities in FortiOS and Microsoft Exchange for initial access, and for its use of custom tooling for network discovery and data exfiltration. The group maintains a leak site and follows the standard double-extortion playbook. Play has been particularly active against mid-market organizations in North America and Europe, filling a niche below the largest enterprise targets.

Royal / BlackSuit

Royal ransomware emerged in late 2022 with strong links to former Conti operators. The group rebranded to BlackSuit in 2023, carrying over its infrastructure, tactics, and personnel. BlackSuit targets large enterprises and critical infrastructure, with a particular focus on healthcare and manufacturing. The group is notable for its callback phishing technique, where victims receive emails directing them to call a phone number, at which point social engineers guide them through installing remote access software. This human-operated approach to initial access distinguishes BlackSuit from groups that rely primarily on technical exploitation.

Akira

Akira appeared in early 2023 and quickly established itself as a serious threat, particularly against small and mid-sized organizations. The group has demonstrated proficiency in exploiting VPN vulnerabilities, particularly in Cisco ASA and FortiGate products, for initial access. Akira operates both a Windows encryptor and a Linux variant targeting VMware ESXi. The group's ransom demands are generally lower than the largest operations but are calibrated to be within the perceived ability of smaller victims to pay, maximizing the likelihood of payment.

Black Basta

Black Basta is another group with strong links to the former Conti operation. Since its emergence in April 2022, it has maintained a consistent and high-volume tempo of attacks across multiple sectors. Black Basta is known for its use of the QakBot and DarkGate malware families for initial access, sophisticated Active Directory enumeration, and rapid lateral movement. The group has been particularly aggressive in targeting critical infrastructure and has been the subject of multiple joint advisories from CISA and FBI.

Rhysida

Rhysida gained international attention through attacks against government institutions, healthcare systems, and cultural organizations, including the British Library. The group operates as a RaaS platform and has shown a willingness to target sectors that other groups historically avoided. Rhysida's operations have notable overlaps with the Vice Society group, suggesting either shared personnel or a direct evolution. The group's targeting of public sector and healthcare victims has drawn particular scrutiny from law enforcement and policy makers.

Group Notable Trait Primary Targets Initial Access
LockBit Most prolific RaaS; survived law enforcement disruption Cross-sector, global Affiliates vary; RDP, phishing, exploits
BlackCat/ALPHV Rust-based payload; cross-platform Healthcare, finance, tech Compromised credentials, exploits
Cl0p Mass zero-day exploitation; data theft focus File transfer platform users Zero-day vulnerabilities
Play Custom tooling; steady growth Mid-market, North America/Europe FortiOS, Exchange exploits
BlackSuit Conti successor; callback phishing Healthcare, manufacturing Callback phishing, social engineering
Akira VPN exploitation specialist SMBs across sectors Cisco ASA, FortiGate VPN exploits
Black Basta High volume; Conti links Critical infrastructure QakBot, DarkGate, phishing
Rhysida Public sector targeting; Vice Society links Government, healthcare, education Phishing, valid credentials

The Ransomware-as-a-Service Business Model

The professionalization of ransomware is best understood through the Ransomware-as-a-Service (RaaS) model, which has become the dominant operational structure in the ecosystem. RaaS mirrors legitimate software-as-a-service businesses in its structure, complete with developer teams, affiliate programs, customer support, and even brand management.

In a RaaS operation, the core developers build and maintain the ransomware payload, the leak site infrastructure, the negotiation portal, and the payment processing systems. They recruit affiliates, who are the operators that actually conduct intrusions, move laterally through victim networks, exfiltrate data, and deploy the encryptor. Revenue is split between the developers and the affiliate, typically with the affiliate receiving 70-80% of the ransom payment and the developers taking the remainder.

This model has several consequences for defenders. First, it dramatically lowers the barrier to entry for conducting ransomware attacks. Affiliates do not need to develop malware, build infrastructure, or manage negotiations. They only need to gain access to networks and deploy the payload. Second, it creates a highly resilient ecosystem. When one RaaS platform is disrupted, affiliates simply migrate to another, carrying their skills and access with them. Third, it means that different attacks attributed to the same ransomware family may exhibit very different TTPs, because different affiliates bring different skill sets and toolkits to the operation.

RaaS Economics

The typical RaaS affiliate split is 70-80% to the affiliate and 20-30% to the developers. Top-performing affiliates may negotiate even more favorable terms. Some groups, like former LockBit operations, offered up to 80% affiliate share to attract the most skilled operators.

Common Initial Access Vectors

Understanding how ransomware operators gain their initial foothold is critical for prevention. While techniques evolve, several vectors consistently dominate.

Phishing and Social Engineering

Phishing remains one of the most reliable initial access methods. Ransomware affiliates use targeted spear-phishing emails with malicious attachments or links to deliver initial-stage malware such as QakBot, IcedID, or DarkGate. Callback phishing, where victims are directed to call a phone number and are then socially engineered into installing remote access tools, has become an increasingly prevalent technique, particularly among groups like BlackSuit.

Exploitation of Internet-Facing Vulnerabilities

Vulnerabilities in VPN appliances, firewalls, and remote access gateways are a primary entry point for ransomware operators. Cisco ASA, Fortinet FortiOS, Citrix NetScaler, and Ivanti Connect Secure have all been exploited at scale by ransomware groups. These devices sit at the network perimeter and, when compromised, provide direct access to internal networks. Patching these devices promptly is one of the highest-impact defensive actions an organization can take.

Compromised Remote Desktop Protocol (RDP)

Exposed RDP services with weak or reused credentials remain a common entry point, particularly for less sophisticated affiliates. Credential stuffing attacks, brute-force attacks, and the purchase of stolen credentials from initial access brokers on dark web marketplaces all feed this vector. Organizations that expose RDP to the internet without multi-factor authentication are at acute risk.

Supply Chain and Third-Party Compromise

Supply chain attacks have become a force multiplier for ransomware operations. By compromising a managed service provider (MSP), a software vendor, or a widely used platform, a single intrusion can provide access to hundreds or thousands of downstream victims. Cl0p's exploitation of file transfer platforms is the most prominent example, but attacks through compromised MSPs and IT management tools continue to be a significant vector.

The Double and Triple Extortion Model

The evolution from simple encryption to multi-layered extortion has fundamentally changed the ransomware threat model and the calculus that victims face when deciding how to respond.

Single extortion involves encrypting data and demanding payment for the decryption key. This was the original ransomware model and is increasingly rare as a standalone tactic because organizations with good backups can recover without paying.

Double extortion adds data exfiltration to encryption. Before deploying the encryptor, the threat actor copies sensitive data to infrastructure they control. If the victim refuses to pay for decryption, the threat actor threatens to publish the data on a leak site. This creates a secondary pressure point that backups cannot address. Double extortion is now the standard operating model for most ransomware groups.

Triple extortion layers additional pressure on top of double extortion. This can include DDoS attacks against the victim's infrastructure, direct contact with the victim's customers, patients, or business partners to inform them of the breach, threats to report the breach to regulators, or selling the stolen data to competitors. Some groups have even contacted journalists or posted on social media to maximize public pressure on victims.

This escalation means that even organizations with excellent backup and recovery capabilities must treat every ransomware incident as a data breach, with all the regulatory, legal, and reputational consequences that entails.

Most Targeted Industries

While ransomware affects every sector, certain industries face disproportionate targeting due to their perceived ability to pay, the criticality of their operations, and the sensitivity of the data they hold.

Healthcare

Healthcare remains one of the most heavily targeted sectors. The combination of life-safety urgency, sensitive patient data, legacy systems, and often limited security budgets makes healthcare organizations attractive targets. Disruption to clinical operations creates immediate pressure to pay, and the regulatory consequences of patient data exposure under HIPAA and similar frameworks add additional leverage.

Education

Schools, universities, and research institutions are frequently targeted due to their large, open networks, limited security resources, and the volume of personally identifiable information they hold. K-12 school districts are particularly vulnerable, as they often lack dedicated security staff entirely.

Manufacturing

Manufacturing organizations are targeted because operational technology (OT) disruption can halt production lines, causing immediate and quantifiable financial losses. The convergence of IT and OT networks means that a ransomware infection in the IT environment can cascade into operational shutdowns. Many manufacturers pay quickly because the cost of downtime exceeds the ransom.

Government

State and local government entities are frequent targets, particularly in North America. Limited budgets, aging infrastructure, and the essential nature of government services create a favorable risk-reward calculation for attackers. Attacks on government entities also generate significant media attention, which some groups use to enhance their reputation in criminal forums.

Ransomware Defense Framework

Defending against ransomware requires a layered approach that addresses prevention, detection, response, and recovery. No single control is sufficient; the goal is to create defense in depth that makes successful attacks less likely and limits their impact when they do occur.

Backup Strategy

Backups are the foundation of ransomware resilience, but only if they are properly designed and tested. Follow the 3-2-1-1 rule: maintain at least three copies of data, on two different media types, with one offsite and one immutable or air-gapped. Critically, backups must be tested regularly through actual restoration exercises. A backup that cannot be restored in a timely manner under pressure is not a backup.

Network Segmentation

Flat networks allow ransomware to spread rapidly once an attacker gains initial access. Effective network segmentation limits lateral movement by dividing the network into zones with enforced access controls between them. Pay particular attention to segmenting IT from OT environments, isolating sensitive data stores, and restricting administrative access to dedicated management networks.

Endpoint Detection and Response (EDR)

Modern EDR solutions are one of the most effective tools against ransomware. They provide behavioral detection that can identify ransomware activity even from previously unknown variants, along with the ability to isolate compromised endpoints and support forensic investigation. Ensure EDR is deployed across all endpoints, including servers, and that it is actively monitored. Unmonitored EDR is almost as ineffective as no EDR at all.

Incident Response Planning

Every organization should have a ransomware-specific incident response plan that has been tested through tabletop exercises. The plan should address technical containment and eradication, communication protocols for internal stakeholders, executives, legal counsel, and regulators, the decision framework for ransom payment, engagement of forensic and legal counsel, and notification requirements. The worst time to develop an incident response plan is during an incident.

Vulnerability and Patch Management

Given the prevalence of vulnerability exploitation as an initial access vector, timely patching of internet-facing systems is critical. Prioritize based on real-world exploitation data rather than CVSS scores alone. CISA's Known Exploited Vulnerabilities (KEV) catalog is an essential resource for this prioritization.

Identity and Access Management

Enforce multi-factor authentication on all remote access, email, VPN, and administrative interfaces. Implement the principle of least privilege for all accounts. Monitor for and respond to credential theft indicators. Disable or restrict RDP access, and audit service accounts regularly.

The Role of Law Enforcement Takedowns

Law enforcement operations against ransomware groups have intensified significantly, with coordinated international efforts achieving notable disruptions. Operation Cronos against LockBit, the FBI's action against BlackCat/ALPHV infrastructure, the takedown of the Hive ransomware group, and the disruption of QakBot infrastructure have all demonstrated that law enforcement can impose meaningful costs on ransomware operators.

However, the impact of these operations is often temporary. Ransomware groups have proven remarkably resilient, with operators rebuilding infrastructure, affiliates migrating to competing platforms, and new groups emerging to fill vacuums. The RaaS model's distributed nature means that disrupting the core platform does not eliminate the affiliates, who retain their skills and access.

The most durable impacts come from operations that combine technical disruption with arrests, asset seizures, and sanctions. When threat actors face personal consequences, the deterrent effect is stronger. International cooperation, particularly between Western law enforcement agencies and their counterparts in jurisdictions where threat actors operate, remains the critical bottleneck. The geopolitical dimension of ransomware, with many operators based in countries that are uncooperative with Western law enforcement, means that purely technical solutions are insufficient. This intersection of cybersecurity and geopolitics is a core focus of CyberGeoDigest's daily coverage.

Cyber Insurance Considerations

The cyber insurance market has matured significantly in response to the ransomware epidemic, and its evolution has important implications for how organizations approach ransomware defense.

Insurers have dramatically tightened underwriting requirements. Where policies were once available with minimal security scrutiny, insurers now routinely require evidence of specific controls before issuing coverage: multi-factor authentication, EDR deployment, offline backups, network segmentation, and incident response plans. Organizations that cannot demonstrate these controls face higher premiums, reduced coverage limits, or outright denial of coverage.

Several important considerations for organizations evaluating or managing cyber insurance:

How to Stay Informed

The ransomware landscape changes rapidly. Groups emerge, rebrand, and dissolve. New vulnerabilities create new attack surfaces. Law enforcement operations reshape the threat actor ecosystem. Staying current is not optional for security professionals; it is a core job requirement.

Effective approaches to staying informed include:

The ransomware threat is not going away. It is evolving, professionalizing, and becoming more deeply intertwined with geopolitical dynamics. Organizations that invest in understanding the threat, building layered defenses, and staying informed are in the strongest position to manage the risk. Browse the CyberGeoDigest archive to see how we cover these developments every day, providing the strategic context that security leaders need to make better decisions.

Stay ahead of ransomware threats

CyberGeoDigest delivers daily ransomware intelligence and geopolitical cyber threat coverage to your inbox. Free, curated, and built for security professionals.

Subscribe free →