BitDepthFeatured

Ransomware report notes fourth quarter 2025 attack surge

4 Mins read
  • • Ransomware attacks surged in December 2025, with a 58% year-over-year increase in observed victims.
  • • Mid-tier groups like Qilin and Akira have increased their operations.
  • • Increase in BYOVD attacks and the use of new toolkits like PowerTool and Killer Ultra, lowering the barrier to entry for attackers.
  • • AI tools are used to determine ransom amounts, create visually alarming ransom notes

Above: Illustration by igorstarr996/DepositPhotos.

BitDepth 1548 for February 02, 2026

The summary sentence of the GRIT Ransomware and CyberThreat report for 2026 is instructive: “Progress against ransomware and cybercrime remains consistently visible, albeit slow and largely reactive in nature.”

The GuidePoint Research and Intelligence Team has been assessing ransomware threats since 2022, using information from publicly available resources, including statements by threat groups. Alleged victims do not confirm its findings.

Attacks during the year trended low through the second and third quarter, according to the report, before surging in December to register a 58% year-over-year increase in observed ransomware victims, claimed across 124 distinct and named groups.

Formerly mid-tier groups, notably Qilin and Akira have stepped up their operations after law enforcement efforts disrupted attacks by LockBit and Alphv.

GuidePoint analysts suggest that these players have absorbed affiliates left behind after law enforcement operations against LockBit and allegations of chaos in the RansomHub operation.

An early surge in 2025 reporting was attributed to the data extortion group Clop, which launched a massive campaign in 2024 but posted its victim lists in early 2025.

Ransomware victims posted during 2025. All charts courtesy the GRIT 2026 report.

The count of victims reported by ransomware groups during 2025 is daunting. GuidePoint counted 7,515 victims, which it gathered from the postings of 124 ransomware groups.

Ransomware attacks follow an ability to pay profile. The manufacturing industry accounted for the largest share of victim organisations, 1060, or 14% overall. Technology, Retail and Wholesale and Healthcare businesses and organisations rounded out the majority profile.

Businesses in the US accounted for 74% of attacks, which mirrors the general profile of attack vectors, which overwhelmingly target US companies. The US was targeted for 55% of reported victims.

The report noted a significant increase in attacks on law firms and attorney’s offices, more than doubling from 196 in 2024 to 455 in 2025.

These attacks may be targeting the sensitive data held by law firms as well as the promise of cybersecurity insurance payouts by businesses likely to have invested in such measures.

What are the attack vectors?

The report notes that ransomware groups targeted “vulnerability exploitation campaigns leveraging zero-day and critical Common Vulnerabilities and Exposures (CVEs) in internet-facing enterprise applications and network perimeter devices.”

Victims posted by the leading ransomware groups.

These vulnerabilities disproportionately affected Microsoft products in 2025. Key Exploited Vulnerabilities (KEVs) doubled from seven vulnerabilities in the first quarter of 2024 to 16 in the first quarter of 2025.

Fortinet and Cisco were the top targets among infrastructure vendors in 2025. The 2024-2025 surge by Clop targeted Oracle eBusiness Suite, but Bring Your Own Vulnerable Driver attacks have heated up since 2024.

New attack toolkits such as PowerTool and Killer Ultra turned malware that previously required Windows internals expertise into point and click attack vectors, lowering the barrier to entry for ransomware affiliates pursuing these intrusions.

A dark-web site lists 500 legitimate legacy device drivers, trusted but vulnerable, that attackers can exploit.

The report suggests that the drop in attacks in the second and third quarters of 2025 was attributable to the impact of Operation Secure, a law enforcement response that spanned 26 countries that identified and dismantled more than 20,000 malicious IPs and domains that distributed 69 info-stealer variants.

Without this ready source of stolen credentials, a revenue stream for threat actors was temporarily stemmed.

Unfortunately, limiting access to stolen credentials has only meant that ransomware groups have become more creative in how they seek entry points for their destructive payloads.

Payment rates have also dropped. While both Qilin and Akira received “outlier payments in the millions,” such windfalls accounted for less than ten percent of observed payments. Average ransomware payments ranged between US$366,000 and $457,000.

Lower payment rates have dropped the average return on investment to between US$47,000 and $90,000 overall and these payments must be shared between affiliate and core group (usually 80/20).

Payments made to Qilin in 2025.

Reduced revenue has not stemmed any enthusiasm for ransomware groups. Qilin extorted at least $47million in cryptocurrency in 2025, with higher ransom demands but lower rates of payments.

Out of 869 posted victims, only 128 made payments. Legislative bans on ransomware payments are still spotty, with the UK introducing its Targeted Ban on payments by public sector organisations.

The International Counter Ransomware Initiative is a non-binding pledge by 48 nations not to make payments, but it is voluntary. North Carolina (2021) and Florida (2022) introduced legislative bans while Australia has mandatory reporting to the government of ransoms paid.

Artificial Intelligence is yet to fully flower as an aspect of these attacks. AI-powered chatbots and AI generated content for language translation and message personalisation improve social engineering tactics and ransomware operators use AI to analyse exfiltrated data to make demands based on financial records and data sensitivity.
Agentic AI is still in its nascent stages, but Anthropic reported in August 2025 that it had quashed an effort to use Claude Code to “vibe code” attacks.

“Claude Code was used to automate reconnaissance, harvesting victims’ credentials, and penetrating networks,” Anthropics noted in a blog post on its findings.

“Claude was allowed to make both tactical and strategic decisions, such as deciding which data to exfiltrate, and how to craft psychologically targeted extortion demands.

Claude analyzed the exfiltrated financial data to determine appropriate ransom amounts, and generated visually alarming ransom notes that were displayed on victim machines.”

Vibe coding using the AI tool was also used to create malware that was sold on the dark web to ransomware affiliates.

This points to an alarming new vector for ransomware in 2026, as more unskilled operators leverage AI tools to level up their gathering of credentials and seek new points of weakness in business defenses.

“The year 2026 will likely see continued convergence of criminal innovation and AI capabilities, demanding that defenders adopt equally sophisticated technologies and intelligence-led approaches,” GuidePoint warned.

“The organizations best positioned to withstand this evolution will be those that prioritize rapid detection and response, implement comprehensive identity and access controls, and integrate AI-powered defenses as essential components of their security architecture rather than experimental additions.”

The GuidePoint report is here.

Ransomware report notes fourth quarter 2025 attack surge

Ransomware report notes fourth quarter 2025 attack surge

"The year 2026 will likely see continued convergence of criminal innovation and AI capabilities, demanding that defenders adopt equally sophisticated technologies and intelligence-led approaches."
Read More
Hands-on with Apple’s Creator Studio as a non-subscriber

Hands-on with Apple’s Creator Studio as a non-subscriber

It’s not hard to imagine someone in a hurry clicking madly along only to find themselves a subscriber through haste.
Read More
Apple flirts with subscription software

Apple flirts with subscription software

Are we all being coaxed and tranquilized into accepting as a norm, the idea that the computing tools we pay for are not things we own anymore?
Read More
So long, and thanks for all the fish

So long, and thanks for all the fish

The only way forward for journalism is immersion in the unfamiliar by both journalists and their managers.
Read More
Cyberedge reports on cybersecurity trends

Cyberedge reports on cybersecurity trends

Mobile and web application vulnerabilities affect 90.9 per cent of respondents in the 2025 report and these weaknesses are contributing to the areas of greatest cybersecurity concern.
Read More
Samsung’s ZFlip 7 shows steady improvement

Samsung’s ZFlip 7 shows steady improvement

Being able to use a powerful wide-angle lens in what is essentially a next level selfie mode is a big step up for the phone's target market.
Read More
Digital New Year’s resolutions

Digital New Year’s resolutions

Every computer and smartphone has a digital calendar system, which means that you have a live appointment book capable of giving you reminders.
Read More
WiPay announces new strategy for services, payments

WiPay announces new strategy for services, payments

Are there enough bread and butter customers who need new options for travel, phone service and loan services to make those add-on businesses worth the time of WiPay.
Read More
Old Mac, new OS

Old Mac, new OS

The best OS versions to target are Sonoma and Sequoia because these systems are still receiving minor security and improvement updates.
Read More
Regional cybersecurity faces fire

Regional cybersecurity faces fire

Boards that are being formed now accept that both cybersecurity and Ethics, Compliance and Governance are critical components of their scope of responsibilities.
Read More
Unfinished symphonies

Unfinished symphonies

The market viability of creative projects often can't be realistically assessed until the work is done.
Read More
Do you know who your child is talking to?

Do you know who your child is talking to?

That gorgeous, soft-spoken Swedish girl who admires your boy-child might a retired Nigerian prince looking for a new revenue stream.
Read More
Windows on a Mac, 2025

Windows on a Mac, 2025

Software virtualisation solutions were a great solution for users who just needed to run one or two apps on Windows that weren't processor intensive.
Read More
An Affinity for Canva

An Affinity for Canva

Professionally oriented software that integrates seamlessly with a consumer grade design tool is next level gamesmanship.
Read More
When the cloud bursts

When the cloud bursts

Hyperscalers typically operate networks of hundreds of data centers with millions of servers distributed globally.
Read More
Encryption, privacy and public safety

Encryption, privacy and public safety

Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Read More
Big budget for tech, unclear spending strategy

Big budget for tech, unclear spending strategy

ICT is now the single largest line item under economic infrastructure spending in the 2026 PSIP with almost a third of that budget at $400 million.
Read More
Caribbean cryptocurrency concerns

Caribbean cryptocurrency concerns

In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Read More
Suddenly, 30 years later…

Suddenly, 30 years later…

It’s really difficult to get excited over shiny and new when you’ve seen how quickly that gloss gets tarnished and eventually rots.
Read More
A blanket ban on cryptocurrency is a Luddite’s strategy

A blanket ban on cryptocurrency is a Luddite’s strategy

The government has not made it clear to what extent the new bill is intended to deepen compliance requirements with the FATF.
Read More
Ransomware report notes fourth quarter 2025 attack surge Ransomware report notes fourth quarter 2025...
Hands-on with Apple’s Creator Studio as a non-subscriber Hands-on with Apple’s Creator Studio as...
Apple flirts with subscription software Apple flirts with subscription software
So long, and thanks for all the fish So long, and thanks for all...
Cyberedge reports on cybersecurity trends Cyberedge reports on cybersecurity trends
Samsung’s ZFlip 7 shows steady improvement Samsung’s ZFlip 7 shows steady improvement
Digital New Year’s resolutions Digital New Year’s resolutions
WiPay announces new strategy for services, payments WiPay announces new strategy for services,...
Old Mac, new OS Old Mac, new OS
Regional cybersecurity faces fire Regional cybersecurity faces fire
Unfinished symphonies Unfinished symphonies
Do you know who your child is talking to? Do you know who your child...
Windows on a Mac, 2025 Windows on a Mac, 2025
An Affinity for Canva An Affinity for Canva
When the cloud bursts When the cloud bursts
Encryption, privacy and public safety Encryption, privacy and public safety
Big budget for tech, unclear spending strategy Big budget for tech, unclear spending...
Caribbean cryptocurrency concerns Caribbean cryptocurrency concerns
Suddenly, 30 years later… Suddenly, 30 years later…
A blanket ban on cryptocurrency is a Luddite’s strategy A blanket ban on cryptocurrency is...

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
FeaturedPress Releases

Samsung reports US$231 billion in 2025 revenue

2 Mins read
Samsung reported US$231 billion in annual revenue and US$30.5 billion in operating profit.
FeaturedNews Briefs

Open AI announces education partnership with TT

1 Mins read
We will work with governments and university consortia to bring AI into education systems to personalize learning, reduce administrative burden, and prepare students for the workforce
FeaturedOpinion

Journalism and news monitoring

4 Mins read
News monitoring platforms are quietly revolutionizing investigative journalism.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
×
BitDepthFeatured

Regional cybersecurity faces fire

0
Share your perspective in the comments!x
()
x