Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Ransomware Victim Numbers Rise, Despite Drop in Active Extortion Group
News

Ransomware Victim Numbers Rise, Despite Drop in Active Extortion Group

Team-CWDBy Team-CWDJanuary 31, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Ransomware gangs claimed a deluge of victims during the final quarter of 2025, despite a decline in the number of active ransomware groups, analysis by cybersecurity researchers at ReliaQuest has revealed.

As detailed in the company’s Ransomware and Cyber Extortion in Q4 2025 report, the number victim organizations which had their data posted on ransomware leak sites in the final three months of 2025 was up by 50% compared with the previous quarter, and increased by 40% compared with the same period in the previous year.

The organizations which had data published on leak sites were victims of ransomware attacks and the perpetrators released some of the stolen data during their intrusion to put additional pressure on the target to pay a ransom.

Despite the rise in data leaks, ReliaQuest’s analysis of attacks suggested that the number of ransomware groups has declined. However, the most organized operators have increased their output.

“Regardless of which groups rise or fall quarter to quarter, the sustained increase in data-leak site posts emphasizes that ransomware remains a persistent, growing threat even as individual group names come and go,” said Gautham Ashok, cyber threat intelligence analyst at ReliaQuest.

Qilin, Akira and Sinobi Drive Late-2025 Ransomware Wave

Top-tier ransomware-as-a-service (Raas) schemes continue to focus on speed of execution by gaining access to networks as quickly as possible to avoid malicious activity being detected before they execute the ransomware.

According to the ReliaQuest Threat Research Team, the most prolific ransomware groups during the final portion of 2025 were Qilin, Akira and Sinobi.

Qilin ransomware accounts for the largest number of compromised organizations with over 450 victims, including Japanese brewer Asahi. Qilin is followed by Akira ransomware, which analysis suggests claimed over 200 victims.

The third most prolific group on data-leak sites during the period was Sinobi, which saw listings surge by over 300% compared with the previous quarter. Researchers noted that the ransomware emerged in July 2025 and is likely an offshoot of Lynx ransomware.

Lynx remains an active ransomware operation, but only accounts for a small percentage of incidents compared to Sinobi.

ReliaQuest recommends that to have the best chance of defending against and disrupting ransomware attacks, organizations should deploy defences like multi-factor authentication (MFA) to harden accounts against phishing attacks, as well as strengthen data exfiltration monitoring tools.

“Groups may disband, affiliate rosters may churn, and tools may get slicker, but attack patterns stay stubbornly familiar quarter after quarter,” said Ashok

“If security teams can reliably detect and disrupt credential-based access, living-off-the-land (LotL)-based lateral movement, privilege escalation and data exfiltration, then networks will remain resilient to whichever dominant group of the quarter,” he concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWho Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents
Next Article New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector
Team-CWD
  • Website

Related Posts

News

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026
News

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
News

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

What it is and how to protect yourself

January 8, 2026

What are brushing scams and how do I stay safe?

December 24, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.