Ransomware victim numbers rise despite fewer active extortion groups

March 22, 20268 min read11 sources
Share:
Ransomware victim numbers rise despite fewer active extortion groups

Background and context

Ransomware reporting often treats the number of named extortion groups as a proxy for overall risk. The latest reporting cited by Infosecurity Magazine points in the opposite direction: victim numbers reportedly climbed in Q4 2025 even as the number of active extortion groups fell, with data leaks up 50% according to ReliaQuest research Infosecurity Magazine. If that pattern holds, it suggests the criminal market is consolidating rather than weakening.

That interpretation fits several longer-running trends documented before 2025. Law-enforcement pressure has repeatedly disrupted major brands, but affiliates, brokers, and malware operators tend to regroup under new names or move to rival programs. The US Cybersecurity and Infrastructure Security Agency and the FBI have both warned that ransomware actors continue to adapt their tactics, especially around credential theft, exploitation of internet-facing systems, and data theft used for extortion CISA StopRansomware. Europol has also described ransomware as an ecosystem supported by access brokers, malware developers, hosting providers, and money-laundering networks rather than a small set of standalone gangs Europol.

That distinction matters. A drop in visible brands does not necessarily mean fewer intrusions. It can just as easily mean surviving groups are taking a larger share of attacks, former affiliates are clustering around a smaller number of operations, or leak-site behavior has become more aggressive. Public leak sites are also an imperfect measure: some victims never get posted, some entries are duplicates or delayed, and some incidents involve pure data extortion without widespread file encryption. Even so, a 50% rise in leaked data or leak-site postings would be a meaningful signal that coercive pressure on victims is increasing.

Why fewer groups can produce more victims

There are several plausible reasons victim counts can rise while the number of active extortion groups drops.

First, consolidation can improve efficiency. Ransomware-as-a-service programs often rely on affiliate networks. When a well-known brand disappears, its affiliates do not vanish with it; they migrate. That can leave fewer brands competing for a similar pool of criminals, concentrating talent and access in the hands of the operators with the best infrastructure, negotiation playbooks, and monetization channels. Google-owned Mandiant has repeatedly noted that financially motivated intrusion sets are flexible and quick to change branding, tooling, and partner relationships Google Cloud / Mandiant.

Second, the economics of extortion increasingly reward data theft. In many incidents, stealing sensitive files is enough to pressure a victim, even if encryption is partial or absent. That lowers operational friction. Actors can move faster, target more organizations, and threaten public exposure through leak sites. This shift has been tracked across multiple industry reports, including ransomware and extortion trend analyses from Chainalysis and Unit 42 Chainalysis, Palo Alto Networks Unit 42.

Third, improvements in initial access can increase victim volume. Access brokers sell footholds into corporate environments, often obtained through stolen credentials, phishing, infostealer malware, exposed remote services, or unpatched edge devices. Once access is commoditized, extortion groups can spend less time breaking in and more time moving laterally, exfiltrating data, and negotiating. Advisories from CISA and partner agencies have repeatedly highlighted exploited VPN appliances, remote management tools, and identity infrastructure as common entry points CISA Advisories.

Technical details behind the trend

Without the underlying ReliaQuest report text, the safest reading is that the Q4 2025 figures describe leak-site or victim-posting activity rather than a complete census of every ransomware intrusion. That methodology point is important because “victim” can mean different things: a confirmed compromise, a public shaming post, a negotiation case, or a repost of an older incident. Any serious interpretation should check whether ReliaQuest counted unique victims, how it handled duplicates, and whether it distinguished encryption-led ransomware from data-theft extortion.

From a technical standpoint, ransomware operations usually follow a familiar chain. Initial access often comes through phishing, stolen credentials, exposed RDP, vulnerable edge appliances, or compromised third-party tools. Attackers then establish persistence, escalate privileges, and move laterally using legitimate administrative tools such as PowerShell, PsExec, WMI, Remote Desktop, or scheduled tasks. Data is staged and exfiltrated using utilities like Rclone, WinSCP, or cloud storage channels before encryption is triggered, if encryption is used at all. Security vendors including Sophos and Microsoft have documented how common “living off the land” techniques remain in these intrusions Sophos, Microsoft Security Blog.

The rise in data leaks also points to stronger emphasis on exfiltration and public pressure. Leak sites are not just billboards; they are part of the extortion workflow. They create deadlines, threaten regulators and customers, and raise the cost of refusing payment. For victims, that means the harm is no longer limited to downtime. Exposure of contracts, employee records, source code, legal files, and customer data can trigger breach notification requirements, regulatory scrutiny, and follow-on fraud.

Another technical factor is the continuing abuse of weak identity controls. Single-factor remote access, poor credential hygiene, and unmanaged service accounts remain common paths to compromise. Organizations that rely on perimeter controls alone are vulnerable when attackers come in through valid accounts. Enforcing phishing-resistant MFA, hardening privileged access, and protecting remote connections with strong encryption and session security can reduce this risk, but only if paired with monitoring and rapid patching.

Impact assessment

The immediate impact falls on organizations whose data is stolen, encrypted, or both. But the wider effect reaches customers, employees, suppliers, and public-sector users whose information or services are caught in the blast radius. Sectors with low tolerance for downtime, such as healthcare, manufacturing, education, logistics, and local government, are especially exposed because attackers know business interruption increases the chance of payment. CISA and FBI guidance has repeatedly emphasized that ransomware can disrupt clinical care, public services, and supply chains far beyond the initial target FBI IC3, CISA Ransomware Guide.

Severity depends on three variables: whether data was exfiltrated, how deeply the attackers reached into identity and backup systems, and how quickly the victim can contain the intrusion. A company with isolated backups and limited data theft may recover with painful but manageable disruption. A company that loses domain control, backup integrity, and sensitive data can face weeks of recovery, legal exposure, reputational damage, and long-tail costs from credit monitoring, incident response, and litigation.

If the reported Q4 surge reflects a broader market pattern, the strategic implication is clear: defenders should not read fewer extortion groups as good news. A smaller set of more capable operators can generate equal or greater harm than a larger set of less organized crews. In practical terms, that means boardrooms should expect ransomware risk to remain high even after major takedowns or splashy law-enforcement announcements.

How to protect yourself

For organizations, the most effective steps are well known but still unevenly implemented.

Patch internet-facing systems quickly. Prioritize VPN gateways, firewalls, remote access tools, identity systems, hypervisors, and file transfer products. Many high-impact ransomware intrusions begin with exposed edge devices or known vulnerabilities.

Enforce phishing-resistant MFA. Apply it to VPNs, cloud admin accounts, email, remote management portals, and privileged accounts. Disable legacy authentication where possible.

Harden identity and privilege. Audit service accounts, rotate credentials, remove local admin rights, and use tiered administration. Monitor impossible travel, unusual logins, and privilege escalation.

Segment the network. Separate critical servers, backups, and administrative systems from user workstations and general-purpose network zones. Limit lateral movement by restricting SMB, RDP, and remote admin tools.

Protect and test backups. Keep offline or immutable backups, store recovery credentials separately, and run restoration drills. Backups that cannot be restored under pressure are not a safety net.

Watch for exfiltration, not just encryption. Alert on bulk transfers, unusual archive creation, suspicious use of Rclone or file-sync tools, and connections to unsanctioned storage services.

Prepare for public extortion. Have legal, communications, and incident-response plans ready before an incident. Leak-site publication can happen quickly, sometimes before internal teams fully understand the scope.

Secure remote access and user privacy. Remote workers should avoid exposing administrative services directly to the internet and should use trusted security controls, including a reputable VPN service where appropriate, alongside MFA and device management.

For individuals, the advice is simpler: use unique passwords with a password manager, enable MFA on important accounts, keep devices updated, be wary of urgent email attachments and login prompts, and monitor breach notifications from employers or service providers. Many ransomware incidents spill into identity theft and fraud long after the initial attack.

What to watch next

The key question is whether the Q4 2025 numbers reflect a one-quarter spike or a deeper shift toward a smaller, more productive extortion market. To answer that, readers should look for the underlying ReliaQuest methodology, quarter-over-quarter comparisons, and independent confirmation from other tracking firms. If multiple datasets show rising leak activity alongside fewer named groups, the message is hard to miss: the ransomware economy is getting more concentrated, not less dangerous.

Share:

// FAQ

How can ransomware victims increase if there are fewer extortion groups?

Because surviving groups may be more efficient, absorb displaced affiliates, rely on access brokers, and focus more heavily on data-theft extortion. Fewer brands does not necessarily mean fewer attacks.

Does a rise in data leaks always mean more encryption attacks?

No. Many modern incidents involve data theft first, with encryption used selectively or not at all. Leak-site activity can rise even when some actors shift toward pure extortion.

Who is most at risk from this trend?

Organizations with exposed internet-facing systems, weak identity controls, poor segmentation, and untested backups face the highest risk. Healthcare, manufacturing, education, government, and logistics are frequent targets.

What is the most important defensive step against ransomware?

There is no single fix, but fast patching of exposed systems, phishing-resistant MFA, protected backups, and monitoring for data exfiltration provide the strongest combined reduction in risk.

// SOURCES

// RELATED

European Commission confirms cloud data breach impacting staff

The European Commission confirms a data breach in its AWS cloud infrastructure due to a misconfiguration, exposing employee data and highlighting key

6 min readApr 1

OpenAI patches ChatGPT data exfiltration flaw and Codex GitHub token vulnerability

OpenAI patched critical flaws in ChatGPT and Codex that could have leaked user data and internal source code, according to Check Point Research.

5 min readApr 1

Pro-Iranian hacking group claims breach of former US official Kash Patel's personal accounts

A pro-Iranian hacking group known as Homeland Justice claims it breached the personal accounts of former U.S. official Kash Patel, raising concerns.

6 min readApr 1

Iranian-linked hackers breach former US official Kash Patel's personal email

An Iranian-linked hacking group known as Handala has breached the personal email of former U.S. official Kash Patel, leaking sensitive personal docume

6 min readApr 1