IBM X-Force: AI and RaaS Fuel 49% Surge in Ransomware Groups

IBM X-Force Index: AI Lowers Barrier for Ransomware Attacks

INFORMATIONAL
February 26, 2026
5m read
Threat IntelligenceRansomwareMalware

Full Report

Executive Summary

The 2026 IBM X-Force Threat Intelligence Index, released February 26, 2026, highlights a significant democratization of cybercrime, largely fueled by Artificial Intelligence (AI). The report identifies a 49% year-over-year increase in the number of active ransomware groups, with smaller, more agile operators entering the fray. This growth is attributed to the accessibility of Ransomware-as-a-Service (RaaS) kits and the use of AI to craft more convincing phishing lures and automate attack stages. The report also underscores a persistent vulnerability problem, with nearly 40,000 new CVEs reported and 56% of them being exploitable without authentication. The findings urge organizations to prioritize identity security, implement strong AI governance, and adopt a continuous approach to vulnerability management.


Threat Overview

The central theme of the X-Force report is the lowering of the barrier to entry for cybercriminals. Key trends include:

  • Ransomware Proliferation: The RaaS model allows aspiring criminals to 'rent' ransomware infrastructure, eliminating the need for advanced technical skills. AI further aids these actors by helping them create more effective social engineering campaigns and identify targets.
  • Unauthenticated Vulnerabilities: For the third consecutive year, 56% of tracked vulnerabilities require no authentication to exploit. This means attackers can compromise systems directly over the internet without needing to steal credentials first, making public-facing applications a primary target.
  • Supply Chain Attacks: Compromises targeting the software development and deployment pipeline have increased nearly fourfold in five years, as attackers recognize the high ROI of compromising one vendor to access many of their customers.

Technical Analysis

The report details how these trends manifest in real-world attacks. For example, it cites an incident where a popular application server vulnerability allowed unauthenticated attackers to upload arbitrary files, leading directly to remote code execution (RCE) and full system compromise. This aligns with MITRE ATT&CK techniques such as T1190 - Exploit Public-Facing Application.

The rise of AI-powered attacks means defenders will face more sophisticated and frequent social engineering attempts. AI can be used to:

  • Generate highly convincing, personalized phishing emails at scale (T1566.001 - Phishing: Spearphishing Attachment).
  • Create deepfake audio or video for vishing or business email compromise (BEC) attacks.
  • Automate reconnaissance to quickly identify vulnerable systems and valuable targets.

Impact Assessment

The trends identified in the IBM report point to a more challenging and high-velocity threat environment for organizations of all sizes.

  • Increased Attack Volume: The lower barrier to entry means more attackers are conducting more campaigns, increasing the likelihood of any given organization being targeted.
  • Faster Exploitation: The time between a vulnerability's disclosure and its mass exploitation continues to shrink, putting immense pressure on security teams to patch quickly.
  • Eroding Trust: The surge in supply chain attacks and sophisticated phishing erodes trust in both software vendors and digital communications, complicating business operations.

IOCs

As a trend report, this document does not contain specific, actionable IOCs.


Detection & Response

  • Behavioral Analytics: With AI generating novel malware and phishing lures, signature-based detection is becoming less effective. Organizations need to invest in behavioral analytics (UEBA) to detect anomalous activity, regardless of the specific tool used.
  • Identity Threat Detection and Response (ITDR): Focus on monitoring authentication and access patterns. An alert on an impossible travel scenario or a user accessing a critical resource for the first time is a strong indicator of compromise.
  • Attack Surface Management (ASM): Continuously scan for and identify all internet-facing assets to find and remediate unauthenticated vulnerabilities before attackers do.

Mitigation

IBM X-Force provides several high-level recommendations:

  1. Treat Identity as Critical Infrastructure: Mandate phishing-resistant MFA (like FIDO2/passkeys) across the enterprise. This is the single most effective control against credential-based attacks. This aligns with D3FEND's Multi-factor Authentication (D3-MFA).
  2. Implement AI Governance: As organizations adopt AI, they must also implement strong governance to secure their AI models and data from poisoning, theft, or misuse. At the same time, they must prepare their defenses for AI-driven attacks.
  3. Prioritize Vulnerability Management: Adopt a risk-based approach to patching. Prioritize vulnerabilities on internet-facing systems, especially those that are unauthenticated and known to be exploited. This is a core part of D3FEND's Software Update (D3-SU).
  4. Strengthen Supply Chain Security: Implement a robust third-party risk management program and adopt principles like zero trust to limit the impact of a compromise at a software vendor.

Timeline of Events

1
February 26, 2026
IBM releases the 2026 X-Force Threat Intelligence Index.
2
February 26, 2026
This article was published

MITRE ATT&CK Mitigations

Implementing phishing-resistant MFA is the most effective defense against credential-based attacks, which remain a primary initial access vector.

Mapped D3FEND Techniques:

A risk-based vulnerability management program is crucial to address the large number of unauthenticated vulnerabilities being discovered.

Mapped D3FEND Techniques:

With AI making phishing more sophisticated, continuous user security awareness training is more important than ever to build a resilient human firewall.

Given the rise in supply chain attacks, a robust third-party risk management program is essential.

D3FEND Defensive Countermeasures

To counter the rise in both credential theft and AI-powered phishing, organizations must prioritize the deployment of strong, phishing-resistant multi-factor authentication. This means moving beyond simple SMS or push-based MFA, which are susceptible to social engineering, and adopting standards like FIDO2/WebAuthn that enable the use of passkeys or physical security keys. These methods are cryptographically bound to specific services, making them immune to phishing. By treating identity as the new perimeter and securing it with the strongest possible authentication, organizations can neutralize a vast array of initial access techniques used by the growing number of ransomware actors.

The report's finding that 56% of vulnerabilities are unauthenticated highlights the critical importance of Attack Surface Management (ASM). Organizations need to have a continuous, automated process for discovering and inventorying all of their internet-facing assets, including web servers, APIs, cloud services, and forgotten subdomains. Once the external attack surface is known, it must be continuously scanned for vulnerabilities. An ASM program allows security teams to prioritize patching for the most exposed and highest-risk systems, directly addressing the threat of unauthenticated RCEs that ransomware groups and other attackers actively seek to exploit.

Sources & References

IBM X-Force Threat Intelligence Index 2026
IBM Newsroom (newsroom.ibm.com) February 26, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

IBM X-ForceThreat IntelligenceRansomwareAIRaaSVulnerability

📢 Share This Article

Help others stay informed about cybersecurity threats