The year 2025 has seen an alarming 50% rise in ransomware activity compared to 2024, with cybersecurity firm Cyble tracking 5,010 claimed attacks as of October 21. This dramatic increase has occurred during a period of significant upheaval in the ransomware-as-a-service (RaaS) market. While established players like RansomHub have declined, new groups have risen to fill the void. The Qilin ransomware group has emerged as the current market leader, responsible for 441 victim posts between April and September. Another new group, The Gentlemen, has also made a notable entrance with 46 claimed victims. The United States continues to be the primary target, and the industrial sector is the most heavily victimized. The report highlights a tactical shift towards using PowerShell as the dominant tool for executing ransomware payloads.
The ransomware landscape is more dynamic and fragmented than ever. The 50% year-over-year increase indicates that law enforcement disruptions, while impactful, have not slowed the overall pace of attacks. Affiliates quickly migrate to new or rebranded RaaS operations, ensuring the business model's continuity.
Key Threat Actors:
Primary Targets:
Threat actors are leveraging common, legitimate tools to carry out their attacks, a tactic known as Living off the Land (LotL). This makes detection more challenging.
Common TTPs:
T1059.001 - PowerShell is the dominant vector, used in 77.7% of tool-based ransomware activity to execute malicious payloads and scripts.T1021.002 - SMB/Windows Admin Shares using tools like PsExec was observed in 66.5% of campaigns.net commands were used for command execution in over 70% of attacks, often for creating accounts or modifying permissions.This reliance on built-in and common administrative tools demonstrates a shift towards stealth and operational efficiency.
The 50% surge in attacks translates to significant financial and operational damage for thousands of organizations globally. For the industrial sector, a ransomware attack can halt production lines, disrupt supply chains, and even create safety risks. The double extortion model, where data is both encrypted and stolen for public release on leak sites, adds the cost of data breach notification, regulatory fines, and long-term reputational damage to the immediate costs of system recovery and downtime.
IEX (New-Object Net.WebClient).DownloadString), and suspicious command-line arguments. Reference D3FEND Decoy File by placing honey-scripts that trigger alerts when executed.PsExec and network scanners. While legitimate uses exist, their execution from non-administrator workstations or at unusual times should be a high-priority alert.vssadmin.exe delete shadows), and attempts to disable security software.AllSigned or Restricted.Qilin ransomware victim count surges to 701, fueled by RansomHub affiliates, becoming 2025's most prolific group with significant high-profile impacts.
Use application control policies like AppLocker to restrict the execution of unauthorized scripts and tools, including PowerShell.
Mapped D3FEND Techniques:
Maintain regular, tested, and immutable backups to ensure recovery from a ransomware attack without paying the ransom.
Segmenting the network can contain a ransomware outbreak and prevent it from spreading to critical assets.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats