Ransomware Attacks Surge 50% in 2025; Qilin Group Takes the Lead

Ransomware Landscape Shifts as Attacks Increase 50% in 2025, with Qilin and The Gentlemen Emerging as Dominant Threats

HIGH
October 25, 2025
October 27, 2025
5m read
RansomwareThreat ActorThreat Intelligence

Related Entities(initial)

Threat Actors

Qilin The GentlemenSinobiAkira

Organizations

Cyble Trellix

Products & Tech

PowerShell PsExec SoftPerfect Network Scanner

Full Report(when first published)

Executive Summary

The year 2025 has seen an alarming 50% rise in ransomware activity compared to 2024, with cybersecurity firm Cyble tracking 5,010 claimed attacks as of October 21. This dramatic increase has occurred during a period of significant upheaval in the ransomware-as-a-service (RaaS) market. While established players like RansomHub have declined, new groups have risen to fill the void. The Qilin ransomware group has emerged as the current market leader, responsible for 441 victim posts between April and September. Another new group, The Gentlemen, has also made a notable entrance with 46 claimed victims. The United States continues to be the primary target, and the industrial sector is the most heavily victimized. The report highlights a tactical shift towards using PowerShell as the dominant tool for executing ransomware payloads.


Threat Overview

The ransomware landscape is more dynamic and fragmented than ever. The 50% year-over-year increase indicates that law enforcement disruptions, while impactful, have not slowed the overall pace of attacks. Affiliates quickly migrate to new or rebranded RaaS operations, ensuring the business model's continuity.

Key Threat Actors:

  • Qilin: The most active group, leading in victim claims for five of the last six months. Notably conducted the "KoreanLeak" campaign targeting South Korean asset management firms.
  • The Gentlemen: A new but sophisticated group that has quickly established a presence.
  • Sinobi & Akira: Other active groups contributing to the high volume of attacks.

Primary Targets:

  • Geographies: The United States is disproportionately targeted, accounting for 55% of victims (1,285 incidents). Other major targets include Germany, France, Canada, and the UK.
  • Industries: The industrial sector is the most affected, with 890 posts (36.57% of attacks), followed by manufacturing and chemical industries.

Technical Analysis

Threat actors are leveraging common, legitimate tools to carry out their attacks, a tactic known as Living off the Land (LotL). This makes detection more challenging.

Common TTPs:

  • Execution: T1059.001 - PowerShell is the dominant vector, used in 77.7% of tool-based ransomware activity to execute malicious payloads and scripts.
  • Lateral Movement: T1021.002 - SMB/Windows Admin Shares using tools like PsExec was observed in 66.5% of campaigns.
  • Discovery: SoftPerfect Network Scanner was used for network reconnaissance in 54.2% of cases to identify targets within a compromised network.
  • Command and Control: Standard net commands were used for command execution in over 70% of attacks, often for creating accounts or modifying permissions.

This reliance on built-in and common administrative tools demonstrates a shift towards stealth and operational efficiency.

Impact Assessment

The 50% surge in attacks translates to significant financial and operational damage for thousands of organizations globally. For the industrial sector, a ransomware attack can halt production lines, disrupt supply chains, and even create safety risks. The double extortion model, where data is both encrypted and stolen for public release on leak sites, adds the cost of data breach notification, regulatory fines, and long-term reputational damage to the immediate costs of system recovery and downtime.

Detection & Response

  • PowerShell Logging: Ensure enhanced PowerShell script block logging and module logging is enabled and forwarded to a central SIEM. Look for obfuscated scripts, commands that download content from the internet (IEX (New-Object Net.WebClient).DownloadString), and suspicious command-line arguments. Reference D3FEND Decoy File by placing honey-scripts that trigger alerts when executed.
  • Monitor Admin Tools: Closely monitor the usage of tools like PsExec and network scanners. While legitimate uses exist, their execution from non-administrator workstations or at unusual times should be a high-priority alert.
  • Behavioral Analysis: Deploy EDR solutions that use behavioral analysis to detect ransomware activity, such as rapid file encryption (D3FEND File Analysis), deletion of volume shadow copies (vssadmin.exe delete shadows), and attempts to disable security software.

Mitigation

  1. Restrict PowerShell: Use application control policies (like AppLocker or WDAC) to restrict PowerShell execution to only signed scripts and authorized administrators. Set the PowerShell execution policy to AllSigned or Restricted.
  2. Network Segmentation: Segment the network to prevent lateral movement. Critical systems, especially in industrial environments (OT/ICS), should be isolated from the corporate IT network.
  3. Immutable Backups: Maintain offline and immutable backups of critical data. Regularly test the restoration process to ensure recovery is possible after an attack.
  4. Multi-Factor Authentication (MFA): Enforce MFA on all remote access points (VPNs, RDP) and for all privileged accounts to prevent initial access via compromised credentials.

Timeline of Events

1
October 21, 2025
Cyble reports 5,010 claimed ransomware attacks in 2025, a 50% increase from the same period in 2024.
2
October 25, 2025
This article was published

Article Updates

October 27, 2025

Qilin ransomware victim count surges to 701, fueled by RansomHub affiliates, becoming 2025's most prolific group with significant high-profile impacts.

MITRE ATT&CK Mitigations

Use application control policies like AppLocker to restrict the execution of unauthorized scripts and tools, including PowerShell.

Mapped D3FEND Techniques:

Maintain regular, tested, and immutable backups to ensure recovery from a ransomware attack without paying the ransom.

Segmenting the network can contain a ransomware outbreak and prevent it from spreading to critical assets.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Enable comprehensive logging for PowerShell and command-line activity to detect and investigate suspicious behavior.

Mapped D3FEND Techniques:

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RansomwareQilinThe GentlemenPowerShellIndustrial SectorThreat IntelligenceRaaS

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading