The year 2025 has seen an alarming 50% rise in ransomware activity compared to 2024, with cybersecurity firm Cyble tracking 5,010 claimed attacks as of October 21. This dramatic increase has occurred during a period of significant upheaval in the ransomware-as-a-service (RaaS) market. While established players like RansomHub have declined, new groups have risen to fill the void. The Qilin ransomware group has emerged as the current market leader, responsible for 441 victim posts between April and September. Another new group, The Gentlemen, has also made a notable entrance with 46 claimed victims. The United States continues to be the primary target, and the industrial sector is the most heavily victimized. The report highlights a tactical shift towards using PowerShell as the dominant tool for executing ransomware payloads.
The ransomware landscape is more dynamic and fragmented than ever. The 50% year-over-year increase indicates that law enforcement disruptions, while impactful, have not slowed the overall pace of attacks. Affiliates quickly migrate to new or rebranded RaaS operations, ensuring the business model's continuity.
Key Threat Actors:
Primary Targets:
Threat actors are leveraging common, legitimate tools to carry out their attacks, a tactic known as Living off the Land (LotL). This makes detection more challenging.
Common TTPs:
T1059.001 - PowerShell is the dominant vector, used in 77.7% of tool-based ransomware activity to execute malicious payloads and scripts.T1021.002 - SMB/Windows Admin Shares using tools like PsExec was observed in 66.5% of campaigns.net commands were used for command execution in over 70% of attacks, often for creating accounts or modifying permissions.This reliance on built-in and common administrative tools demonstrates a shift towards stealth and operational efficiency.
The 50% surge in attacks translates to significant financial and operational damage for thousands of organizations globally. For the industrial sector, a ransomware attack can halt production lines, disrupt supply chains, and even create safety risks. The double extortion model, where data is both encrypted and stolen for public release on leak sites, adds the cost of data breach notification, regulatory fines, and long-term reputational damage to the immediate costs of system recovery and downtime.
IEX (New-Object Net.WebClient).DownloadString), and suspicious command-line arguments. Reference D3FEND Decoy File by placing honey-scripts that trigger alerts when executed.PsExec and network scanners. While legitimate uses exist, their execution from non-administrator workstations or at unusual times should be a high-priority alert.vssadmin.exe delete shadows), and attempts to disable security software.AllSigned or Restricted.Qilin ransomware victim count surges to 701, fueled by RansomHub affiliates, becoming 2025's most prolific group with significant high-profile impacts.
The Qilin ransomware group's victim count has dramatically increased to 701 by late October, up from 441, making it the most prolific group of 2025. This surge is attributed to absorbing affiliates from the defunct RansomHub operation. High-profile attacks include Synnovis ($44M cost), Shamir Medical Center (8TB data theft), and disruptions to French high schools, highlighting increased financial and operational damages across critical sectors like healthcare and manufacturing. The group's expanded reach and impact signify a heightened threat landscape.
Ransomware attacks surged 30% in October 2025, hitting near-record levels (623 incidents). Qilin remains dominant, with new TTPs exploiting CVE-2025-61882 in Oracle E-Business Suite.
Ransomware activity saw a significant 30% increase in October 2025, reaching 623 incidents, marking the second-highest monthly total on record. The year-to-date total now exceeds 5,194 incidents, a 50% rise from 2024. The Qilin group continues to lead, claiming 210 victims in October, while Sinobi rose to third place with 69 victims. Threat actors are increasingly exploiting critical vulnerabilities like CVE-2025-61882 in Oracle E-Business Suite for initial access, alongside external remote services and compromised valid accounts. This highlights the ecosystem's resilience and adaptability, with the overall threat level remaining high.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats