The ransomware landscape continued to mature in November 2025, with threat actors compensating for a slight plateau in attack volume by increasing their tactical sophistication. According to the latest Cyber Threat Intelligence Report from NCC Group, attackers are shifting towards methods that exploit human behavior and are forming strategic alliances to enhance their effectiveness. A key emerging trend is the use of the "ClickFix" (also known as ClearFake) social engineering technique, which manipulates users into executing malicious code themselves. For the fourth consecutive month, the Qilin ransomware group was the most active, while the industrials sector and North America remained the primary targets.
November 2025 saw 583 recorded ransomware incidents, a minor 2% decrease from October. However, the evolution of TTPs points to a more dangerous and adaptive threat environment.
The most notable tactical shift is the surge in the ClickFix social engineering technique. This method, also known as ClearFake, became the second most common initial access vector in November, behind only traditional phishing.
The report highlights increased collaboration between ransomware groups. The DragonForce group, for example, has been observed forming alliances with skilled affiliates from other prominent networks like Scattered Spider. This allows them to pool resources, share expertise, and adapt their attack chains more rapidly to different target environments.
The adoption of ClickFix represents a move towards exploiting the human element as a primary vector (T1204.002 - Malicious File). By tricking the user into running code, attackers offload the execution step, making detection by automated systems more difficult. This is a significant evolution from simply tricking a user into clicking a link or opening an attachment.
The alliances between groups like DragonForce and affiliates from Scattered Spider signify a maturing RaaS ecosystem. Instead of competing, some groups are specializing and collaborating, leading to more potent and versatile attack capabilities. This allows a RaaS operator to 'hire' specialists in areas like initial access, lateral movement, or specific software exploitation, creating a more effective overall operation.
The evolving sophistication of ransomware attacks means that organizations face a more persistent and adaptable threat. The impact remains severe:
powershell.exe or cmd.exe being spawned from a browser process.D3-UBA: User Behavior Analysis: Analyze user behavior for anomalies. An employee who does not normally use developer tools suddenly accessing them should be a flag for investigation.M1017 - User Training): This is the primary defense against social engineering attacks like ClickFix. Train users to never copy and paste code from a website into their system or developer tools under any circumstances.M1038 - Execution Prevention): Use application control policies to restrict the use of scripting languages and developer tools for standard users. If an employee does not need developer tools for their job, they should not be able to access them.Training users to recognize social engineering, especially novel techniques like ClickFix that instruct them to perform actions, is a critical defense.
Using application control to block non-essential interpreters (like PowerShell) and tools (like browser developer consoles) for standard users can prevent this attack chain from succeeding.
Maintaining regular, offline, and immutable backups is the ultimate safeguard to recover from a ransomware attack without paying the ransom.
To counter the ClickFix technique, which abuses legitimate system tools, organizations should implement application control policies. On standard user workstations, create a policy that restricts the execution of command and scripting interpreters like powershell.exe and cscript.exe. If these tools are not required for a user's daily job, they should be blocked. Furthermore, browser policies can be used to disable access to developer tools for non-technical users. This preventative control breaks the attack chain at the execution stage. Even if a user is tricked by the social engineering lure, the malicious code they paste will fail to execute because the necessary interpreter is blocked, rendering the attack ineffective.
For detective controls, robust process analysis via an EDR solution is essential. Configure high-severity alerts for anomalous process chains, specifically a browser process (e.g., chrome.exe, firefox.exe) spawning a command-line interpreter (cmd.exe, powershell.exe). This is a very strong indicator of a user-initiated attack like ClickFix or other browser-based threats. The alert should capture the full command line arguments, which can then be analyzed for malicious content (e.g., Base64 encoded commands, download cradles). This allows the security operations team to quickly identify and isolate a compromised host before the next-stage payload, such as ransomware, can be deployed.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats