On International Anti-Ransomware Day, Kaspersky released its annual report on the ransomware threat landscape, highlighting profound tactical evolutions in 2026. While the overall percentage of organizations impacted by ransomware saw a slight decline in 2025, the nature of the threat has become more sophisticated and dangerous. The report identifies three key trends: the adoption of post-quantum cryptography by advanced groups to ensure long-term data decryption impossibility; a significant shift towards 'encryptionless extortion' where data theft and public leakage is the sole threat; and the methodical, widespread use of tools and techniques like 'EDR killers' and Bring Your Own Vulnerable Driver (BYOVD) to disable security measures before payload deployment.
The 2026 ransomware ecosystem is characterized by adaptation and specialization. Threat actors are not just encrypting data; they are building multi-faceted extortion schemes.
Post-Quantum Cryptography (PQC): For the first time, ransomware families have been observed in the wild using quantum-resistant encryption algorithms. This is a forward-looking strategy. Attackers are encrypting data today knowing that even if victims back it up, the data will remain securely encrypted against future quantum computers, making the extortion demand perpetually relevant.
Encryptionless Extortion: Groups like ShinyHunters are pioneering a model that bypasses the encryption step altogether. They gain access, exfiltrate sensitive data, and then threaten to leak it publicly. This approach is faster, stealthier (as it avoids noisy encryption processes that might trigger alerts), and removes the need for the attackers to maintain complex and potentially buggy encryption software.
Systematic Evasion: The neutralization of endpoint security is no longer an opportunistic step but a core, planned phase of the attack. Ransomware operators are heavily utilizing 'EDR killers' (tools designed to terminate security agent processes) and BYOVD techniques. The BYOVD method involves using a legitimate, signed (but vulnerable) driver to execute malicious code with kernel-level privileges, effectively blinding EDR and antivirus solutions.
Initial Access: The reliance on Initial Access Brokers (IABs) remains strong. IABs continue to sell access to corporate networks, with compromised Remote Desktop Protocol (RDP), VPNs, and especially RDWeb being the most common entry points.
MsMpEng.exe, SentinelAgent.exe) in a way that the EDR cannot protect itself.T1486 - Data Encrypted for Impact: The classic ransomware encryption tactic, now being augmented with PQC.T1657 - Data Exfiltration as a Service: The core of the 'encryptionless extortion' model, focusing on stealing data for leverage.T1562.001 - Impair Defenses: Disable or Modify Tools: The use of 'EDR killers' to terminate security software.T1068 - Exploitation for Privilege Escalation: Leveraged in BYOVD attacks to gain kernel-level execution.T1589.002 - Gather Victim Identity Information: Email Addresses: A common tactic for IABs and phishing campaigns that lead to initial access.These evolving tactics have significant implications for organizations:
No specific Indicators of Compromise were provided in the source articles.
Security teams may want to hunt for the following patterns related to these new trends:
.zip, .rar, .7z) on servers or workstations, followed by large outbound data transfers to cloud storage or unfamiliar IP addresses.Detection:
Response:
Utilize EDR/EPP solutions with strong behavioral detection and tamper-proofing to identify and block processes attempting to disable security tools.
Use application allowlisting or driver control policies to prevent the loading of unauthorized or known-vulnerable drivers used in BYOVD attacks.
Implement egress filtering and DLP to detect and block the large-scale data exfiltration that is central to encryptionless extortion.
Enforce phishing-resistant MFA on all remote access points (VPN, RDP) to disrupt the initial access chain provided by IABs.
The rise of Bring Your Own Vulnerable Driver (BYOVD) attacks makes Driver Load Integrity Checking a critical defense. This technique directly counters an attacker's ability to load a malicious or vulnerable driver to gain kernel-level privileges and disable security tools. Implementation should involve using modern endpoint security solutions and operating system features like Windows Defender Application Control (WDAC) to create a policy that only allows a specific set of known, trusted drivers to be loaded. Any attempt to load an unauthorized driver is blocked and logged. This is not a simple 'on/off' switch; it requires a period of auditing to build a baseline of necessary drivers in your environment. Once enforced, this policy effectively neuters the BYOVD technique, forcing attackers to find other, often more difficult, paths to escalation and ensuring your EDR and other security agents remain active and protected.
To combat the trend of 'encryptionless extortion,' Outbound Traffic Filtering is paramount. Since the attacker's primary goal is data exfiltration, controlling and monitoring outbound data flows can disrupt the entire attack. Organizations should configure firewalls and web proxies to deny all outbound traffic by default, only allowing connections to known, approved destinations on specific ports. For sensitive servers that have no business communicating directly with the internet, all outbound access should be blocked. For workstations, this means restricting access to unsanctioned file sharing and cloud storage sites. Furthermore, this technique should be combined with Network Traffic Analysis (NTA) and Data Loss Prevention (DLP) to inspect the content and volume of allowed traffic, alerting on or blocking transfers that contain sensitive data patterns or are anomalously large.
Given the increased sophistication and stealth of modern ransomware attacks, deception technology offers a powerful way to detect threats that have bypassed traditional defenses. A Decoy Environment, or honeypot, can be configured to mimic a real production system, complete with fake sensitive documents, databases, and credentials. These decoys are placed strategically within the network. Since no legitimate user has a reason to access them, any interaction is, by definition, malicious. If a ransomware actor, having bypassed EDR, begins network reconnaissance or lateral movement, they are likely to encounter and interact with a decoy. This interaction provides a high-fidelity, low-false-positive alert, giving the security team early warning of an active intrusion and valuable intelligence on the attacker's TTPs before they reach actual critical assets.
Kaspersky releases its annual ransomware report on International Anti-Ransomware Day.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.