A new threat intelligence report from Check Point Research reveals a significant consolidation in the ransomware market. During March 2026, three dominant ransomware groups were responsible for 40% of all publicly claimed attacks. Qilin (also known as Agenda) was the most prolific, accounting for 20% of all incidents. The Akira ransomware group followed with 12%, and DragonForce was responsible for 8%. This trend indicates that while many ransomware groups exist, a few highly effective and organized operations are capturing a large market share, driving a 7% overall increase in attacks compared to the previous month.
The report paints a picture of a maturing, albeit criminal, market. The top groups are not just technically proficient but also have sophisticated business models.
Despite a general slowdown from the peaks of 2025, these dominant players are driving a resurgence in attack volume. Their focus remains on sectors where operational downtime has the highest financial impact, maximizing their leverage for extortion.
While the report focuses on attack volume, the TTPs of these top groups are well-documented and share common patterns:
T1190 - Exploit Public-Facing Application and T1566 - Phishing are primary vectors.T1059.001 - PowerShell and T1569.002 - Service Execution are common.T1041 - Exfiltrate Data to Cloud Storage) before encrypting files on the victim's network (T1486 - Data Encrypted for Impact). This gives them two points of leverage for payment.lsass.exe memory being accessed by an unusual process) are critical for detection.powershell.exe spawning from a Microsoft Office application. Use D3-FCR: File Content Rules on egress points to detect and block the exfiltration of sensitive data before encryption occurs.Implement a rigorous patch management program to close vulnerabilities used for initial access.
Mapped D3FEND Techniques:
Enforce MFA on all remote access services and privileged accounts.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats