Malware & RansomwareHIGH

Ransomware Trends in 2025 - Blending in is the Strategy

Featured image for Ransomware Trends in 2025 - Blending in is the Strategy
TACisco Talos Intelligence
ransomwareQilinLockBitAkiraPlay
🎯

Basically, ransomware attacks are now sneaky and look like normal user activity.

Quick Summary

Ransomware tactics are evolving, blending in with normal user activity. Key sectors like manufacturing are at risk. Organizations must adapt their defenses to combat these sophisticated threats.

What Happened

Ransomware attacks have evolved significantly, moving away from brute-force methods to more sophisticated tactics. According to the Talos 2025 Year in Review, attackers now often gain access through seemingly legitimate means, with 40% of breaches initiated via phishing. Once inside, they mimic user behavior, utilizing tools like RDP, PowerShell, and PsExec, which are commonly used in many organizations. This blending in with normal operations makes detection challenging for defenders.

The report highlights a shift in how ransomware actors operate. Instead of overtly breaking in, they strategically position themselves within networks, making it harder to distinguish between legitimate and malicious actions. This change in tactics emphasizes the need for robust asset management and continuous monitoring to identify anomalies in network behavior.

Who's Being Targeted

The manufacturing sector remains the most targeted by ransomware groups, primarily due to its complex environments that are difficult to monitor. Following closely is the professional, scientific, and technical services sector, which also faces significant risks as access often spans multiple systems. These sectors are particularly vulnerable because they have limited tolerance for disruptions, making them attractive targets for ransomware actors.

As ransomware tactics evolve, organizations must be vigilant in protecting their infrastructure. The report indicates that valid accounts are crucial at every stage of a ransomware attack, from initial access to execution. This underscores the importance of identity protection in cybersecurity strategies.

Most Prolific Ransomware Groups

The landscape of ransomware-as-a-service (RaaS) has seen notable changes. Qilin has emerged as the most notorious group, employing a double-extortion strategy that combines data encryption with threats to leak sensitive information. Qilin targeted over 40 victims monthly in 2025, highlighting its persistent threat.

Other groups like Akira and Play have also gained traction, adapting their tactics and absorbing affiliates from defunct groups like LockBit. Interestingly, LockBit, which was previously a leading group, has fallen to 35th place due to sustained law enforcement pressure. This shift indicates that while some groups may decline, others are stepping up to fill the void.

Defender Recommendations

To combat these evolving threats, organizations must strengthen their defenses. Here are some key recommendations:

  • Enhance identity protections: Focus on training against phishing and social engineering, as attackers often target individuals rather than infrastructure.
  • Monitor administrative tools: Keep an eye on the use of RDP, PowerShell, and PsExec for any unusual activity that could indicate lateral movement.
  • Reinforce basic security measures: Ensure that backup, endpoint detection and response (EDR), segmentation, logging, and recovery capabilities are robust.
  • Regularly test response readiness: Conduct tests during months of typically lower activity, like January, to avoid real incident interference.

By implementing these strategies, organizations can better prepare for the evolving ransomware landscape and protect themselves against potential attacks.

🔒 Pro insight: The shift towards blending in with legitimate activity requires a reevaluation of detection strategies and proactive identity management.

Original article from

TACisco Talos Intelligence· Hazel Burton
Read Full Article

Related Pings

HIGHMalware & Ransomware

npm - Major axios Package Backdoored to Deliver RAT

What Happened In a shocking supply chain attack, the popular npm package axios was compromised to deliver a remote access trojan (RAT). Attackers hijacked the maintainer's account and injected malicious code into two legitimate releases, specifically axios@1.14.1 and axios@0.30.4. This incident is considered one of the most impactful npm supply chain attacks to date, affecting a library that boasts

The Register Security·
HIGHMalware & Ransomware

Axios npm Package Compromised - Supply Chain Attack Unveiled

Malicious Axios npm packages were published, injecting a remote access trojan. Developers and CI/CD systems are at risk. Immediate action is needed to secure your systems.

Snyk Blog·
HIGHMalware & Ransomware

Google Drive - Detects Ransomware and Restores Files

Google Drive has launched ransomware detection and file restoration features. This helps users quickly recover from malware attacks, minimizing data loss and disruption. Organizations can now better protect their critical data with these advanced tools.

Help Net Security·
HIGHMalware & Ransomware

IRS Tax Filing Lures - Cybercriminals Push Malware Campaigns

Cybercriminals are exploiting tax season with organized phishing attacks. They impersonate the IRS to install malware and steal credentials. Awareness and training are key to staying safe.

Cyber Security News·
HIGHMalware & Ransomware

DeepLoad Malware - AI-Generated Evasion Targets Enterprises

DeepLoad malware is targeting enterprises with AI-driven evasion tactics. It's stealing credentials and spreading rapidly. Organizations must act fast to secure their networks.

Cyber Security News·
HIGHMalware & Ransomware

RoadK1ll Malware - New Threat Turns Hosts Into Network Relays

RoadK1ll malware is turning compromised machines into stealthy network relays. This allows attackers to penetrate deeper into secure networks, posing significant risks to organizations. Stay vigilant and monitor your systems for unusual activity.

Cyber Security News·