Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Nova (RALord) Ransomware Group Confirmed Active with 73
Nova (RALord) Ransomware Group Confirmed Active with 73
NEWS

Nova (RALord) Ransomware Group Confirmed Active with 73

The Nova ransomware group, formerly known as RALord, has been confirmed fully operational with 73 victims across nearly every continent, employing double...

Dylan H.

News Desk

February 17, 2026
3 min read

Rebranded and Fully Operational

The Nova ransomware group — formerly known as RALord — has been confirmed fully operational as of February 17, 2026, with 73 confirmed victims spread across nearly every continent. The group combines discipline with opportunism, targeting organizations across diverse sectors.


Group Profile

AttributeDetails
Current NameNova
Former NameRALord
TypeRansomware-as-a-Service (RaaS)
Confirmed Victims73
ReachGlobal — nearly every continent
TacticsDouble extortion (encrypt + exfiltrate + leak)
Latest ActivityFebruary 17, 2026

Double Extortion Model

Nova employs the now-standard double extortion approach:

  1. Encrypt — Lock down victim systems using ransomware payload
  2. Exfiltrate — Steal sensitive data before encryption
  3. Threaten — Demand payment or face public data leak
  4. Leak — Publish stolen data on dedicated leak site if ransom is not paid

Victim Distribution

Nova's targeting shows no particular geographic preference, hitting organizations across:

  • North America — Largest concentration of victims
  • Europe — Western European organizations prominently represented
  • Asia — Growing number of victims in Southeast Asia
  • South America — Brazil and Argentina targeted
  • Africa — Emerging targeting in South Africa and Nigeria
  • Oceania — Australian organizations affected

Evolving Ransomware Landscape

Nova is part of a broader trend where ransomware groups are pivoting tactics as victims increasingly refuse to pay:

TrendDescription
DDoS-as-a-ServiceAdding DDoS pressure on top of encryption and data theft
Insider recruitmentRecruiting employees at target organizations for initial access
Gig worker exploitationUsing freelance workers for money laundering and access brokering
Regulatory pressureReporting victims to regulators to increase pressure to pay
Customer notificationDirectly contacting victim's customers about stolen data

Defensive Recommendations

  1. Immutable backups — Maintain offline, air-gapped backups that cannot be encrypted
  2. Network segmentation — Limit lateral movement paths
  3. EDR/XDR deployment — Detect ransomware behavior before encryption begins
  4. Incident response plan — Have a tested plan specifically for ransomware scenarios
  5. Threat intelligence — Monitor Nova/RALord IOCs and TTPs

With 73 victims in just four months since rebranding, Nova demonstrates that ransomware remains one of the most prolific and profitable cybercrime models in 2026.

Sources

  • Ransom-DB — Nova/RALord Ransomware Group Analysis 2026
  • Bitdefender Threat Debrief — February 2026
  • CYFIRMA — Weekly Intelligence Report February 2026

Related Reading

  • Phobos Ransomware Admin Pleads Guilty — 1,000+ Victims
  • The Rise of Ransomware-as-a-Service: 14 Active Platforms
  • ShinyHunters Dumps 5.1 Million Panera Bread Customer
#Ransomware#Nova#RALord#Double Extortion#Threat Actor#RaaS

Related Articles

Phobos Ransomware Admin Pleads Guilty — 1,000+ Victims

Evgenii Ptitsyn, 43, a Russian national who administered the Phobos ransomware-as-a-service operation, pleaded guilty to wire fraud conspiracy in the U.S....

7 min read

The Rise of Ransomware-as-a-Service: 14 Active Platforms

Security researchers identify 14 active RaaS platforms operating sophisticated affiliate programs, with entry costs as low as $40 per month lowering the...

4 min read

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

Pro-Ukrainian hacktivist group Bearlyfy has conducted over 70 cyberattacks against Russian companies since January 2025, recently deploying a custom Windows ransomware strain called GenieLocker in targeted operations.

4 min read
Back to all News