Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Ransomware Attacks Surge 49% Year-Over-Year: BlackFog 2026
Ransomware Attacks Surge 49% Year-Over-Year: BlackFog 2026
NEWS

Ransomware Attacks Surge 49% Year-Over-Year: BlackFog 2026

BlackFog's 2025 State of Ransomware Report reveals a 49% increase in ransomware attacks year-over-year, with evolving tactics shifting toward...

Dylan H.

News Desk

February 12, 2026
7 min read

Ransomware Attacks Up 49% in 2025

BlackFog released its 2025 State of Ransomware Report on February 12, 2026, revealing a staggering 49% increase in ransomware attacks year-over-year, with threat actors shifting tactics toward encryption-less extortion, supply chain attacks, and AI-powered social engineering.


Key Findings

Metric20242025Change
Total Ransomware Attacks5,2347,798+49%
Double Extortion Attacks68%82%+14pp
Encryption-Less Extortion12%31%+19pp
Average Ransom Demand$2.1M$3.8M+81%
Ransomware-as-a-Service Groups2847+68%

Evolving Attack Methods

1. Shift Away from Encryption

31% of ransomware attacks in 2025 involved pure data exfiltration without encryption. This represents a strategic shift:

Why Skip Encryption?

  • Faster operations — No need to deploy ransomware binary
  • Lower detection risk — No sudden file modification alerts
  • Harder to recover — Victims can't restore from backups
  • Legal pressure — Data breach disclosure laws force action

Impact on Victims

Traditional ransomware: "Pay to decrypt." Modern extortion: "Pay or we publish your data."

The latter is harder to defend against because:

  • Backups don't help (data already stolen)
  • Legal obligations to disclose breaches
  • Reputational damage from data publication

2. Double Extortion Now Standard

82% of ransomware attacks in 2025 involved double extortion (encrypt AND steal data), up from 68% in 2024.

The Double Extortion Model

  1. Infiltrate — Compromise victim network
  2. Exfiltrate — Steal sensitive data
  3. Encrypt — Deploy ransomware
  4. Extort — "Pay or we publish AND you can't access your systems"

Triple and Quadruple Extortion

Emerging tactics include:

  • Triple extortion — Target customers, partners, and employees directly
  • Quadruple extortion — DDoS attack while ransom negotiations occur

3. Supply Chain Targeting

Ransomware groups increasingly attack third-party vendors to reach high-value targets:

Recent Supply Chain Attacks

VendorDownstream Impact
Managed Service Providers (MSPs)100s of client breaches from single MSP compromise
Software vendorsTrojanized updates infect thousands
Cloud service providersMulti-tenant compromise

Why Supply Chain?

  • One compromise, many victims — Maximum impact
  • Less mature security — Vendors often have weaker defenses
  • Trusted access — Vendors have legitimate access to client systems

Industry Impact Analysis

Most Targeted Sectors (2025)

Industry% of AttacksChange YoY
Healthcare23%+4pp
Finance18%+2pp
Manufacturing16%+5pp
Education14%-1pp
Government12%+3pp
Retail11%+1pp
Other6%-14pp

Why Healthcare Leads

Healthcare remains the #1 target because:

  • High-value data — Medical records sell for 10x more than credit cards
  • Critical operations — Hospitals can't afford downtime
  • Weaker security — Many healthcare orgs lack mature security programs
  • Regulatory pressure — HIPAA violations add legal leverage

Ransomware-as-a-Service (RaaS) Growth

The number of active RaaS operations grew from 28 in 2024 to 47 in 2025, a 68% increase.

Top RaaS Groups (2025)

  1. LockBit — 892 attacks (11.4% of total)
  2. ALPHV/BlackCat — 743 attacks (9.5%)
  3. Play Ransomware — 623 attacks (8.0%)
  4. Cl0p — 578 attacks (7.4%)
  5. BlackBasta — 512 attacks (6.6%)

The RaaS Business Model

RaaS operates like legitimate software-as-a-service:

  • Developers — Create ransomware tools
  • Affiliates — Conduct attacks using the tools
  • Revenue split — Typically 70/30 or 80/20 (affiliate/developer)
  • Support infrastructure — Payment processing, leak sites, victim chat

This lowers barriers to entry, allowing less-skilled criminals to conduct sophisticated attacks.


AI-Powered Social Engineering

The report highlights AI-driven phishing as a key enabler:

How AI Enhances Attacks

TechniqueTraditionalAI-Enhanced
Email PhishingGeneric, obvious errorsPersonalized, grammatically perfect
Voice Phishing (Vishing)Human callers, limited scaleAI voice clones, infinite scale
Deepfake VideoNot feasibleReal-time video calls with fake executives

Real-World Examples

  • CEO Fraud — AI voice clone of CEO authorizes wire transfer
  • Fake Zoom Meetings — Deepfake video calls to build trust
  • Personalized Phishing — AI scrapes LinkedIn/social media to craft perfect lures

Financial Impact

Average Ransom Payments

  • 2024: $2.1 million
  • 2025: $3.8 million
  • Increase: 81%

Total Ransom Payments (2025)

  • Estimated total paid: $1.9 billion (up from $1.1 billion in 2024)
  • Average downtime: 21 days per incident
  • Total recovery costs (including forensics, legal, PR): $5.7 billion

Attack Trends: What's Changing

1. Initial Access Vectors

Method20242025
Phishing45%38%
Exploited Vulnerabilities28%35%
Compromised RDP18%12%
Supply Chain5%11%
Stolen Credentials4%4%

Key Insight: Attackers are shifting from phishing to vulnerability exploitation, likely due to:

  • Better email security (SEGs, anti-phishing training)
  • More zero-days and N-days available
  • Faster exploitation of disclosed vulnerabilities

2. Dwell Time Decreasing

  • 2024 average dwell time: 16 days
  • 2025 average dwell time: 9 days

Attackers are moving faster from initial access to encryption/exfiltration, reducing detection opportunities.


Defensive Strategies

What's Working

According to the report, organizations that avoided ransomware had:

  1. Immutable backups — Air-gapped, write-once-read-many (WORM)
  2. EDR deployment — Endpoint detection and response on all devices
  3. Network segmentation — Lateral movement containment
  4. Phishing-resistant MFA — Hardware keys, not SMS codes
  5. Patch management — Automated patching within 48 hours

What's NOT Working

Traditional defenses showing limited effectiveness:

  • Antivirus alone — 73% of ransomware evades signature-based AV
  • Perimeter firewalls — Attacks come from inside (phishing, RDP)
  • Annual security training — Ineffective against AI-powered phishing

Recommendations for Organizations

Immediate Actions (High Priority)

  1. Test backups weekly — Ensure you can actually restore
  2. Deploy EDR everywhere — Endpoints, servers, cloud workloads
  3. Require phishing-resistant MFA — Hardware keys (YubiKey, Titan Key)
  4. Segment networks — Isolate critical systems
  5. Patch critical CVEs within 24 hours

Long-Term Strategy

  1. Implement Zero Trust architecture — Never trust, always verify
  2. Conduct ransomware tabletop exercises — Practice incident response
  3. Audit third-party vendors — Require security questionnaires and audits
  4. Invest in threat intelligence — Know which groups target your industry
  5. Consider cyber insurance — But read the fine print on ransomware coverage

The 2026 Outlook

BlackFog predicts:

  • Continued growth in ransomware attacks (30-40% increase in 2026)
  • More AI-driven attacks as tools become more accessible
  • Ransomware targeting OT/ICS (operational technology/industrial control systems)
  • Increased nation-state involvement in ransomware operations
  • Stricter regulations on ransomware payments

Sources

  • BlackFog — The State of Ransomware 2026
  • SharkStriker — Top Ransomware Attacks of 2026

Related Reading

  • Ransomware in 2026: Data-Only Extortion Replaces Encryption
  • Cybersecurity Predictions 2026: The Hype We Can Ignore and
  • Ransomware Costs Projected to Hit $74 Billion in 2026, 30%
#Ransomware#Cybersecurity#Report#BlackFog#Statistics#Trends

Related Articles

WEF Global Cybersecurity Outlook 2026 Warns of 'Permanent

The World Economic Forum's Global Cybersecurity Outlook 2026 warns of permanent instability driven by geopolitical tensions, supply chain dependencies,...

7 min read

Ransomware in 2026: Data-Only Extortion Replaces Encryption

With 91 publicly disclosed ransomware attacks in January 2026 alone, the ransomware landscape is shifting toward data-only extortion while healthcare...

6 min read

Ransomware Costs Projected to Hit $74 Billion in 2026, 30%

Cybersecurity Ventures forecasts ransomware damage costs will surge to $74 billion globally in 2026, up from $57 billion in 2025, as attacks grow more...

7 min read
Back to all News