Home
/
Resources

Ransomware

What is Ransomware

Ransomware is a type of malware that encrypts files, locks devices, or otherwise makes data and systems unusable until a ransom is paid. Attackers typically gain access via phishing emails, malicious downloads, stolen or weak credentials, or exploitation of unpatched vulnerabilities. Modern campaigns often combine data encryption with data theft (“double” or “triple” extortion), threatening to leak sensitive information if the ransom is not paid.

Unlike many other cyberattacks, ransomware is overt: victims see ransom notes with payment instructions, deadlines, and threats, usually payable in cryptocurrencies like Bitcoin or Monero to obscure attacker identities. For organizations, ransomware is not just an IT issue but a business continuity and reputational crisis, impacting operations, regulatory exposure, and customer trust.

How ransomware works

  • Initial compromise
    Attackers infiltrate endpoints, servers, or cloud workloads via phishing, drive‑by downloads, compromised credentials, RDP exposure, or software vulnerabilities.
  • Establishing foothold and lateral movement
    Once inside, they deploy backdoors, escalate privileges, and pivot across the network to identify high‑value assets such as domain controllers, file shares, and databases.
  • Data encryption and/or data theft
    Ransomware encrypts files locally and on accessible network shares; many families also exfiltrate data to attacker‑controlled infrastructure before encryption.
  • Extortion and impact
    Victims receive a ransom note demanding payment for decryption keys and promising deletion or non‑disclosure of stolen data, often escalating threats over time.

Types of Ransomwares

Type Description Examples / Notes
Encrypting (Crypto) Most common; encrypts files with strong algorithms LockBit, Conti, Akira, Qilin
Locker / Screen-Locker Locks the entire device or desktop without encrypting individual files Less common today; early variants
Double/Multi-Extortion Encryption + data theft + additional pressures (DDoS, leaks) Standard in 80%+ of 2025–2026 attacks
Ransomware-as-a-Service (RaaS) Affiliates rent tools/infrastructure from operators Enables less-skilled attackers
Wiper-like / Destructive Some strains permanently destroy data even after payment NotPetya-style variants

Common ransomware families and trends

The ransomware landscape consists of numerous sophisticated threat groups, each with distinct characteristics and attack methodologies. Below are some of the most significant ransomware variants that organizations should be aware of:

BlackLock Ransomware

BlackLock (also known as El Dorado or Eldorado) emerged in March 2024 and quickly became one of the fastest-growing ransomware threats. Operating under a RaaS model, BlackLock distinguished itself by developing custom-built malware rather than using leaked builders, making it harder for security researchers to analyze and defend against. The group increased its data leak posts by 1,425% quarter-over-quarter in Q4 2024, targeting Windows, VMware ESXi, and Linux environments with sophisticated double-extortion tactics. BlackLock actively recruits 'traffers' to establish initial access and has shown interest in exploiting Microsoft Entra Connect synchronization mechanics to compromise on-premises environments. The group's infrastructure was partially compromised by security researchers in late 2024, revealing operational details and victim information.

VanHelsing Ransomware

VanHelsing is a cross-platform RaaS operation that launched in March 2025, capable of targeting Windows, Linux, BSD, ARM, and ESXi systems. The group requires a $5,000 deposit from affiliates and offers an 80/20 revenue split. VanHelsing employs double-extortion tactics and provides affiliates with an intuitive control panel for managing attacks. The group prohibits targeting entities within the Commonwealth of Independent States (CIS). Within its first two weeks of operation, VanHelsing claimed multiple victims and demands ransoms of approximately $500,000 in Bitcoin. Notably, in mid-2025, internal conflicts led to a developer attempting to sell the group's source code on underground forums, exposing significant technical details and operational dysfunction within the organization.

Fog Ransomware

Fog ransomware first appeared in May 2024, initially targeting educational institutions and recreation sectors in the United States before expanding to financial services and other industries. The group gains initial access through compromised VPN credentials, exploitation of vulnerabilities in Veeam Backup & Replication servers (CVE-2024-40711) and SonicWall SSL VPN appliances (CVE-2024-40766). Fog operates with a double-extortion model, using its TOR-based data leak site to pressure victims. In April 2025, the group gained attention for distributing ransomware via phishing emails while mocking Elon Musk's Department of Government Efficiency (DOGE) in their ransom notes. Fog attacks are characterized by rapid encryption-some incidents completing in under two hours; and the use of unusual tools like the Syteca employee monitoring software and open-source pentesting tools.

Black Basta Ransomware

Black Basta is a highly sophisticated RaaS operation that emerged in April 2022 and has impacted over 500 organizations globally across at least 12 of 16 critical infrastructure sectors. The group is believed to have connections to the disbanded Conti ransomware gang and FIN7 threat actor. Black Basta employs double-extortion tactics, using ChaCha20 encryption for files and RSA-4096 for key encryption. The group gains initial access through phishing campaigns (often involving Qakbot trojan), exploitation of vulnerabilities like ZeroLogon and PrintNightmare, and email bombing tactics combined with social engineering over Microsoft Teams. Black Basta affiliates have shown innovation in their attack methods, including the use of custom EDR evasion tools and lateral movement techniques. Despite signs of fatigue among key members reported in mid-2024, the group remains an active threat to organizations worldwide.

Lynx Ransomware

Lynx ransomware, first detected in July 2024, is believed to be a rebranded and enhanced version of the INC ransomware, with both variants sharing substantial portions of their source code. Operating as a RaaS platform, Lynx targets industries including technology, manufacturing, logistics, retail, finance, and professional services across North America and Europe. The malware supports Windows and Linux environments and employs Curve25519 Donna for key exchange and AES-128 for file encryption. Lynx is notable for its aggressive tactics including sending ransom notes to available printers, using Microsoft OneNote as part of its infection chain, and engaging in IT impersonation for social engineering. The group provides affiliates with comprehensive toolkits and maintains an active presence on dark web forums like RAMP, recruiting experienced affiliates with network intrusion capabilities.

XCSSET Malware

XCSSET is a sophisticated macOS malware discovered in 2020 that primarily targets developers by injecting malicious code into Xcode projects. While not traditionally categorized as ransomware, XCSSET has encryption capabilities and has been used in data theft operations. The malware spreads through compromised Xcode projects, stealing cookies, credentials, and other sensitive information from infected systems. It can also modify Safari, Chrome, and other browser extensions to inject malicious code and steal cryptocurrency wallet information.

Interlock Ransomware

Interlock ransomware emerged in September 2024 and rapidly became a major threat, particularly to the healthcare and public health sector. Unlike typical RaaS operations, Interlock operates as a closed group without public affiliate recruitment. The group uses uncommon initial access methods including drive-by downloads from compromised legitimate websites and the ClickFix social engineering technique. In July 2025, CISA, FBI, HHS, and MS-ISAC issued a joint advisory warning about Interlock's escalating activities, noting the group had developed encryptors for both Windows and Linux systems that specifically target virtual machines. Interlock employs custom remote access tools and has connections to the earlier Rhysida ransomware variant. The group's attacks on healthcare organizations have been particularly devastating, with incidents affecting major kidney dialysis providers and hospital systems.

DragonForce Ransomware

DragonForce emerged in late 2023 as a RaaS platform with disputed origins-some researchers link it to a Malaysian hacktivist collective, while others maintain it's an entirely separate criminal enterprise. The group initially used leaked LockBit 3.0 builders before developing custom ransomware based on Conti source code. In March 2025, DragonForce announced a transformation into a 'ransomware cartel,' encouraging affiliates to create their own brands while using DragonForce infrastructure and tools. The group offers affiliates an 80/20 revenue split and supports Windows, Linux, ESXi, and NAS environments. DragonForce has been linked to high-profile attacks on UK retailers including M&S, Co-op, and Harrods, and has engaged in public conflicts with rival groups BlackLock and RansomHub. The group has also launched a 'data analysis service' for affiliates and employs aggressive tactics including recording and publishing phone calls with victims.

Ransomware vs. General Malware

Aspect General Malware Ransomware
Primary Goal Steal data, spy, disrupt, or gain persistent access Financial extortion via denial of access + leverage
Impact Style Often stealthy and long-term Loud, disruptive, time-sensitive
Monetization Data sales, credential theft, botnets Direct ransom demand (plus data sale threats)
Recovery Difficulty Variable; often removable without payment Requires decryption key or clean restore
Business Consequence Usually contained to IT/security team Board-level crisis with operational & legal fallout

Where to install Ransomware

Ransomware targets any environment with valuable or critical data: corporate networks, cloud workloads, endpoints, backup systems, OT/ICS environments, healthcare systems, government agencies, manufacturing plants, and supply chain partners. It spreads rapidly via Active Directory, SMB shares, RDP, and compromised remote access tools.

Comprehensive Ransomware Prevention & Mitigation Best Practices

  • Patch & Validate - Prioritize critical vulnerabilities with predictive scoring and automated testing.
  • Least Privilege & Segmentation - Prevent lateral movement with zero-trust and micro-segmentation.
  • Immutable Backups - Air-gapped or immutable storage with regular testing.
  • Multi-Factor Authentication (MFA) - Everywhere, including RDP and admin accounts.
  • Email & Endpoint Protection - Advanced filtering + behavior-based EDR/XDR.
  • User Awareness - Ongoing training against phishing and social engineering.
  • Incident Response Plan - Test tabletop exercises; never pay ransom without legal guidance.
  • Threat Intelligence - Integrate real-time feeds (like LOVI) for proactive blocking.

Benefits of using Ransomware

While ransomware is destructive, understanding it drives significant defensive improvements: stronger backup strategies (3-2-1-1-0 rule with immutable backups), rapid incident response capabilities, better patch management, Zero Trust adoption, employee awareness training, and investment in advanced XDR/SIEM/EDR solutions-ultimately reducing successful attacks, minimizing downtime, lowering ransom payments, and strengthening overall cyber resilience.

Risks and Impacts of Ransomware Attacks

  • Massive downtime and lost revenue
  • Data breaches with regulatory fines
  • Reputational damage and loss of customer trust
  • Potential permanent data loss if backups fail
  • Insurance complications or higher premiums

How to be safe from Ransomware attacks

Effective ransomware protection requires layered defenses:  

  • Maintain offline, immutable, air-gapped backups tested regularly.  
  • Implement least-privilege access, MFA everywhere, and Zero Trust segmentation.  
  • Keep systems patched and use advanced EDR/XDR with behavioral blocking.  
  • Disable unnecessary RDP/SMB exposure and use application allowlisting.  
  • Deploy NGFW with threat intelligence, email/web security, and anti-phishing controls.  
  • Enable continuous monitoring with SIEM/XDR and conduct regular ransomware tabletop exercises.  
  • Prepare incident response and communication plans with “do not pay” policies where possible.

Loginsoft’s XDR and SIEM platforms provide real-time ransomware behavior detection, automated containment, and rapid recovery guidance.

Loginsoft Perspective

At Loginsoft, ransomware is treated as a critical cyber threat that can encrypt systems, disrupt operations, and place sensitive data at risk until a ransom is paid. As ransomware attacks continue to evolve, organizations need strong prevention, detection, and response strategies to reduce the impact of these incidents. Loginsoft helps organizations strengthen resilience by identifying exposure points, improving threat detection, and supporting rapid remediation efforts.

Loginsoft supports organizations by

  • Identifying vulnerabilities and misconfigurations that ransomware actors may exploit
  • Monitoring for indicators of ransomware activity and suspicious behavior
  • Leveraging threat intelligence to track ransomware trends and tactics
  • Strengthening detection, containment, and incident response capabilities
  • Supporting proactive security strategies to reduce ransomware risk

Our approach ensures organizations are better prepared to prevent ransomware attacks, minimize disruption, and recover more effectively from cyber incidents.

FAQ

Q1. What is ransomware?

Ransomware is a type of malicious software (malware) that encrypts files, locks devices, or blocks access to systems and demands payment (usually in cryptocurrency) for decryption keys or restoration of access. Modern ransomware often uses double extortion: encrypting data and stealing it to threaten public leak if the ransom is not paid.

Q2. How does ransomware work?

Typical attack flow:  

  1. Initial access (phishing, RDP brute-force, exploited vulnerability, supply-chain compromise)  
  2. Lateral movement & privilege escalation  
  3. Discovery & exfiltration of sensitive data  
  4. Deployment of ransomware payload (encrypts files with strong algorithms like ChaCha20 + RSA)  
  5. Deletes backups/shadow copies  
  6. Displays ransom note with payment instructions and leak threat  
  7. Victim either pays or restores from clean backups

Q3. What is double extortion ransomware?

Double extortion (also called double extortion ransomware) combines encryption with data theft. Attackers exfiltrate sensitive files before encrypting them and threaten to publish or sell the stolen data on a dark web leak site if the ransom is not paid. This increases pressure on victims even if they have good backups. Most active ransomware groups (LockBit, Black Basta, Akira, Cl0p, etc.) use this tactic in 2026-2027.

Q4. What are the most common ransomware delivery methods in 2026-2027?

Top vectors:  

  • Phishing emails with malicious attachments or links  
  • RDP / VPN brute-force or credential stuffing  
  • Exploitation of known vulnerabilities (ProxyShell, Log4Shell-style, MOVEit, etc.)  
  • Supply-chain attacks (compromised software updates)  
  • Malicious ads (malvertising)  
  • USB drops & physical media  
  • Remote desktop protocol (RDP) exposure

Q5. What are the biggest ransomware groups active in 2026-2027?

Prominent active groups include:  

  • LockBit  
  • Black Basta  
  • Akira  
  • Cl0p  
  • ALPHV/BlackCat (rebranded variants)  
  • Rhysida  
  • Play  
  • RansomHouse  
  • Hunters International

Many operate as Ransomware-as-a-Service (RaaS), allowing affiliates to conduct attacks while developers maintain the malware.

Q6. What damage can ransomware cause to an organization?

Consequences include:  

  • Operational downtime (days to weeks)  
  • Data loss or permanent encryption  
  • Leak of sensitive customer/employee data  
  • Regulatory fines (GDPR, HIPAA, SEC)  
  • Reputational damage  
  • Cyber insurance complications  
  • Legal liabilities  
  • Physical safety risks (when targeting hospitals, utilities, or transportation)

Q7. How can organizations prevent ransomware attacks?

Effective prevention layers:  

  • Phishing-resistant MFA everywhere  
  • Regular patching & vulnerability management  
  • Immutable, air-gapped, tested backups (3-2-1-1-0 rule)  
  • Endpoint Detection & Response (EDR/XDR) with behavioral blocking  
  • Network segmentation & least-privilege access  
  • Email security & web filtering  
  • Application allowlisting  
  • Continuous monitoring & threat hunting  
  • User awareness training

Q8. What should you do if your organization is hit by ransomware?

Immediate steps:  

  1. Isolate affected systems (disconnect from network)  
  2. Preserve evidence (do not reboot or power off if possible)  
  3. Notify law enforcement (FBI IC3, local authorities)  
  4. Engage professional incident response team  
  5. Do NOT pay the ransom (no guarantee of recovery, funds crime)  
  6. Restore from clean backups  
  7. Investigate root cause & improve defenses

Q9. Does paying the ransom guarantee data recovery and deletion?

No. Paying does not guarantee:  

  • Working decryption keys  
  • Full data recovery  
  • Deletion of stolen data (attackers may keep copies or resell them)

Many victims still suffer leaks or secondary extortion even after payment. U.S. authorities strongly discourage ransom payments.

Q10. What is Ransomware-as-a-Service (RaaS)?

Ransomware-as-a-Service is a criminal business model where developers create and maintain ransomware tools, while affiliates (independent hackers) use them to conduct attacks. Affiliates pay a percentage of profits (often 20-40%) to the developers. This lowers the barrier for attackers and has dramatically increased the volume and sophistication of ransomware attacks.

Q11. What are the best ransomware protection strategies in 2026-2027?

Modern best practices:  

  • Immutable, offline, air-gapped backups with regular testing  
  • Layered defense: EDR/XDR + NGFW + email security + WAF  
  • Zero-trust architecture & microsegmentation  
  • Continuous vulnerability management & patch prioritization  
  • Behavioral detection & exploit prevention  
  • Employee training focused on phishing & social engineering  
  • Incident response playbooks tested through tabletop exercises

Q12. How do I get started improving ransomware resilience?

Quick-start path:  

  1. Assess current backup strategy (test restores!)  
  2. Implement phishing-resistant MFA everywhere  
  3. Deploy modern EDR/XDR on all endpoints  
  4. Segment critical networks  
  5. Enable immutable backups (3-2-1-1-0 rule)  
  6. Run a ransomware tabletop exercise  
  7. Prioritize patching of internet-facing systems

Most organizations can significantly reduce risk within 3-6 months.

Glossary Terms
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.