New research from NordStellar reveals that ransomware attacks increased by 45% in 2025, with 9,251 cases recorded on dark web leak sites compared to 6,395 in 2024. The ransomware ecosystem expanded to 134 active groups—a 30% increase—and attacks are projected to exceed 12,000 in 2026.

Key statistics

Metric20242025Change
Total incidents6,3959,251+45%
Active groups103134+30%
US incidents2,5443,255+28%
December record1,004Two-year high

NordStellar monitors over 200 ransomware group blogs to track incidents.

Year-over-year trend

YearIncidentsYoY change
2023~4,400
20246,395+45%
20259,251+45%
2026 (projected)12,000++30%+

The ransomware ecosystem has maintained approximately 45% annual growth for two consecutive years.

Q4 2025 surge

December 2025 set a two-year record with 1,004 incidents—the highest monthly total recorded.

Quarterly breakdown

Quarter2025 IncidentsTrend
Q1~2,000Baseline
Q2~2,200Steady
Q3~2,400Increasing
Q4~2,651Surge (+December record)

Why Q4 surged

“Ransomware groups deliberately exploited end-of-year cybersecurity gaps caused by reduced staffing and monitoring.” — Vakaris Noreika, NordStellar cybersecurity expert

FactorAttacker advantage
Skeleton crewsFewer staff monitoring systems
Holiday distractionsReduced vigilance
IT freezesChange moratoriums delay response
Year-end pressureBusiness urgency to restore operations
Vacation schedulesKey personnel unavailable

The holiday timing demonstrates attackers’ awareness of organizational vulnerabilities during skeleton crew periods.

Top ransomware groups

RankGroup2025 IncidentsYoY ChangeNotes
1Qilin1,066+408%Russia-linked RaaS
2Akira947+125%Aggressive expansion
3Cl0p594+525%File transfer exploitation
4Safepay464+775%New entrant surge
5INC Ransom442+83%Steady growth

Qilin’s dominance

AttributeDetails
Incidents1,066 (11.5% of total)
Growth408% year-over-year
AffiliationRussia-linked
ModelRansomware-as-a-Service
Affiliate payoutsCompetitive rates
SpecializationDouble extortion

The group’s 408% increase reflects aggressive expansion and effective affiliate recruitment. Qilin operates a sophisticated RaaS platform with competitive affiliate payouts.

Cl0p’s resurgence

FactorImpact
MOVEit aftermathContinued victim discovery
New file transfer campaignsFresh vulnerability exploitation
Mass exploitation modelHigh volume, automated attacks
Growth rate525% year-over-year

The 525% increase was driven largely by mass exploitation of file transfer vulnerabilities (MOVEit aftermath and new campaigns).

Safepay emergence

MetricValue
2025 incidents464
Growth775%
StatusRelatively new entrant

Safepay’s 775% growth represents the most dramatic expansion of any group, demonstrating how quickly new ransomware operations can scale.

Geographic distribution

Country2025 CasesYoY Change% of Global
United States3,255+28%35%
Germany270+97%3%
Canada~370+46%4%
France~340+46%4%
UK~3003%

US dominance factors

FactorImpact
Higher reporting ratesMore visibility in leak data
Wealthy targetsHigher ransom potential
Insurance coveragePayment capability
Large attack surfaceMore organizations exposed

US organizations account for approximately 35% of all recorded ransomware cases globally—though this may reflect higher reporting rates and leak site visibility rather than proportionally more attacks.

Germany surge

Germany’s 97% increase represents the largest growth among major economies, potentially reflecting:

FactorContribution
Manufacturing targetingStrong industrial base
SMB vulnerabilityMittelstand companies
Increased reportingBetter visibility

Most targeted industries

Industry2025 IncidentsYoY Change% of Total
Manufacturing1,156+32%19.3%
IT Services5248.7%
Professional/Scientific/Technical4948.2%
Construction4437.4%
Healthcare3395.6%

Manufacturing leadership

FactorAttacker benefit
Intellectual propertyValuable trade secrets
Operational dependenceProduction disruption pressure
OT/IT convergenceExpanded attack surface
Security investment gapsLower maturity than finance/tech
Supply chain pressureDownstream customer impact

Manufacturing leads for the second consecutive year. The sector combines valuable intellectual property, operational technology dependencies, and often weaker security programs compared to financial services or tech.

Manufacturing sub-sectors

Sub-sectorTarget profile
General manufacturingBroad targeting
MachineryHigh-value equipment data
Electronics/electricalIP theft potential

SMB targeting

Small and medium-sized businesses (up to 200 employees, revenues up to $25 million) experienced the most attacks, consistent with 2024 findings.

Why SMBs are preferred targets

FactorAttacker Benefit
Valuable dataCustomer records, IP, financial data
Limited securitySmaller security teams, fewer tools
Payment likelihoodOperational pressure to restore quickly
Backup gapsMay lack robust recovery capabilities
Insurance limitsPressure to pay vs. prolonged downtime

“Cybercriminals prioritize choosing targets that offer the biggest payoff for the least amount of effort, and SMBs in the manufacturing industry fit this perfectly — they generate enough revenue to pay large ransoms but usually don’t have the capacity to implement strong security measures or fast recovery options.” — Vakaris Noreika, NordStellar

SMB vs Enterprise comparison

FactorSMBEnterprise
Security budgetLimitedSubstantial
Dedicated security teamRareStandard
Backup sophisticationBasicAdvanced
Recovery timeLongerShorter
Payment pressureHigherLower

Tactic shift: Encryption-less extortion

NordStellar highlights a significant evolution in ransomware tactics:

“Many attacks no longer involve encryption. Instead, attackers quietly exfiltrate sensitive data over weeks or months, then extort victims long after the initial breach.”

Traditional vs encryption-less comparison

AspectTraditional ransomwareEncryption-less extortion
EncryptionYesNo
DetectionEncryption activity alertsHarder to detect
Backup protectionBackups enable recoveryBackups don’t help
Dwell timeShort (encrypt quickly)Long (weeks/months)
Data theftSometimesAlways
LeverageRestore accessPrevent leak

Benefits for attackers

AdvantageImpact
Evades detectionNo encryption activity to trigger alerts
Backup-proofVictims can’t just restore from backup
Reduced complexityNo encryption payload needed
Longer dwell timeMore complete data theft
Persistent leverageThreat of leak remains indefinitely

2026 projections

“Ransomware actors are growing increasingly aggressive—given the surge in 2025, the number of ransomware incidents in 2026 is likely to exceed 12,000.”

Scenario2026 projection
Conservative (+20%)~11,100 incidents
Expected (+30%)~12,000 incidents
Aggressive (+45%)~13,400 incidents

This would represent another 30%+ increase, continuing the acceleration trend.

Recommendations

Detection focus

ControlPurpose
Data Loss Prevention (DLP)Detect unusual data transfers
Lateral movement monitoringCatch attackers before exfiltration
Network segmentationLimit attacker reach
Behavioral analyticsIdentify anomalous access patterns
EDR/XDREndpoint-level threat detection

Resilience measures

ControlBenefit
Offline backupsTested regularly for restoration
Incident response plansInclude encryption-less scenarios
Employee trainingPhishing and social engineering awareness
Cyber insuranceRansomware-specific coverage
Tabletop exercisesPractice response procedures

For SMBs specifically

PriorityAction
CriticalImplement MFA across all systems
CriticalMaintain tested offline backups
HighDeploy endpoint protection
HighTrain employees on phishing
MediumSegment networks where possible
OngoingMonitor for data exfiltration

Context

The 45% increase in 2025 continues a multi-year acceleration. The shift toward encryption-less extortion means organizations with robust backup strategies are no longer immune—data theft alone provides sufficient leverage for attackers.

Key trends to watch:

TrendImplication
RaaS professionalizationLower barrier for new attackers
Holiday targetingQ4 vulnerability window
SMB focusSmall businesses increasingly at risk
Encryption-less modelBackups no longer sufficient defense
Manufacturing targetingIndustrial sector remains primary target

Defenders should assume that any network intrusion may result in data exfiltration and plan accordingly. The days when ransomware was purely an encryption problem are over.