RansomNews

ransomNews

Cut through the noise.
The cyber threat landscape moves fast. We move faster.
Deep analysis, sharp intelligence - delivered by the ransomNews team.

Go to the GitHub Dashboard

RedACT NOW

๐Ÿ‘‰๐Ÿป we moved our dashboard to GitHub, check it NOW!

๐ŸŒ Global
Threat Landscape

since january 2026

Globally speaking, January recorded 722 publicly claimed victims (verified).

February rose slightly to 782 claims, highlighting a strong trend.

Most active groups in 2026

๐Ÿ‡ฎ๐Ÿ‡น Italian
Threat Landscape

since January 2026

January recorded 20 confirmed claims affecting organizations across multiple sectors.

In February, incidents rose to 26, reflecting only cases that were fully validated and confirmed.

1504
Ransomware victims
world, 2026
62
Active groups
world, 2026
26
Countries impacted
2026
13
New Threat Actors
world, 2026
Ransomware operational profile comparison
Ransomware extortion pressure modelโ€
Top 7 Threat Actors 2026
  • 1 โ€ข ๐Ÿฅท๐Ÿป Qilin
  • 2 โ€ข ๐Ÿฅท๐Ÿป TheGentlemen
  • 3 โ€ข ๐Ÿฅท๐Ÿป CL0P
  • 4 โ€ข ๐Ÿฅท๐Ÿป Akira
  • 5 โ€ข ๐Ÿฅท๐Ÿป INC Ransom
  • 6 โ€ข ๐Ÿฅท๐Ÿป PLAY
  • 7 โ€ข ๐Ÿฅท๐Ÿป Sinobi
Top 7 Countries 2026
  • 1 โ€ข ๐Ÿ‡บ๐Ÿ‡ธ USA
  • 2 โ€ข ๐Ÿ‡จ๐Ÿ‡ฆ Canada
  • 3 โ€ข ๐Ÿ‡ฌ๐Ÿ‡ง UK
  • 4 โ€ข ๐Ÿ‡ฉ๐Ÿ‡ช Germany
  • 5 โ€ข ๐Ÿ‡ซ๐Ÿ‡ท France
  • 6 โ€ข ๐Ÿ‡ฎ๐Ÿ‡น Italy
  • 7 โ€ข ๐Ÿ‡ง๐Ÿ‡ท Brazil
Top 7 Sectors 2026
  • 1 โ€ข โš™๏ธ Manufacturing
  • 2 โ€ข ๐Ÿฅซ Food industry
  • 3 โ€ข ๐Ÿ’ป IT
  • 4 โ€ข ๐Ÿฅ Healthcare
  • 5 โ€ข ๐Ÿ“Š Consulting
  • 6 โ€ข ๐Ÿšš Logistics & Transportation
  • 7 โ€ข ๐Ÿ‘— Apparel
Infrastructure hosting distribution ๐ŸŒ
  • ๐Ÿ‡ท๐Ÿ‡บ Russia / CIS โ€” 41%
  • ๐Ÿ‡ณ๐Ÿ‡ฑ Netherlands โ€” 18%
  • ๐Ÿ‡ฉ๐Ÿ‡ช Germany โ€” 12%
  • ๐Ÿ‡ซ๐Ÿ‡ท France โ€” 9%
  • ๐ŸŒ Offshore hosting โ€” 20%

Ransomware DLS, RaaS and supporting infrastructure are frequently hosted in jurisdictions offering permissive hosting environments or limited enforcement cooperation, enabling operators to maintain resilient extortion platforms.

Operational models in ransomware campaigns ๐ŸŒ
  • ๐Ÿค RaaS affiliates โ€” 72%
  • ๐Ÿง  Core group operations โ€” 18%
  • โš™๏ธ Hybrid operations โ€” 10%

Most ransomware activity is driven by the Ransomware-as-a-Service (RaaS) model, where core developers provide infrastructure and malware while affiliates conduct intrusions and share profits. Direct operations by core groups remain a minority.

New Threat Actors 2026
  • January โ€ข MintEye, MS13089, Osiris
  • February โ€ข BravoX, sepc0, Sicari, VECT, SHADOWBYT3$
Ransomware claims in Italy: comparative overview

Exfiltrated data comparison
2025โ€“2026, Italy

This comparison highlights the volume of data exfiltrated and publicly released by ransomware threat actors across 2025 and early 2026, providing a perspective on how the scale of exposed information has evolved over time.

2024 (31,142.25 GB) already represented a significant level of activity and marked a clear escalation compared to 2025, both in the number of incidents and in the overall volume of leaked data.

published data in 2025

26,270.97

published data in 2026*

3,626.12


* all 2026 values presented here are based on verified incidents and are updated as of 28 February 2026.

Top 5 Regions 2026 ๐Ÿ‡ฎ๐Ÿ‡น
  • 1 โ€ข ๐Ÿ™๏ธ Lombardia
  • 2 โ€ข ๐ŸŽ๏ธ Emilia-Romagna
  • 3 โ€ข โš“ Liguria
  • 4 โ€ข ๐Ÿ›๏ธ Lazio
  • 5 โ€ข ๐ŸŒ‹ Campania
Top 5 Provinces 2026 ๐Ÿ‡ฎ๐Ÿ‡น
  • 1 โ€ข ๐Ÿ™๏ธ Milano
  • 2 โ€ข ๐Ÿ”๏ธ Bergamo
  • 3 โ€ข โš“ Genova
  • 4 โ€ข ๐Ÿ›๏ธ Roma
  • 5 โ€ข ๐ŸŽ“ Padova
Exfiltrated data by Region ๐Ÿ‡ฎ๐Ÿ‡น
  • Lombardia โ€” 95.80 GB
  • Veneto โ€” 470.00 GB
  • Piemonte โ€” 150.00 GB
  • Sicilia โ€” 145.00 GB
  • Emilia-Romagna โ€” 302.00 GB
Top targeted legal forms and target profile 2026 ๐Ÿ‡ฎ๐Ÿ‡น
  • ๐Ÿข SRL โ€” 15
  • ๐Ÿ› SPA โ€” 13
  • ๐Ÿ‘ฅ SNC โ€” 1
  • ๐Ÿ“ Other โ€” 16

 

  • Mid-size enterprises โ€” 48%
  • Large enterprises โ€” 34%
  • Small organizations โ€” 18%

Ransomware campaigns increasingly focus on medium and large organizations, which offer higher financial leverage and larger volumes of potentially exfiltrated data.

Economic impact of ransomware ๐Ÿ‡ช๐Ÿ‡บ
Average recovery cost

โ‚ฌ1.2M โ€“ โ‚ฌ2.8M

Typical recovery costs for ransomware incidents including downtime, system restoration, incident response and operational disruption.

Potential NIS2 administrative fines

Up to โ‚ฌ10M

Under the NIS2 Directive, essential entities may face penalties of up to โ‚ฌ10 million or 2% of global annual turnover for severe cybersecurity failures or non-compliance.

Average time to data leak
Average delay

9โ€“14 days

Fastest disclosure

48 hours

Longest delay observed

>30 days

Many ransomware incidents remain undisclosed for days before victims appear on leak sites, reflecting the time required for extortion pressure, negotiation attempts, or staged publication.


Monitoring methodology & ethical framework

Monitoring ransomware activity demands a careful balance between comprehensive coverage and analytical rigor. Our monitoring focuses exclusively on ransomware groups whose claims can be considered credible and attributable to identifiable targets.

Entities operating primarily as data brokers, aggregators of previously leaked material, or actors publishing unverifiable claims are excluded from our dataset, as their activity does not reflect genuine ransomware operations.

It is also common for certain groupsโ€”particularly those emerging from hacktivist environmentsโ€”to adopt ransomware-style extortion tactics. In these cases, we evaluate the claims themselves rather than relying solely on the groupโ€™s declared identity.

Each incident is subject to manual verification, duplicate detection, and contextual analysis. Claims that cannot be verified or cannot be linked to a legitimate and identifiable target are excluded from monitoring and statistical analysis.

About ransomNews

watchdogs in the age of digital warfare

real data. real threats.


ransomNews is an independent observatory dedicated to tracking and analyzing global ransomware activity. We monitor cyber extortion claims across the world, verify each incident manually, and compile clear, data-driven insights with a sharp focus on Italy.

Every month, we publish RedACT, in-depth report to inform, educate, and raise awareness - empowering businesses, institutions, and individuals to better understand the evolving ransomware landscape.

Our mission: to turn raw data into actionable knowledge, making cybersecurity a shared responsibility.

RedACT & dataset

Blog

Long-form analysis, commentary, and behind-the-scenes

LinkedIn verification: secure? Realiable? Think again.

Examining biometric processing, subprocessor chains, CLOUD Act exposure, and data sovereignty risks for users and organizations.

Ransomware case studies: Colonial Pipeline, Costa Rica and systemic cyber risk

A technical analysis of landmark ransomware attacks, examining operational impact, state response, critical infrastructure risk.

Supply Chain Ransomware: how attackers use your vendors against you

An evidence-based analysis of supply chain ransomware vectors and threat actor evolution, sector exposure.

0APT: arise of a giant or epic fake?

One of the most discussed ransomware group seems in between: a rising star in the RaaS ecosystem or a mass fake effect?

Ransomware incident at University La Sapienza

Another breach at one of the most known university in Italy and abroad; could be tied to Spain and US incidents?

The AI Social Newtwork
or where we failed at being humans

The quiet moment when an assistant stopped asking and started acting, and a whole social network shaked the buzz

Maritime Ransomware
the weird paradox of cybersecurity

Strategically critical, technologically messy, and yet many serious incidents land with a dull thud in public awareness.

What we do

ransomware disclosure, activity tracking & more

Ransomware Events Tracking

We monitor ransomware claims published by threat actors, verify their credibility, and enrich the data to provide structured intelligence on global ransomware activity.

Reports and Insights

We compile RedACT and RedACTinsights, free resources offering rigorously verified, data-driven reporting on ransomware activity and threat actors.

Open Source Threat Intel

We conduct deep OSINT and SOCMINT investigations to extract, verify, and contextualize threat actor claims and more.

Technical Data Support

We support organizations and institutions with tailored ransomware intelligence reports, sector-specific and data-driven.

Threat Landscape Briefings

We deliver curated threat landscape briefings, sector-specific, timely, and actionable, relevant to any organization.

Awareness

We raise awareness around invisible exposure: how our digital habits, overlooked traces, and public signals can silently map our vulnerabilities.

Where our data Speak

From global stages to specialized forums, our insights power the conversation

CyberAct Forum
Viterbo, Italy
ForumPA
Rome, Italy
Public Sector Stakeholders
Italy, Switzerland, Estonia
Private Consulting
Italy, Switzerland, Estonia

Intel Hub

Your central access point for ransomware knowledge

DataCarry ransomware group

An OSINT-based analysis of Datacarry ransomware group's tactics, infrastructure, and operational patterns.

The Gentlemen ransomware group

An OSINT-based analysis of The Gentlemen ransomware group's tactics, infrastructure, and operational patterns.

Lynx-Sinobi Incident Advisory

An incident advisory quick sheet about Lynx threat actor, now rebranded in Sinobi. Origin, tactics, infrastructure, and operational patterns.

akira ransomware group

An OSINT-based analysis of akira ransomware group's tactics, infrastructure, and operational patterns.

8base ransomware group

An OSINT-based analysis of 8base ransomware group's tactics, infrastructure, and operational patterns.

The Team

behind the firewall

follow us

FOLLOW US

Every alert starts with messy data.
We dig through claims, leaks, and fragments, verify whatโ€™s real, and connect the dots so the picture makes sense.

Follow us for real-time ransomware news, emerging threat groups, critical vulnerabilities, and the signals that often get missed.
Cybersecurity awareness isnโ€™t noise. Itโ€™s knowing what actually matters.