Ransomware has evolved from a nuisance -- individual operators distributing screen lockers via spam -- into the most financially impactful cybercrime category in operation. The modern ransomware ecosystem functions as a mature underground economy with specialization, division of labor, and franchise-like business models.
Ransomware-as-a-Service (RaaS) mirrors legitimate SaaS models. Operators (also called developers or core teams) build and maintain the ransomware payload, encryption routines, negotiation portals, leak sites, and backend infrastructure. Affiliates are the operators' customers -- they conduct the actual intrusions, move laterally through victim networks, exfiltrate data, and deploy the ransomware. Revenue is split, typically 70--80% to the affiliate and 20--30% to the operator, though terms vary by program and affiliate reputation.
This separation of concerns allows each side to specialize. Operators focus on malware development, cryptographic implementation, and infrastructure resilience. Affiliates focus on intrusion tradecraft, often purchasing initial access from yet another specialist layer -- Initial Access Brokers (IABs).
Law enforcement operations -- Operation Cronos (LockBit), Hive takedown, ALPHV seizure -- repeatedly demonstrate a hydra effect: disrupting one group scatters its affiliates to competing programs, often increasing the total number of active operations. When ALPHV/BlackCat exit-scammed in March 2024, its affiliates migrated en masse to RansomHub and other programs, which saw immediate surges in activity. The total volume of ransomware attacks has not meaningfully declined despite multiple high-profile takedowns.
Sources: Chainalysis, Coveware, Sophos State of Ransomware reports. Figures are approximate; actual totals are likely significantly higher due to unreported payments.
Declining Payment Rates
The single most important trend in ransomware economics is the collapse of payment rates -- from ~79% in 2022 to an estimated ~28% in early 2025 (Coveware). This is driven by: improved backup resilience, law enforcement pressure, regulatory/legal risks of paying, and insurer pushback. However, attackers are compensating by increasing volume and demand sizes, meaning total revenue has not proportionally declined.
Cost to launch a RaaS operation: Estimated at $50K--$200K for a technically capable team, covering:
Encryptor development (or purchase/modification of leaked builders like LockBit 3.0, Babuk, Conti)
Tor infrastructure (negotiation portal, leak site, admin panel)
Bulletproof hosting
Initial affiliate recruitment
Profit margins: Operators running established RaaS programs with high affiliate counts can achieve margins exceeding 80--90% on their cut, as infrastructure costs are relatively fixed while revenue scales with affiliate activity.
Ransomware payments flow almost exclusively through cryptocurrency, primarily Bitcoin, though some groups accept or prefer Monero for its enhanced privacy features. Laundering pathways include:
Mixers/tumblers (e.g., Tornado Cash, Sinbad -- both sanctioned)
Cross-chain bridges to move between blockchains
Nested exchanges and OTC desks in jurisdictions with weak KYC
Peel chains -- splitting payments into progressively smaller amounts across hundreds of wallets
DeFi protocols for obfuscation
Law enforcement has improved tracing capabilities (Chainalysis, TRM Labs), leading to some notable seizures (Colonial Pipeline recovery of $2.3M), but the majority of ransomware proceeds are still successfully laundered.
The following table covers major ransomware groups, both currently active and historically significant. Status reflects best available intelligence as of early 2026.
Knowledge Gap
Attribution in ransomware is inherently uncertain. Group names often represent brands under which multiple independent affiliates operate. "Revenue estimates" are based on blockchain analysis and leak site data, which undercount actual payments. Active periods are approximate.
Group
Status
Active Period
Known Affiliations / Lineage
Revenue Est.
Notable TTPs
LockBit (3.0)
Active (resurfaced Sep 2025)
2019--present
Formerly largest RaaS; Russian-speaking operator "LockBitSupp"
The following breaks down ransomware TTPs by kill chain phase. Most modern ransomware intrusions take 1--10 days from initial access to encryption deployment, though some groups (Black Basta) have been observed achieving domain-wide encryption in under 12 hours.
Affiliates purchase pre-established access (VPN credentials, web shells, RDP) from Initial Access Brokers; prices range $500--$50K+ depending on target revenue/industry
Initial Access Brokers (IABs): Sell pre-established footholds (VPN credentials, web shells, RDP access) on forums like Exploit, XSS, and RAMP. Prices: $500 for SMB access, $10K--$50K+ for large enterprise/government targets. See Initial Access Brokers for deep dive.
Infostealer Logs: Credentials harvested by Raccoon, RedLine, Vidar, Lumma, and others are sold in bulk on Russian Market, Genesis Market (taken down 2023), and Telegram channels. Often provide VPN/RDP credentials that directly enable ransomware access.
Zero-day in Progress MOVEit Transfer (CVE-2023-34362); mass exploitation; no encryption deployed
British Library
Oct 2023
Rhysida
Major cultural institution; systems offline for months
Demonstrated devastating impact on underfunded public sector organizations
MGM Resorts
Sep 2023
Scattered Spider (ALPHV affiliate)
$100M+ estimated losses; casino/hotel operations disrupted 10 days
Social engineering of IT help desk; MFA fatigue attack; highlighted identity security gaps
Caesars Entertainment
Sep 2023
Scattered Spider (ALPHV affiliate)
$15M ransom paid
Social engineering attack; paid to prevent customer data leak
Change Healthcare
Feb 2024
ALPHV/BlackCat
Largest US healthcare disruption; $22M paid; claims processing halted nationwide
ALPHV exit-scammed; affiliate "Notchy" may have been paid separately; exposed single-point-of-failure in US healthcare payments
CDK Global
Jun 2024
BlackSuit
15,000+ US auto dealerships disrupted for 2+ weeks
Highlighted software supply chain risk in automotive retail
Cleo (Harmony, VLTrader)
Dec 2024--Jan 2025
Cl0p
Hundreds of organizations via zero-day (CVE-2024-50623, CVE-2024-55956)
Repeated Cl0p's MOVEit playbook against another file transfer product
NHS Synnovis (UK)
Jun 2024
Qilin
London hospital pathology services disrupted; 10,000+ appointments cancelled
Highlighted healthcare sector vulnerability; patient data leaked
Healthcare Under Siege
Ransomware actors have increasingly targeted healthcare despite early pandemic-era pledges to avoid hospitals. In 2024, healthcare was the single most impacted sector by ransomware. The Change Healthcare attack alone demonstrated how a single compromise can cascade across an entire national healthcare system. Multiple hospital systems reported delayed patient care and diverted ambulances during active ransomware incidents.
Every major takedown has been followed by affiliate migration, not retirement. The pattern is consistent:
Group A is disrupted
Affiliates (who possess the intrusion skills) migrate to Groups B, C, D
Competing groups actively recruit displaced affiliates
Total attack volume remains stable or increases
New groups emerge to fill market gaps
This dynamic means that law enforcement operations are necessary but insufficient. They impose costs, recover some funds, and provide decryption keys to victims -- but they do not reduce the total addressable threat. Sustained pressure on the financial infrastructure (cryptocurrency mixers, exchanges) and safe havens (Russia, CIS countries) remains critical.
Ransomware defense requires a layered strategy addressing each phase of the kill chain. The following maps defensive priorities to the TTPs documented above.
VPN/firewall exploitation (Fortinet, Cisco, Citrix, Ivanti, Palo Alto) is the #1 initial access vector for ransomware affiliates. Patch within 24--48 hours of advisory.
MFA on all remote access
Eliminates credential-based access via stolen/purchased credentials. Phishing-resistant MFA (FIDO2) preferred.
Email security with URL sandboxing
Blocks phishing and callback phishing campaigns.
Vulnerability management for edge devices
Continuous scanning of internet-facing infrastructure; prioritize CISA KEV catalog entries.
IAB monitoring
Dark web monitoring for organizational credentials and access listings.
Ransomware is the single largest driver of cybersecurity spending across virtually every segment. It is the threat that boards of directors understand and the risk that justifies budget increases.
The cyber insurance market is deeply entangled with the ransomware economy:
Premium trajectory: Rates increased 50--100%+ in 2021--2023 as ransomware claims surged; stabilized somewhat in 2024--2025 as underwriting matured
Minimum security requirements: Most insurers now mandate MFA, EDR, offline backups, patch management as preconditions for coverage
Payment controversy: Ongoing debate about whether insurance-funded payments sustain the ransomware economy; some jurisdictions considering bans on ransom payments
Loss ratios: Ransomware accounts for 60--75% of cyber insurance claims by value (source: Coalition, Corvus reports)
Q1 2025 saw a 126% YoY increase in ransomware activity, driven by: RansomHub's rapid growth absorbing ALPHV affiliates, Cl0p's Cleo exploitation campaign, continued exploitation of edge device vulnerabilities, and proliferation of new smaller groups. This represents the highest single-quarter volume on record.
Following ALPHV/BlackCat's exit scam in March 2024, RansomHub emerged as the dominant RaaS operation by mid-2024. Its competitive affiliate terms (reported 90/10 split) and willingness to accept experienced affiliates from disrupted groups fueled rapid growth. By Q4 2024, RansomHub consistently posted the highest monthly victim counts.
LockBit Resurgence (Sep 2025)
Despite Operation Cronos (Feb 2024) seizing infrastructure and identifying operator Dmitry Khoroshev, LockBit resurfaced in September 2025 with updated infrastructure. The resurgence underscored the difficulty of permanently dismantling RaaS operations when the operator remains at liberty in a non-extraditing jurisdiction.
Knowledge Gap
Details on LockBit's post-resurgence operational tempo, affiliate count, and infrastructure changes are still emerging. The degree to which the resurfaced operation matches its pre-Cronos scale is uncertain.
Cl0p's Continued Zero-Day Exploitation (2024--2025)
Cl0p continued its pattern of mass-exploiting zero-days in file transfer appliances, targeting Cleo Harmony and VLTrader (CVE-2024-50623, CVE-2024-55956) in late 2024/early 2025. This follows the same playbook used against Accellion (2021), GoAnywhere (2023), and MOVEit (2023). Cl0p's approach is distinctive: mass exploitation, data exfiltration, extortion -- with no encryption deployed.
BianLian's Shift to Exfiltration-Only (2024)
BianLian abandoned encryption entirely in 2024, relying solely on data theft and extortion. This trend is notable because it removes the "smoking gun" of encrypted files, potentially delaying detection and complicating insurance claims that may have encryption-specific triggers.
ESXi Targeting Proliferation
Nearly every major group now maintains Linux/ESXi variants of their encryptor. Targeting VMware ESXi hypervisors allows encryption of entire virtual machine fleets simultaneously, maximizing disruption from a single execution.
Continued Healthcare Targeting
Despite periodic pledges by some groups to avoid healthcare, the sector remained the most targeted in 2024--2025. The Change Healthcare attack ($22M payment, nationwide disruption) demonstrated catastrophic cascading effects.
BYOVD Becomes Standard
Bring Your Own Vulnerable Driver attacks for EDR evasion transitioned from a novel technique to a standard component of the ransomware playbook by 2025. Multiple commercial and custom tools (Terminator, AuKill, Backstab) are widely available.
Edge Device Exploitation Dominance
Exploitation of internet-facing VPN, firewall, and remote access appliances overtook phishing as the leading initial access vector for ransomware in 2024--2025. Fortinet, Citrix, Ivanti, Cisco, and Palo Alto products were all impacted by critical vulnerabilities actively exploited by ransomware affiliates.
Sophos (2024). State of Ransomware 2024. sophos.com
Disclaimer
Revenue estimates, payment figures, and attribution in this document are drawn from publicly available sources including blockchain analysis firms, incident response companies, and law enforcement announcements. Actual figures are likely significantly higher due to unreported incidents. Group attributions are based on best available intelligence and are subject to revision. This document reflects information available as of early 2026.
This glossary defines the acronyms and key terms used throughout the cybersecurity market research site. Use it as a quick reference when navigating segment analyses, pain-point discussions, and opportunity assessments.
Ransomware-as-a-Service — cybercrime business model where ransomware operators provide malware and infrastructure to affiliates who conduct attacks, splitting profits
RGB
Reconnaissance General Bureau — North Korea's primary intelligence agency responsible for clandestine operations including cyber operations