Skip to content
Blog | | | 7 min read

Ransomware - Trends Analysis and Threat Evolution

Ransomware trends 2022-2025 - group rebranding, extortion without encryption, Operation Cronos, RaaS fragmentation. Data from ENISA, Chainalysis, Dragos.

Łukasz Drążek Łukasz Drążek
ransomwareENISAthreat analysisREvilDarkSideLockBitdata exfiltrationcybersecurity
Ransomware - Trends Analysis and Threat Evolution

Ransomware is no longer a problem for individual companies. In 2021-2022, the governments of many nations classified it as a national security threat. The response was multi-dimensional - from law enforcement actions, through new regulations, to the involvement of military and intelligence services. But have these efforts produced lasting results? Data from successive ENISA Threat Landscape reports (2022-2025) paints a more complex picture than a simple “attackers versus defenders” narrative.

TIP

This article covers trends from 2021 to 2025. If you are looking for the basics - what ransomware is, how it works, what variants exist - start with our ransomware guide. Best practices for prevention are covered in the article on ransomware prevention.

5,414

disclosed ransomware attacks globally in 2024

-35%

decline in ransom payments YoY ($813.55M in 2024)

85-119

active RaaS groups (ENISA/Dragos)

17 mo.

average time for a ransomware group to rebrand

Sources: Cyberint 2024, Chainalysis 2025, ENISA ETL 2025, Dragos 2026

Ransomware Groups in Law Enforcement Crosshairs

The intensification of law enforcement efforts in 2021-2024 produced tangible results. Several ransomware groups were forced to cease operations, and some even released decryption keys. International cooperation led to arrests of members from groups including REvil, Cl0p, NetWalker, LockerGoga, and MegaCortex.

Pivotal events:

  • US military involvement - public reports indicate active US Cyber Command operations against ransomware group infrastructure
  • REvil member arrests by FSB - Russia’s Federal Security Service conducted an operation that may have been motivated by geopolitical objectives
  • White House initiative - coordination of the international response to ransomware (with the deliberate exclusion of Russia)
  • Legal regulations - a ransom disclosure law requiring victims to inform the US government within 48 hours of payment
  • Operation Cronos (February 2024) - an international operation led by the NCA that resulted in the seizure of LockBit infrastructure, identification of 188 affiliates, and securing of 2,200 BTC (approximately $112 million) in illicitly obtained funds

These actions force criminal groups to change their modus operandi - increasing operational security, changing their name, and sometimes shifting focus to smaller targets.

High-profile incidents such as the Colonial Pipeline attack led to unprecedented pressure on ransomware groups. In response, many adopted a strategy of “retiring” and rebranding. The average time for such a rebrand is approximately 17 months.

The reasons are pragmatic:

MotivationExampleEffect on Law Enforcement
Threat to tools/infrastructurePublication of a decryption tool forces reorganizationRequires fresh technical analysis
Evading law enforcement scrutinyReducing visibility after a high-profile incidentLoss of operational context
Hindering attributionVictims pay someone not subject to sanctionsComplicates legal proceedings
Internal conflictsReorganization allows resolution of tensions within the groupPotential informants

Documented Rebranding Cases

  • DoppelPaymer - continued operations as the Grief ransomware
  • WastedLocker - cycled through the names Hades, Cryptolocker, Payloadbin, Macaw (spring-fall 2021)
  • DarkSide - following the Colonial Pipeline attack, became BlackMatter, then BlackCat/ALPHV (confirmed February 2022)
  • GandCrab - transformed into REvil, changing identity and operational strategies
  • LockBit - after Operation Cronos (2024), returned as LockBit 4.0, then LockBit 5.0 (“ChuongDong”) in September 2025

During 2021-2022, families such as Egregor, REvil, BlackMatter, and DoppelPaymer disappeared from the cybercrime landscape. At the same time, new ones emerged, often exhibiting technical similarities to those that had “retired.”

Ransomware by the Numbers - 2022 vs 2024

Metric2022 (ENISA ETL 2022)2024 (ENISA ETL 2025)
Disclosed ransomware attacks globallyapprox. 3,6405,414
FBI IC3 complaintsapprox. 2,3853,156 (+11.7% YoY)
Losses reported to IC3$34.3M$12.4M (note: lower due to decline in ransom payments)
Active RaaS groupsapprox. 3085 distinct operations (ENISA); 119 targeting industry (Dragos)
Decline in ransom payments (YoY)--35% in 2024

NOTE

The difference in group counts (85 per ENISA vs 119 per Dragos) stems from methodology: ENISA counts global RaaS operations, while Dragos tracks groups specifically targeting industrial organizations (including affiliates operating under different brands). Both figures are correct - they measure different things.

WARNING

The decline in ransom payments in 2024 does not mean a decline in the number of attacks. Quite the opposite - the number of incidents is rising, but organizations are increasingly refusing to pay, and law enforcement is more effectively recovering funds.

Data Exfiltration and Extortion Without Encryption

Since 2021, multi-extortion has become a clear trend. Ransomware groups began to realize that data theft alone could suffice to obtain a ransom - without the need to encrypt the victim’s systems.

This model operates on several levels:

  1. Data theft - exfiltration of sensitive information before any encryption
  2. Publication threats - dedicated Tor sites for publishing stolen data
  3. Leveraging insurance policies - groups such as LAPSUS$ and Karakurt reference the victim’s cyber insurance policy during negotiations
  4. Dedicated marketplaces - emergence of platforms for selling stolen data

Hacktivism as a new ransomware distribution channel is a trend visible since 2024. Groups such as CyberVolk, operating in Russian interests, began promoting and distributing multiple ransomware strains (AzzaSec, HexaLocker, Parano), combining ideological and financial motivations.

What This Means for Organizations

Solid backup strategies are necessary but insufficient. Organizations must also implement security controls focused on detecting and preventing data exfiltration - in line with the tactics described in MITRE ATT&CK (TA0010 Exfiltration).

Minimum Protection Checklist:

  • Outbound network traffic monitoring (DLP, NetFlow analysis)
  • Network segmentation to limit lateral movement
  • Monitoring of large data transfers to external services
  • Access controls for sensitive data repositories
  • Regular incident response exercises
  • Review and update of data access policies
  • Implementation of the principle of least privilege for accounts with remote access
  • Dark web monitoring for leaked credentials

Future Outlook

Ransomware remains one of the most serious threats to organizations and national security. Data from ENISA reports (2022-2025) points to several persistent trends:

  • Ecosystem fragmentation - following Operation Cronos, the ransomware ecosystem split into dozens of smaller groups (85-119 depending on methodology), including many entirely new ones
  • Law enforcement actions are producing results (35% decline in ransom payments), but are not eliminating the problem
  • Hacktivism is merging with ransomware - ideologically motivated groups are adopting ransomware as a funding source
  • The extortion-without-encryption model is gaining popularity
  • Ransomware is increasingly a tool of state actors, not just criminal groups

Organizations that want to effectively protect themselves against ransomware should treat this threat as a business problem requiring a comprehensive approach - from technical security controls, through incident response procedures, to regular team exercises. SEQRED helps organizations assess ransomware resilience through penetration testing and attack simulations.


Sources:

Need help in this area?

Our experts will help you assess the risk and plan next steps.

Talk to an expert

We'll discuss scope, methodology, and timeline.

+48 22 292 32 23 Talk to an expert