Ransomware in 2026 An Overview of Active and Emerging Threat Groups


January 1, 2026

Ransomware continues to evolve at a pace, with threat actors refining their tooling, targeting strategies, and extortion models.


For organisations, the challenge is no longer just preventing ransomware, but also understanding who the adversaries are, how they operate, and the risks they pose.


Now we're officially in 2026, we have compiled a high-level overview of ransomware gangs currently active or observed across global incident response and threat intelligence reporting.

Established and High-Impact Ransomware Gangs

Qilin

A ransomware-as-a-service (RaaS) operation known for double-extortion tactics, combining encryption with aggressive data-leak pressure.


Akira

Targets Windows and Linux environments, frequently exploiting VPNs and unmanaged credentials. Known for fast lateral movement.


LockBit

One of the most prolific ransomware groups historically. Highly automated, affiliate-driven, and relentlessly opportunistic despite repeated takedowns.


Clop

Specialises in mass exploitation of zero-day vulnerabilities, particularly in file-transfer platforms, focusing on data theft over encryption.


Rhysida

Often targets healthcare, education, and public sector organisations, using double extortion and public shaming tactics.


Medusa

A mature ransomware group known for targeted attacks, data exfiltration, and structured leak site operations.

Established and High-Impact Ransomware Gangs

Devman 2.0 / Devman 3.0

Indicative of active development cycles, suggesting either rebranding or technical evolution to evade detection.


Kill Security 3.0 Ransomware

Versioned naming implies continuous refinement of payloads and evasion techniques.


Dire Wolf v2

A re-engineered variant focusing on improved encryption routines and persistence mechanisms.


Obscura 2.0

A successor strain emphasising stealth, obfuscation, and reduced forensic visibility.


3AM v3

Associated with off-hours execution and rapid impact, often linked to broader criminal ecosystems.

Data-Leak and Extortion-Focused Operations

Ransom House

Primarily focuses on data theft and extortion without always deploying encryption.


World Leaks / Business Data Leaks / Leaknet

Leak-centric brands designed to amplify reputational damage and regulatory pressure.


Coinbase Cartel Ransomware

Uses branding and naming pressure tactics to imply large-scale financial exposure.


DATACARRY

Centred on data exfiltration, resale, and extortion rather than pure operational disruption.

Emerging, Smaller, or Less Publicised Groups

Dragon Force

A developing RaaS group with signs of expanding affiliate recruitment.


INC

Limited public reporting, but observed in targeted attacks against commercial organisations.


Play

Known for hands-on-keyboard attacks and manual privilege escalation.


Lynx

A newer group with focused targeting and selective victim disclosure.


Everest

Combines ransomware deployment with persistent data-leak operations.


Genesis

Often associated with credential abuse and identity-based intrusion paths.


Chaos Ransomware

Sometimes linked to destructive behaviour beyond pure financial extortion.

Niche, Opportunistic, or Short-Lived Operations

Safepay Ransomware

Focused on monetisation via rapid extortion cycles.


Sinobi

Limited activity but notable for reusing known malware components.


Handala

Ideologically motivated branding alongside financially driven attacks.


Anubis Ransomware

Multiple groups have used this name, complicating attribution.


The Gentlemen

Relies heavily on social pressure and public disclosure threats.


Space Bears

A newer entrant with unclear long-term sustainability.

Low-Visibility or Poorly Documented Threat Actors

These groups have limited public reporting but have appeared in threat feeds, leak sites, or underground forums:


  • Blackshrantac
  • Minteye
  • NightSpire Ransomware
  • TridentLocker
  • Crypto24 Ransomware
  • Benzona
  • Nitrogen
  • Securotrop
  • Pear
  • Kazu
  • W.A. Ransomware
  • Termite Ransomware
  • Osiris Project
  • Brotherhood
  • Embargo
  • Radar
  • TENGU ransomware blog
  • Sarcoma
  • Cloak
  • Abyss


Such actors often represent rebrands, splinter groups, or short-term campaigns, but still pose real risk, particularly to organisations with weak access controls or poor detection coverage.

What This Means For You

The ransomware ecosystem is crowded, volatile, and constantly shifting. New names appear weekly, while established gangs rebrand, fragment, or resurface under different identities.


Key takeaways:

  • Ransomware is no longer just malware; it’s an operational business model
  • Data theft and extortion are now as common as encryption
  • Attribution matters less than preparedness, detection, and response capability
  • Organisations without tested incident response plans remain the most exposed

Cybergen’s Perspective

At Cybergen, our incident response and threat intelligence work consistently shows that ransomware success is rarely driven by novel malware alone. The most damaging incidents stem from familiar failures: exposed credentials, excessive privileges, unmonitored access paths, and delayed detection. Threat actors exploit operational blind spots far more often than they defeat well-designed controls.


We also see a clear shift away from “spray and pray” ransomware towards targeted, intelligence-led intrusion. Many of the groups listed above operate with patience—mapping environments, identifying crown-jewel data, and timing execution to maximise disruption and leverage. Encryption is increasingly optional; data theft, regulatory exposure, and reputational damage now drive extortion value.


From our perspective, organisations that fare best against ransomware share common traits:


  • Strong identity and access governance, particularly around privileged and third-party access
  • Continuous monitoring capable of detecting abnormal behaviour before encryption occurs
  • Practised, decision-ready incident response plans tested under realistic conditions
  • Executive understanding that ransomware is a business risk, not just a technical one


Crucially, we observe that investment skewed too heavily toward preventative tooling—without equal focus on detection, response, and recovery—creates a false sense of security. Ransomware resilience is built through layered controls, clear ownership, and the ability to act decisively under pressure.


  • Understanding who the threat actors are provides context.
  • Understanding how they succeed provides defence.
  • Being operationally ready is what ultimately limits impact.


For organisations seeking to move beyond reactive security and build true ransomware resilience, Cybergen delivers threat intelligence, detection, and response capabilities designed for real-world adversaries, not theoretical ones.


For more information about next-generation threat intelligence and ransomware readiness, get in touch with our team today.

Ready to strengthen your security posture? Contact us today for more information on protecting your business.


Let's get protecting your business

Disaster Recovery

Keep your data secure and protected at all times.


Cybergen News

Sign up to get industry insights, trends, and more in your inbox.

Contact Us

SHARE THIS

Latest Posts

Blue shield with a padlock icon in a digital background with binary code, representing cybersecurity.
February 23, 2026
Why compliance-driven security fails in 2026. Learn how attackers exploit identity and attack paths, and how intelligence-led penetration testing reduces real cyber risk
Woman presenting AI concept on screen, pointing with a laptop. Blue tones, glowing
February 21, 2026
How AI is transforming cyber attacks in 2026, from deepfake phishing to adaptive malware — and what CISOs must do now to reduce risk and strengthen resilience.
Laptop with a fingerprint scan graphic overlaid, symbolizing secure access.
February 17, 2026
Why traditional penetration testing fails in 2026, and what effective, risk-driven testing really looks like. Discover how to move beyond CVSS scores and vulnerability lists to attacker-focused attack paths, identity compromise, lateral movement, and measurable risk reduction that actually improves security outcomes.
Person wearing VR headset, text
February 11, 2026
Explore the future of cybersecurity in 2026. Discover emerging threats, evolving attack methods, and how organisations can stay resilient in a changing threat landscape.
Man looking at a digital interface with holographic building model, graphs, and code overlays, indoors.
February 11, 2026
Cyber threat intelligence reveals how modern ransomware attacks really start: credential abuse, trusted access, and quiet pre-positioning long before impact.
Red and blue digital graphic with the word
February 5, 2026
CREST pen testing reveals what really happens after initial compromise. Learn how attackers escalate privileges, move laterally, and how testing exposes real risk.
Notepad++ code editor window with C++ code and Notepad++ logo with a gecko.
February 3, 2026
Notepad++ update infrastructure was hijacked in a targeted supply-chain attack. Learn what happened, who was behind it, and why it matters.
Hand holding magnifying glass over digital warning sign on screen.
February 1, 2026
High-severity vulnerabilities don’t equal real cyber risk. Learn why CVSS-driven risk registers fail, how attackers exploit exposure, and how CTEM reduces real-world risk.
Hand touching a glowing security shield interface with a binary code background.
February 1, 2026
Breaches persist despite audits and investment. Learn how threat-led security turns cyber activity into prioritised risk reduction with threat intelligence, MDR and CTEM.
Silhouette of person holding laptop, surrounded by multiple glowing computer screens displaying code. Blue tones.
January 24, 2026
Most cyber attacks begin quietly with recon and stolen credentials, long before your tools alert. Learn what security teams miss and how to detect intrusions earlier with threat intel, MDR and hunting.