Ransomware in 2026 An Overview of Active and Emerging Threat Groups


January 1, 2026

Ransomware continues to evolve at a pace, with threat actors refining their tooling, targeting strategies, and extortion models.


For organisations, the challenge is no longer just preventing ransomware, but also understanding who the adversaries are, how they operate, and the risks they pose.


Now we're officially in 2026, we have compiled a high-level overview of ransomware gangs currently active or observed across global incident response and threat intelligence reporting.

Established and High-Impact Ransomware Gangs

Qilin

A ransomware-as-a-service (RaaS) operation known for double-extortion tactics, combining encryption with aggressive data-leak pressure.


Akira

Targets Windows and Linux environments, frequently exploiting VPNs and unmanaged credentials. Known for fast lateral movement.


LockBit

One of the most prolific ransomware groups historically. Highly automated, affiliate-driven, and relentlessly opportunistic despite repeated takedowns.


Clop

Specialises in mass exploitation of zero-day vulnerabilities, particularly in file-transfer platforms, focusing on data theft over encryption.


Rhysida

Often targets healthcare, education, and public sector organisations, using double extortion and public shaming tactics.


Medusa

A mature ransomware group known for targeted attacks, data exfiltration, and structured leak site operations.

Established and High-Impact Ransomware Gangs

Devman 2.0 / Devman 3.0

Indicative of active development cycles, suggesting either rebranding or technical evolution to evade detection.


Kill Security 3.0 Ransomware

Versioned naming implies continuous refinement of payloads and evasion techniques.


Dire Wolf v2

A re-engineered variant focusing on improved encryption routines and persistence mechanisms.


Obscura 2.0

A successor strain emphasising stealth, obfuscation, and reduced forensic visibility.


3AM v3

Associated with off-hours execution and rapid impact, often linked to broader criminal ecosystems.

Data-Leak and Extortion-Focused Operations

Ransom House

Primarily focuses on data theft and extortion without always deploying encryption.


World Leaks / Business Data Leaks / Leaknet

Leak-centric brands designed to amplify reputational damage and regulatory pressure.


Coinbase Cartel Ransomware

Uses branding and naming pressure tactics to imply large-scale financial exposure.


DATACARRY

Centred on data exfiltration, resale, and extortion rather than pure operational disruption.

Emerging, Smaller, or Less Publicised Groups

Dragon Force

A developing RaaS group with signs of expanding affiliate recruitment.


INC

Limited public reporting, but observed in targeted attacks against commercial organisations.


Play

Known for hands-on-keyboard attacks and manual privilege escalation.


Lynx

A newer group with focused targeting and selective victim disclosure.


Everest

Combines ransomware deployment with persistent data-leak operations.


Genesis

Often associated with credential abuse and identity-based intrusion paths.


Chaos Ransomware

Sometimes linked to destructive behaviour beyond pure financial extortion.

Niche, Opportunistic, or Short-Lived Operations

Safepay Ransomware

Focused on monetisation via rapid extortion cycles.


Sinobi

Limited activity but notable for reusing known malware components.


Handala

Ideologically motivated branding alongside financially driven attacks.


Anubis Ransomware

Multiple groups have used this name, complicating attribution.


The Gentlemen

Relies heavily on social pressure and public disclosure threats.


Space Bears

A newer entrant with unclear long-term sustainability.

Low-Visibility or Poorly Documented Threat Actors

These groups have limited public reporting but have appeared in threat feeds, leak sites, or underground forums:


  • Blackshrantac
  • Minteye
  • NightSpire Ransomware
  • TridentLocker
  • Crypto24 Ransomware
  • Benzona
  • Nitrogen
  • Securotrop
  • Pear
  • Kazu
  • W.A. Ransomware
  • Termite Ransomware
  • Osiris Project
  • Brotherhood
  • Embargo
  • Radar
  • TENGU ransomware blog
  • Sarcoma
  • Cloak
  • Abyss


Such actors often represent rebrands, splinter groups, or short-term campaigns, but still pose real risk, particularly to organisations with weak access controls or poor detection coverage.

What This Means For You

The ransomware ecosystem is crowded, volatile, and constantly shifting. New names appear weekly, while established gangs rebrand, fragment, or resurface under different identities.


Key takeaways:

  • Ransomware is no longer just malware; it’s an operational business model
  • Data theft and extortion are now as common as encryption
  • Attribution matters less than preparedness, detection, and response capability
  • Organisations without tested incident response plans remain the most exposed

Cybergen’s Perspective

At Cybergen, our incident response and threat intelligence work consistently shows that ransomware success is rarely driven by novel malware alone. The most damaging incidents stem from familiar failures: exposed credentials, excessive privileges, unmonitored access paths, and delayed detection. Threat actors exploit operational blind spots far more often than they defeat well-designed controls.


We also see a clear shift away from “spray and pray” ransomware towards targeted, intelligence-led intrusion. Many of the groups listed above operate with patience—mapping environments, identifying crown-jewel data, and timing execution to maximise disruption and leverage. Encryption is increasingly optional; data theft, regulatory exposure, and reputational damage now drive extortion value.


From our perspective, organisations that fare best against ransomware share common traits:


  • Strong identity and access governance, particularly around privileged and third-party access
  • Continuous monitoring capable of detecting abnormal behaviour before encryption occurs
  • Practised, decision-ready incident response plans tested under realistic conditions
  • Executive understanding that ransomware is a business risk, not just a technical one


Crucially, we observe that investment skewed too heavily toward preventative tooling—without equal focus on detection, response, and recovery—creates a false sense of security. Ransomware resilience is built through layered controls, clear ownership, and the ability to act decisively under pressure.


  • Understanding who the threat actors are provides context.
  • Understanding how they succeed provides defence.
  • Being operationally ready is what ultimately limits impact.


For organisations seeking to move beyond reactive security and build true ransomware resilience, Cybergen delivers threat intelligence, detection, and response capabilities designed for real-world adversaries, not theoretical ones.


For more information about next-generation threat intelligence and ransomware readiness, get in touch with our team today.

Ready to strengthen your security posture? Contact us today for more information on protecting your business.


Let's get protecting your business

Disaster Recovery

Keep your data secure and protected at all times.


Cybergen News

Sign up to get industry insights, trends, and more in your inbox.

Contact Us

SHARE THIS

Latest Posts

A person in a suit works at a desk with multiple monitors displaying complex data, charts, and a glowing digital lock.
April 11, 2026
AI is creating new, invisible data security risks. Learn how shadow AI, insider behaviour, and identity threats are exposing organisations, and how to defend against them.
A hand touching a tablet screen against a blue digital background with a glowing padlock icon.
April 8, 2026
MFA is no longer enough. Discover how attackers bypass identity controls and why intelligence-led security is critical to defending modern organisations.
A digital blue globe surrounded by floating data panels and a network of connected nodes on a black background.
April 6, 2026
AI is accelerating cyber attacks faster than organisations can respond. Discover why intelligence-led security is now critical to defending against real-world threats in 2026.
A person sits at a desk in a dark office, monitoring multiple computer screens displaying code and a large padlock icon.
April 2, 2026
Traditional security testing is no longer enough. Discover how CTEM helps organisations identify and eliminate real-world attack paths before they are exploited.
A glowing blue digital vortex swirls in a futuristic dark room, surrounded by floating holographic data displays.
March 25, 2026
Agentic AI is transforming cybercrime by enabling autonomous attack systems that can plan, adapt, and execute sophisticated cyber campaigns at scale, forcing organisations to rethink traditional defences and prepare for faster, more intelligent threats.
A person sits at a laptop in a dark room with floating, glowing blue digital data panels while two figures stand nearby.
March 22, 2026
Discover how infostealer malware fuels today’s cybercrime economy, harvesting billions of credentials and enabling attackers to access corporate systems with ease.
Two-story glass office building at night with blue lighting, computer screens, and silhouettes of people working inside.
March 21, 2026
Breaking in is dead. Discover why identity-based attacks are rising, how attackers log in undetected, and what organisations must do to stay secure.
A server room rack projects a glowing blue holographic shield icon and streaming code, both surrounded by digital flames.
March 14, 2026
Shadow AI is rapidly becoming one of the most dangerous hidden cybersecurity risks. Discover how unsanctioned AI tools expose data, IP and compliance vulnerabilities.
Blue abstract network of connected points on dark blue background.
March 10, 2026
Explore how AI is reshaping cybersecurity. Strategic insights for CISOs and CTOs on adaptive defence, AI-driven threats, identity security and future-ready cyber strategy.
Blue shield with a padlock icon in a digital background with binary code, representing cybersecurity.
February 23, 2026
Why compliance-driven security fails in 2026. Learn how attackers exploit identity and attack paths, and how intelligence-led penetration testing reduces real cyber risk