Friday, May 9, 2025
Homecyber securityRansomware Groups Target Organizations to Exfiltrate Data and Blackmail via Leak Site...

Ransomware Groups Target Organizations to Exfiltrate Data and Blackmail via Leak Site Posts

Published on

SIEM as a Service

Follow Us on Google News

Ransomware attacks have continued their relentless assault on organizations worldwide, with a focus on data exfiltration and subsequent blackmail through leak site posts.

Rapid7 Labs’ analysis of internal and public data provides insights into the evolving landscape of ransomware threats.

Evolving Tactics in Ransomware Operations

The ransomware ecosystem has seen a shift where established and emerging groups like Ailock, Belsen Group, and CrazyHunter, among others, maintain their aggressive tactics, shuns innovation for tried-and-true methods for revenue generation.

- Advertisement - Google News

These groups favor double extortion strategies, where data is both encrypted and stolen, placing immense pressure on victims to pay not only for decryption but also to prevent data leaks.

According to the Report, Key industries under siege this quarter include manufacturing, business services, healthcare, and construction.

Ransomware Groups
Top 10 Ransomware Groups

Rapidly, 22% of leak site posts targeted manufacturing organizations, showcasing a slight increase in focus on this sector.

Geographically, the U.S., Canada, the UK, Germany, and Australia continue to be prime targets, with an unusual rise in attacks on. victims from Colombia and Thailand.

A notable trend observed is the reinvestment of ransoms into zero-day exploits, as highlighted by the Black Basta chat leaks.

Although the’s unclear whether the Ivanti Connect Secure exploit discussed was purchased, it’s evident that ransomware groups are now looking to enhance their capabilities through technological acquisition.

This move to buy zero days represents a disturbing evolution in their operational sophistication.

Moreover, the repurposing of old data and the creation of new identities among ransomware groups has continued unabated.

Groups like Babuk 2.0, which turned out to be LockBit 3.0 with a new name, demonstrate the fluid nature of these entities, making tracking and anticipating their moves more challenging for cybersecurity professionals.

Emerging Players and Notable Shifts

Several new and rebranded groups are making headlines, with who leverage advanced tactics:

  • RansomHub has been particularly prolific, employing both encryption and data theft across multiple sectors, showing no signs of slowing down.
  • Cl0p continues to dominate with its history of supply-chain attacks, now focusing heavily on exploiting vulnerabilities in file transfer software.
  • Anubis represents a unique blend of cyber-extortion with a ‘Robin Hood’ twist, targeting organizations while presenting leaks as public interest stories.
  • Lynx and Qilin have also made significant impacts, with Lynx providing a user-friendly platform for affiliates, and Qilin showing versatility in targeting various sectors with high volumes of data exfiltration.
Ransomware Groups
 ransoms with deadlines

To combat these evolving threats, businesses are urge to bolster their defenses:

  • Enhance multi-factor authentication (MFA) settings, ensuring no exceptions for critical access points.
  • Deploy and maintain secure MFA protocols alongside strong password policies and geofencing restrictions.
  • Prioritize patch management for edge devices, particularly when vulnerabilities are actively exploited in the wild.

As we progress through 2025, the dual landscape of-rising sophisticated and straightforward ransomware tactics underscores the need for businesses to remain vigilant and proactive in their cybersecurity measures.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

FBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks

The Federal Bureau of Investigation (FBI) has issued a stark warning to businesses and...

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks

The Federal Bureau of Investigation (FBI) has issued a stark warning to businesses and...

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...