Ransomware Shift: Low Payouts Force Return to Encryption and Targeted Disruption
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

Industrial Control Systems: Rising pre‑positioning and ransomware force OT resilience shift
By 2026, adversaries will increasingly combine quiet, long‑dwell reconnaissance with financially motivated ransomware and faster weaponization to exploit ICS. Defenders must adopt CTEM, identity‑centric controls (including comprehensive machine‑identity inventories and rapid revocation), OT‑aware zero trust, SBOM-driven supply‑chain visibility, and conservative AI-based anomaly detection to preserve uptime and compress remediation windows.

U.S. Authorities Seize RAMP, a Major Ransomware Marketplace
Federal agents have taken control of RAMP’s online domains, disrupting a multilingual marketplace that facilitated ransomware and related criminal services. The move removes a central storefront but leaves tooling, relationships, and likely migration paths intact, while providing intelligence opportunities for follow-on prosecutions.
Machine identities missing from ransomware playbooks
Enterprise ransomware playbooks commonly treat credential resets as a human-only control, leaving service accounts, API keys, tokens and certificates intact — a blind spot that accelerates lateral movement and drives recovery costs. Market shifts toward targeted, disruption-focused extortion and faster weaponization via agentic AI make that omission more dangerous: defenders must pair machine-identity governance with identity-first detection and quicker containment to blunt modern ransomware economics.
US and Global Outlook: AI Is Rewiring Malware Economics and Attack Paths for 2026
Advances in agentic and generative AI are accelerating attackers’ ability to discover vulnerabilities, craft tailored exploits, and scale precise intrusions, while high‑fidelity synthetic media amplifies social‑engineering at industrial scale. Organizations that rely solely on basic hygiene will be outpaced; defenders must combine rigorous fundamentals with identity‑first controls, behavioral detection, and governed AI playbooks to blunt this shift.
Ransomware strike at Ingram Micro exposes sensitive records of ~42,500 people
A July ransomware incident at Ingram Micro led to the theft of employment and applicant records for about 42,521 people and service outages that were largely resolved within a week. A threat actor later published roughly 3.5 TB of claimed data; the company is offering two years of identity protection while facing regulatory notification, legal exposure, and heightened supply‑chain scrutiny.
Europe Sees Sharp Rise in Violent Crypto Thefts as Physical Coercion Surges
Physical, in-person attacks to seize cryptocurrency surged in 2025, with confirmed incidents rising sharply and Europe becoming a primary hotspot. While wrench-style and kidnapping-for-keys incidents accounted for millions in confirmed losses, on-chain social engineering and large single hacks still dominate total dollar losses, a dynamic amplified by a more professionalized laundering ecosystem.
Global crypto thefts jump to $370.3M in January as phishing and large scam dominate losses
January’s crypto losses reached about $370.3M, driven mainly by phishing and one outsized social‑engineering theft; contemporaneous reports — including a 149M‑credential infostealer cache and a TRM Labs review of 2025 flows — help explain why credential theft and sophisticated laundering continue to magnify single‑incident impact and frustrate trace-and-freeze responses.
Illicit crypto proceeds jump to $158 billion in 2025 as bad actors professionalize, TRM report shows
TRM Labs finds criminal actors moved about $158 billion in digital assets in 2025 even as illicit activity fell to roughly 1.2% of total volume; the report warns the rise stems from more organized laundering ecosystems that exploit stablecoins, bespoke wallet clusters and peer-mediated on‑ramps. Language‑specific networks, broker and mule infrastructures, and resilient messaging‑app marketplaces are enabling faster, harder‑to‑freeze flows that demand coordinated FIU, exchange and platform responses.