Ransomware Groups That Defined the Threat Landscape in 2025
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。首先,我得仔细阅读用户提供的文章内容。 文章主要讲的是GuidePoint Research and Intelligence Team(GRIT)发布的2026年勒索软件和网络威胁报告。报告指出,2025年勒索软件集团数量激增,达到了124个,比2024年增加了46%。其中,Qilin集团在2025年最为活跃,受害者数量从2024年的154人激增至1044人。他们使用双重勒索策略,但很多受害者并没有支付赎金。另外,Akira和Clop也是主要的勒索软件集团,分别利用零日漏洞和大规模漏洞攻击企业软件。 接下来的展望部分提到,已建立的勒索软件集团在2025年继续主导受害者数量,并且预计在2026年,碎片化、品牌重塑和附属机构迁移将继续影响勒索软件生态系统。 现在我要把这些信息浓缩到100字以内。首先确定关键点:报告名称、时间、勒索软件集团数量增加、Qilin的崛起及其策略、其他主要集团Akira和Clop的情况,以及未来的趋势。 然后组织语言,确保简洁明了。可能需要省略一些细节,比如具体的受害者数量或攻击手法的具体描述。 最后检查字数是否符合要求,并确保信息准确无误。 </think> GRIT 2026报告指出,2025年勒索软件集团数量激增至124个,Qilin成为最活跃的团伙,受害者激增1,044人。Akira和Clop也表现突出。未来碎片化和重组将影响勒索生态。 2026-3-3 17:25:53 Author: www.guidepointsecurity.com(查看原文) 阅读量:3 收藏

The GuidePoint Research and Intelligence Team (GRIT) recently released its GRIT 2026 Ransomware & Cyber Threat Report, which details some staggering new data from the prior year. The number of distinct named ransomware groups continues to rise year-over-year (YoY). There were a record-breaking 124 distinct named groups observed over the course of 2025, a 46% YoY increase from 2024.

While many groups remain fleeting, a handful of operators accounted for the majority of observed victims. Read on as we dive into the key groups, or download the full report here for even more details.

The Most Prolific Group of 2025: Qilin

Qilin, a ransomware group which first appeared in 2024, rose to much greater prominence in 2025 by publicly claiming the highest number of victims. The group went from posting 154 victims in 2024 to 1,044 by the end of 2025. This jump made Qilin – by far – the most prolific ransomware group GRIT observed in 2025.

Qilin primarily employs double-extortion ransomware tactics, relying on both encryption and data extortion to coerce compliance from victims. Despite its high victim volume, Qilin is far from the most profitable. A substantial portion of victims do not comply with its ransom demands.

Akira 

Akira, one of the longest-operating ransomware-as-a-service (RaaS) groups, remained prolific in 2025. It was responsible for the second-highest number of observed victims last year. Akira demonstrated a propensity for exploiting zero-day and n-day vulnerabilities on perimeter devices, including mass exploitation of SonicWall SSL VPNs.

Clop 

Clop, a data extortion group, eschewed ransomware deployment in favor of mass vulnerability exploitation campaigns targeting enterprise software platforms such as Cleo and Oracle E-Business Suite.

Looking Ahead

Established ransomware groups continued to account for the majority of observed victims in 2025, benefiting from experienced affiliates, economies of scale, and visible data leak sites. 

In 2026, GRIT believes that fragmentation, rebranding, and affiliate migration will continue to shape the ransomware ecosystem.

To explore detailed threat actor profiles, vulnerability analysis, and learn what we expect to see in 2026, read the full GRIT 2026 Ransomware and Cyber Threat Report.


文章来源: https://www.guidepointsecurity.com/blog/ransomware-groups-in-2025-grit-2026-ransomware-cyber-threat-report/
如有侵权请联系:admin#unsafe.sh