A recent surge in ransomware and extortion attacks highlights the rapidly evolving tactics of cybercriminal groups targeting organizations across the globe.
According to the 2025 Unit 42 Global Incident Response Report, a staggering 86% of ransomware incidents in the past year resulted in significant business disruption, ranging from operational downtime to reputational damage.
The report, drawing on extensive incident response cases and threat intelligence, underscores a strategic shift among ransomware actors who now leverage a variety of sophisticated extortion methods to maximize the likelihood of ransom payments.
One of the most notable trends is the increased aggressiveness of attackers.
Cybercriminals are employing deceptive strategies such as making unsubstantiated claims about system compromises and threatening to leak sensitive data, sometimes using previously acquired or fabricated data to pressure victims.

Recent cases have involved the physical mailing of threatening letters to executives, with perpetrators impersonating renowned ransomware groups to enhance the perceived credibility of their demands.
These campaigns, often lacking any technical evidence of breach, are designed to exploit fear and uncertainty, resulting in additional financial and reputational burdens for targeted organizations.
Collaboration with Nation-state Actors and Technical Sophistication
The technical threat landscape has also shifted, with nation-state actors increasingly collaborating with ransomware groups.
Unit 42 documented, for the first time, direct involvement of North Korean state-sponsored threat actors utilizing existing ransomware infrastructure, acting in roles ranging from initial access brokers to affiliates.
In several high-profile incidents, groups such as Jumpy Pisces and Moonstone Sleet have deployed advanced ransomware payloads using tools and tactics borrowed from financially motivated cybercriminals.
This convergence of nation-state and criminal operations marks an alarming trend, suggesting a growing sophistication and resource pool for future attacks.

Ransomware actors are also aggressively targeting endpoint security defenses.
The adoption of so-called “EDR killers,” specialized tools engineered to disable endpoint detection and response systems, has become prevalent within cybercriminal affiliate networks.
These tools facilitate the undetected encryption of large volumes of data, substantially increasing the speed and impact of ransomware operations.
One Unit 42 investigation detailed an unsuccessful attempt by attackers to bypass Cortex XDR, offering rare insight into adversary tooling and operational playbooks.
Expansion to Cloud and Insider Threats
Threat actors are broadening their attack vectors, increasingly targeting cloud environments, virtualized infrastructure, and non-Windows operating systems.
Modern ransomware variants are now capable of exploiting misconfigured cloud resources, exposed credentials, and hybrid infrastructures, intensifying the risk to organizations with complex IT environments.
Groups such as Bling Libra and Muddled Libra have been particularly active in leveraging cloud-based access to maximize extortion opportunities.
Insider threats have emerged as a significant vector for extortion. North Korean operatives, using falsified, AI-enhanced identities to gain remote employment, have infiltrated organizations, stealing proprietary code and data.
In some instances, the threat of leaking stolen intellectual property has been used as leverage to extract additional payments from compromised entities, highlighting the multifaceted risks organizations face from both external and internal actors.
Analysis of leak sites from January to March 2025 reveals that the United States remains the most targeted country, followed by Canada, the United Kingdom, and Germany.
Manufacturing, wholesale & retail, and professional services top the list of most affected industries, driven by the high value of operational continuity and sensitive intellectual property.
Notably, ransomware activity exhibits seasonal fluctuations, with observed peaks aligning with global business cycles.
As ransomware actors continue to refine their extortion playbooks and technological arsenals, organizations must remain vigilant and proactive in deploying layered defenses, robust endpoint protection, and comprehensive incident response capabilities to mitigate the ever-evolving threat landscape.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates