Ransomware surge: increase in attacks and groups detected in 2025

Searchlight Cyber's latest research reveals a significant rise in ransomware attacks, identifying record victims and new active groups in 2025.

  • Friday, 27th February 2026 Posted 2 months ago in by Sophie Milburn
In 2025, research from Searchlight Cyber outlines a challenging cybersecurity landscape, with ransomware groups reaching high levels of activity. The analysis is based on dark web intelligence and examines trends in ransomware operations throughout the year.

Ransomware attacks increased in 2025, with 7,458 victims listed on dark web platforms. This represents a 30% rise compared with the previous year. Although victim numbers declined slightly in the second half of the year, the report notes a significant increase in active ransomware groups, reaching a peak of 93 during that period.

Overall, 124 active groups were recorded during the year, supported by 73 new entrants. The growth in group activity highlights ongoing expansion within the ransomware ecosystem and increased pressure on cybersecurity teams.

The Qilin group recorded a 420% increase in activity compared with the previous year and emerged as one of the most active groups in the second half of 2025.

The report also highlights the emergence of so-called “Supergroups,” where smaller threat actors collaborate to expand operational capacity. In addition, the integration of artificial intelligence has lowered barriers to entry, enabling greater automation of attacks and contributing to the evolving threat landscape.

Activity among the most prominent ransomware groups included:

Qilin — 697 victims
Akira — 384 victims
IncRansom — 213 victims
Sinobi — 180 victims
Play — 164 victims

These groups accounted for a significant portion of recorded incidents, with newer groups such as Sinobi leveraging ransomware-as-a-service models to scale operations.

The report concludes by emphasising the importance of proactive defensive measures to address ransomware risks. It also references vulnerabilities described as “Shadow Exposure” in third-party software, highlighting supply chain risks and the need for organisations to address exposure points alongside external threats.
AvePoint has introduced updates to its Confidence Platform, with a focus on AI data protection, multicloud resilience, and governance capabilities.
inforcer introduces Copilot Manager to support MSPs in delivering AI services, including features related to monitoring and managing Shadow AI usage.
Guardz outlines how AI is influencing cybersecurity, with the report highlighting identity-related issues and vulnerabilities affecting MSPs, based...

Kaseya launches Agentic IT management platform

Posted 5 hours ago by Sophie Milburn
Kaseya has introduced an autonomous IT management system that uses AI and unified data to support IT operations and security management.
Westcon-Comstor has integrated its value-added services into the Microsoft Marketplace, aiming to support partner operations and improve scalability.

Pax8 and NinjaOne forge alliance to enhance SMB security

Posted 7 hours ago by Sophie Milburn
Pax8 teams up with NinjaOne, aiming to strengthen managed service providers through enhanced solutions and security infrastructure for SMBs.

Governing autonomous AI: challenges and solutions

Posted 1 day ago by Sophie Milburn
Exploring identity challenges with AI agents and governance opportunities for secure and scalable AI execution.

The risks of unsupervised AI adoption in UK enterprises

Posted 1 day ago by Sophie Milburn
As UK businesses increasingly adopt AI, risky data-sharing practices arise, underscoring the need for enhanced oversight and security measures.