Ransomware activity: mixed signals amidst global tensions and technological shifts

Despite a decrease in ransomware incidents, evolving technologies and global tensions signal a complex risk landscape for organisations in February 2026.

Following record levels of ransomware incidents in February 2025, which reached a high of 1,099 attacks, activity decreased to 635 incidents in February 2026. Although this represents a year-on-year reduction, influenced in part by earlier activity from the Cl0p ransomware group, it should not be interpreted as a reduced level of risk for organisations.

The evolving threat landscape continues to expand, with developments such as hybrid warfare and the increasing integration of AI systems contributing to a broader potential attack surface globally. Cybersecurity approaches need to continue adapting to these developments, rather than adjusting focus based solely on short-term fluctuations in attack volume.

  • There was an 8% month-on-month decrease in global ransomware attacks.
  • The Industrials sector remained the most targeted, accounting for 31% of total attacks.
  • The Qilin threat group was responsible for 15% of all attacks.
  • North America accounted for 52% of attacks, followed by 21% in Europe.

AI-driven systems are increasingly embedded across industries and are used to support routine processes and automation. However, vulnerabilities have been identified in low-code and no-code frameworks, creating potential security risks. These issues can expose sensitive data and increase exposure to attack methods such as remote code execution and command injection.

Late February saw increased tensions involving the United States, Israel, and Iran, reflecting the growing role of cyber activity within modern geopolitical conflict. Israel’s established cyber capabilities, along with its history of cyber operations, contribute to heightened risk considerations for organisations operating in the region.

This period included cyber activity such as DDoS attacks, website defacements, and reported breaches, alongside AI-driven misinformation activity. While these events were high in volume, they were generally not assessed as causing significant operational disruption.

Despite the overall reduction in attack numbers, threat actors continue to evolve techniques. February saw the emergence of a new ransomware variant, Reynolds, featuring a Bring Your-Own-Vulnerable-Driver (BYOVD) capability. Although still in early development, its delivery method highlights ongoing attempts to bypass defensive controls and improve attack efficiency.

The wider geopolitical environment continues to reflect interconnected risks and uncertainty, reinforcing the importance of maintaining resilient cybersecurity strategies capable of adapting to emerging threats.

Sophos' latest report highlights the escalating identity security challenges, with high breach rates and costly recoveries.
AHEAD expands its European presence through an acquisition, a senior appointment, and new facilities to support its international operations.
SonicWall has introduced the NSv XS, a subscription-based virtual firewall designed for small and distributed environments, offering enhanced...

State of the channel 2026: navigating the AI era

Posted 1 week ago by Sophie Milburn
The latest GTIA report reveals AI's dominant role in the future of IT service provision across the UK and Ireland.
Climb Channel Solutions UK introduces a model emphasising personal connections to improve MSP growth, aiming to challenge platform-centric IT...
Hammer Distribution has formed a new strategic partnership with Stormshield. Under this agreement, Hammer will serve as a key distributor for...

Syspro launches marketplace

Posted 2 weeks ago by Phil Alsop
New Marketplace gives customers access to trusted partner solutions that integrate with the Syspro platform.

Syncro and Guardz partner

Posted 2 weeks ago by Phil Alsop
Guardz cybersecurity now available to MSPs through the Syncro Marketplace, with unified purchase, provisioning, and billing.