Skip to main content
Mallory

Ransomware Activity and Related Threat Intelligence Updates

ransomware-group-operationhealthcare-sector-threatcybercrime-service-ecosysteminitial-access-methodcredential-access-method
Updated April 14, 2026 at 02:01 AM3 sources
Share:
Ransomware Activity and Related Threat Intelligence Updates

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Reporting highlighted elevated ransomware activity and evolving access-broker ecosystems. BlackFog’s February ransomware roundup counted 82 publicly disclosed ransomware incidents across 20 countries, with the U.S. most affected (51 incidents) and healthcare the most targeted sector (31%). The report attributed publicly claimed attacks to 24 ransomware groups, led by Shiny Hunters (8) and Qilin (6), while noting 41% of incidents were not yet attributed; it also cited individual victim disclosures/claims involving Nova Biomedical (PII exposure affecting 10,764 people), Hosokawa Micron (files accessed; Everest claimed ~30GB theft), and Iron Mountain (Everest claim of 1.4TB theft, while Iron Mountain stated access was limited to a single marketing folder via a compromised credential).

Separately, Huntress described how investigation of a “routine” RDP brute-force success led to discovery of credential-hunting behavior and geo-distributed infrastructure consistent with a ransomware-as-a-service ecosystem and associated initial access activity, illustrating how exposed remote access can connect to broader ransomware operations. Arctic Wolf warned of heightened cyber risk following the February 2026 U.S./Israel-Iran escalation (Operation Epic Fury), advising increased vigilance—especially for sectors historically targeted by Iranian-linked actors (e.g., energy, defense, transportation, healthcare, government)—and anticipating potential wiper activity, DDoS, targeted intrusions, supply-chain risk, and possible collaboration with ransomware-affiliate activity amid geopolitical retaliation dynamics.

Timeline

  1. Apr 12, 2026

    AhnLab publishes March 2026 ransomware trends report

    AhnLab’s ASEC released a March 2026 ransomware report describing continued attacks across critical sectors including manufacturing, healthcare, and finance, with activity from groups such as Qilin, The Gentlemen, and INC Ransom. The report also said ransomware operators increasingly combined encryption with exposure and blackmail via dedicated leak sites and warned that post-December 2025 victim statistics use a changed aggregation methodology.

  2. Mar 4, 2026

    Huntress maps infrastructure tied to ransomware-access operations

    Using pivots from the brute-force source IP, TLS certificate analysis, and related domains such as specialsseason[.]com and 1vpns[.]com, Huntress identified a wider geo-distributed infrastructure network. Third-party references linked one observed IP to Hive ransomware and BlackSuite, leading Huntress to assess the activity as connected to a ransomware-as-a-service ecosystem and/or initial access broker operations.

  3. Mar 4, 2026

    Victim network isolated after malicious enumeration is confirmed

    After confirming post-compromise malicious activity, Huntress contained the incident by isolating the affected environment across the network. The response stopped the intrusion before the investigation expanded to the attacker’s broader infrastructure.

  4. Mar 4, 2026

    Huntress investigates brute-force compromise of exposed RDP server

    Huntress Tactical Response Team responded to what appeared to be routine brute-force activity against an internet-exposed RDP server and confirmed a successful compromise of a single account. The intruder then performed domain enumeration and manually searched for password-related files using Notepad rather than relying mainly on common credential-dumping techniques.

  5. Feb 28, 2026

    Victim organizations dispute some February extortion claims

    BlackFog reported several disputed cases in February 2026 where threat actors claimed large-scale exfiltration but victims said impact was limited or that they found no evidence of compromise. Examples cited included Iron Mountain, HP/Poly, Epworth HealthCare, Atlas Air, and Safran Group.

  6. Feb 28, 2026

    February attacks cause broad data theft and operational disruption

    BlackFog highlighted that February ransomware incidents affected sectors including healthcare, education, transportation, finance, hospitality, government, and critical infrastructure. Reported impacts included theft of personally identifiable information, protected health information, financial records, and operational disruption at organizations such as BridgePay, Conpet, Sapienza University of Rome, and the University of Mississippi Medical Center.

  7. Feb 28, 2026

    BlackFog identifies leading ransomware groups active in February

    BlackFog said 24 ransomware groups were linked to publicly claimed attacks during February 2026, led by ShinyHunters with eight incidents and Qilin with six. It also noted that 41% of attacks remained unattributed.

  8. Feb 28, 2026

    February 2026 records 82 publicly disclosed ransomware incidents

    BlackFog reported that February 2026 saw 82 publicly disclosed ransomware and cyber extortion incidents across 20 countries. Healthcare was the most targeted sector, and the United States accounted for 51 of the reported incidents.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Malware

Organizations

Sources

April 12, 2026 at 03:00 PM
March 4, 2026 at 10:23 AM

Related Stories

Ransomware Activity Updates: January 2026 Trends, Milkyway Variant, and Lakelands Public Health Incident

Ransomware Activity Updates: January 2026 Trends, Milkyway Variant, and Lakelands Public Health Incident

Ransomware reporting in early February highlighted both broad **January 2026** activity and specific new developments. BlackFog tracked **91 publicly disclosed ransomware attacks** to open 2026, with **healthcare** the most targeted sector (27 incidents) and nearly **half (49%)** of recorded attacks not publicly claimed by a known group; among claimed activity, **Qilin** led with eight incidents and the **U.S.** accounted for 58% of disclosed attacks. Separately, CYFIRMA reported identifying a ransomware strain dubbed **Milkyway**, which encrypts files and appends the `.milkyway` extension, presents a full-screen ransom message, and uses typical extortion pressure (including threats to leak stolen data), with recovery generally dependent on offline/secure backups absent cryptographic flaws. A healthcare-specific incident in Ontario was also disclosed: **Lakelands Public Health** reported a cybersecurity intrusion discovered **Jan 29** and reported **Feb 3**, which disrupted internal systems and some public services during containment while stating infectious disease and clinical appointment systems were not impacted. The **Lynx** ransomware group publicly claimed responsibility by listing the organization on a leak site and implying data theft; Lakelands Public Health engaged a specialized cybersecurity firm and worked with law enforcement and forensics to validate the claim and determine scope. UpGuard characterized Lynx as a **RaaS** operation and an alleged successor to the **INC** ransomware group, consistent with double-extortion tactics (encryption plus threatened data exposure).

1 months ago
Ransomware and Cyber-Extortion Trends: Shift to Data Theft and Evolving RaaS Ecosystem

Ransomware and Cyber-Extortion Trends: Shift to Data Theft and Evolving RaaS Ecosystem

Cyber insurance and threat reporting indicate **ransomware operators are increasingly leaning on data theft and extortion** as organizations improve backup and recovery. Coalition’s 2025 claims data (across 100,000+ policyholders) shows **business email compromise (BEC)** and **funds transfer fraud (FTF)** dominated claims volume, while **ransomware** represented a smaller share but featured **sharply higher initial demands** (average just over **$1.0M**, with some as high as **$16M**) even as average loss severity declined—consistent with improved restoration and response reducing the leverage of pure encryption-only attacks. In parallel, the broader ransomware ecosystem continues to **reorganize rather than shrink** despite sustained law-enforcement disruption of major RaaS brands (e.g., LockBit/Hive/ALPHV), with reporting citing high victim-post volumes across dozens of active operations. Halcyon reported a **tactical shift among pro-Iranian/pro-Palestinian-aligned operators** away from *Sicarii* toward **BQTLock (Baqiyat 313 Locker)**, including promotion of “free” RaaS access via Telegram and targeting focused on the UAE, US, and Israel. Separately, **ShinyHunters** claimed a major theft from AI merchant-data platform *Woflow* (alleging internal data, PII, and transaction/order details) but provided no sample for verification at the time of reporting, while a separate SC Media piece used the **SoundCloud** incident (reported exposure of data tied to ~**29.8M** accounts) to highlight incident-response and crisis-management considerations rather than new technical findings.

1 months ago
Ransomware and data-extortion incidents drive new breach disclosures across healthcare, aviation, and hospitality

Ransomware and data-extortion incidents drive new breach disclosures across healthcare, aviation, and hospitality

Multiple organizations disclosed or were linked to **ransomware/data-extortion** activity with material operational or privacy impact. **Air Côte d’Ivoire** confirmed a cyberattack affecting parts of its information systems after **INC ransomware** claimed theft of **208 GB** and threatened to leak data, while the airline said it engaged the national CERT and external experts to contain impact and maintain flight operations. In the US healthcare sector, **University of Mississippi Medical Center (UMMC)** reported a ransomware incident that forced statewide clinic closures and disrupted access to **Epic** electronic medical records, prompting engagement with the **FBI** and **CISA** and use of downtime procedures to sustain patient care. Separately, **Conduent**’s earlier ransomware-linked breach continued to expand in scope, with breach notifications indicating at least **~25 million** people affected across multiple states and exposure of sensitive PII (including **SSNs** and health/insurance data). **Wynn Resorts** also confirmed an unauthorized party accessed and stole employee data after being listed by the **ShinyHunters** extortion group, with the company stating the actor claimed the data was deleted and that guest operations were not impacted. Other items in the set describe distinct, unrelated security events and broader threat research rather than the same incident: alleged data leaks involving **Burger King France** and **Wendy’s UK**; **Qilin** ransomware claims against a New York City transit union; Russian cyber operations against Ukraine’s power grid focused on intelligence collection; and a New Zealand healthcare application (**MediMap**) taken offline after apparent unauthorized access and **patient record tampering** (e.g., records marked deceased). Additional references cover threat research and trends (airline brand impersonation domains, edge-device exploitation telemetry, MuddyWater’s *Operation Olalampo*, Google Ads cloaking via **1Campaign**, freight/logistics phishing by “Diesel Vortex,” and various governance/AI/5G/quantum commentary), which provide context on the threat environment but do not substantively report on the same specific breach event.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Ransomware Activity and Related Threat Intelligence Updates | Mallory