Daily Ransomware Report - 03/18/2026


Statistical Overview

Victim Totals

  • This month: 532
  • This quarter: 2261
  • Year to date: 2261
  • Last 24h: 35

Quarterly Breakdown

Q1: 2261Q2: 0Q3: 0Q4: 0

Q1 shows high activity with 2261 victims, which is the entire year-to-date total. The daily count of 35 new victims adds to this initial quarter's large volume.


Introduction

The past 24 hours recorded 35 new ransomware victims. LockBit, SafePay, Sinobi, APT73, and Medusa were the most active groups. The United States remains the main target country, with nearly half of today's observed attacks. Key affected sectors include professional services, government, manufacturing, and healthcare. This indicates threat actors use a broad, opportunistic approach.


Ransomware Summary Table

#GroupVictims (24h)Sample VictimsGeosSectors
1LockBit6fiepe.org.br, jean.com.tw, luetz-binder.de (+3)Taiwan, ItalyProfessional Services, Real Estate
2SafePay5Briwaycarriers.com, Brookercg.com, Mattandsteve.com (+2)Canada, GermanyAgriculture & Food, Pharmaceuticals & Biotech
3Sinobi5Eco Sound Builders, Interpack Northwest, McAfee Tool & Die (+2)United StatesEnergy & Utilities, Professional Services
4APT734Doghairinc.com, Dpwh.gov.ph, Isosl.be (+1)Canada, BelgiumGovernment / Public Sector, Manufacturing
5Medusa4Bonanza casino, Cape may county, Lehigh carbon community college (+1)United StatesGovernment / Public Sector, Hospitality & Travel
6Handala3Martyr ali larijani, Vahid offline members, Who is vahidonline?Iran, United StatesTechnology / Software, Nonprofit
7Kill Security2Hospitalvetdiadema24h.com.br, Palram.comIsrael, BrazilManufacturing, Healthcare
8Play News2Gsolutionz, Knight's site servicesUnited StatesProfessional Services, Telecommunications
9AiLock1Solutions extreme technologyEgyptTechnology / Software
10DragonForce1Bestgraphics.netUnited StatesManufacturing
11LeakedData1Wood smith henning & berman llpUnited StatesLegal
12Qilin1ShwapnoBangladeshRetail & Ecommerce

LockBit, SafePay, Sinobi, APT73, and Medusa were the most active groups in the last 24 hours, collectively accounting for over half of all new victims. The United States continues as the main target country, with a variety of sectors impacted, including professional services, government, manufacturing, and healthcare. Today's targets include Dpwh.gov.ph (Government / Public Sector) by APT73, which shows continued focus on public-sector entities, and Bonanza casino and Lehigh carbon community college by Medusa, showing persistent threats to hospitality and education sectors.


Victim Distribution

By Country

  • United States: 16
  • Brazil: 3
  • Canada: 3
  • Belgium: 2
  • Germany: 2
  • Taiwan: 1
  • Portugal: 1
  • Egypt: 1
  • Bangladesh: 1
  • Iran: 1

By Industry

  • Construction: 2
  • Manufacturing: 2
  • HVAC and Plumbing Services: 1
  • Real Estate Development: 1
  • Food Brokerage: 1
  • Fuel Distribution: 1
  • Gaming and Hospitality: 1
  • Government: 1
  • Government Administration: 1
  • Higher Education: 1

The concentration of attacks on the United States, which was nearly half of today's observed victims, shows a sustained focus on North American targets. The variety of targeted industries, from construction and manufacturing to government and higher education, suggests ransomware operators use a broad, opportunistic approach rather than a narrow sectoral focus.

Attack Methodology Analysis

According to recent threat intelligence research, ransomware groups are increasingly diversifying their attack vectors. The key trend observed is the shift toward exploiting unpatched vulnerabilities in widely-used enterprise software, particularly VPN appliances and firewall systems which now account for approximately one-third of initial access attempts.

Primary Attack Vectors Include:

  • Exploitation of unpatched SharePoint vulnerabilities (CVE-2025-49706, CVE-2025-49704)
  • VPN and firewall compromise for lateral movement
  • Social engineering through ClickFix lures
  • Supply chain compromises targeting managed service providers

Emerging Threat Actor Capabilities

Research shows that modern ransomware operations have evolved beyond simple encryption attacks. The key development is the adoption of "living off the land" techniques, where attackers leverage legitimate system tools to avoid detection:

Advanced Techniques Observed:

  1. BYOVD (Bring Your Own Vulnerable Driver) - Groups like Warlock deploy NSecKrnl.sys to gain kernel-level access
  2. Cloud Storage Exploitation - LeakNet utilizes Amazon S3 for data exfiltration
  3. In-Memory Execution - Deno-based loaders prevent disk-based detection
  4. Legitimate Tool Abuse - TightVNC, PsExec, and PowerShell for persistence

Ransomware News

Today's intelligence shows changes in the ransomware threat environment, with advanced post-exploitation tactics, attackers changing methods, and ongoing state-linked cyber operations.

The Medusa ransomware group claimed attacks on the University of Mississippi Medical Center and Passaic County, New Jersey, demanding $800,000 for the hospital breach. The EU Council sanctioned China's Integrity Technology Group and Iran's Emennet Pasargad, citing involvement in large-scale cyber operations, including ransomware and data theft campaigns. The Fairfield City Council secured an injunction against a threat actor to prevent data dissemination following an October 2025 ransomware incident. Handala was linked to cyber intrusions as part of a broader multi-domain conflict.

Warlock ransomware added to its post-exploitation toolkit, incorporating BYOVD (NSecKrnl.sys), TightVNC via PsExec, and the Yuze reverse proxy. It also exploits unpatched Microsoft SharePoint vulnerabilities, specifically CVE-2025-49706, CVE-2025-49704, CVE-2025-53770, and CVE-2025-53771. Separately, LeakNet ransomware uses ClickFix as an initial access vector and deploys a Deno-based loader for in-memory execution and Amazon S3 for exfiltration. Google's GTIG analysis indicates a broader trend of attackers shifting to native Windows tooling and increasing data theft (77% of attacks) as ransomware payments decline. VPN/firewall vulnerabilities serve as initial access in one-third of incidents.

These developments show threat actors are adapting, driven by declining profitability, towards more stealthy "live off the land" tactics. Nation-state entities continue to use cyber capabilities, including ransomware, for strategic goals.

Critical Defense Strategies

According to cybersecurity experts, organizations must implement multi-layered defense strategies to combat evolving ransomware threats. The key recommendations include:

Immediate Actions Required:

  • Patch SharePoint systems against CVEs identified in Warlock campaigns
  • Implement network segmentation to limit lateral movement
  • Deploy endpoint detection and response (EDR) solutions
  • Establish offline backup systems with regular restoration testing
  • Conduct regular security awareness training focusing on social engineering

For comprehensive protection strategies, organizations should consider implementing advanced threat detection and strengthening incident response capabilities.


Technical Takeaways

  • Continued targeting of government and education sectors: Medusa's attacks on Passaic County and Lehigh Carbon Community College confirm pressure on public entities.
  • Post-exploitation tactics are evolving: Warlock ransomware deploys BYOVD techniques and uses legitimate tools like TightVNC and Yuze for persistence and remote access.
  • Ransomware operators are shifting to "living off the land" tactics: Operators increasingly use built-in Windows tooling (e.g., PowerShell, WMI) and rely less on traditional tools like Cobalt Strike Beacon as payments decline.
  • New initial access vectors: LeakNet uses ClickFix lures and Deno runtime for stealthy in-memory payload execution. Warlock continues to exploit unpatched SharePoint CVEs for initial access.
  • Data exfiltration remains a primary tactic: Data theft is present in approximately 77% of ransomware attacks. Groups like LeakNet use Amazon S3 for exfiltration, showing the continued double extortion trend.

Industry Impact Assessment

The current ransomware landscape demonstrates a concerning trend toward targeting critical infrastructure and essential services. According to threat intelligence analysts, the healthcare sector faces particular risk due to the urgency of restoring systems and the sensitive nature of patient data.

Sector-Specific Risks:

  • Healthcare: Extended system downtime threatens patient safety
  • Government: Disruption of public services and citizen data exposure
  • Education: Academic operations disruption and student record theft
  • Manufacturing: Supply chain interruptions and intellectual property theft

Organizations in these high-risk sectors should prioritize ransomware-specific security measures and consider engaging with specialized cybersecurity services.


FAQ

What are the most active ransomware groups currently?

LockBit remains the most prolific group with 6 victims in the past 24 hours, followed by SafePay, Sinobi, APT73, and Medusa with 4-5 victims each. These five groups account for over 70% of recent ransomware activity and demonstrate sophisticated post-exploitation capabilities.

Which industries should be most concerned about ransomware attacks?

Government and public sector organizations face the highest risk, representing a significant portion of recent attacks. Healthcare, education, and professional services are also prime targets due to their critical data and operational urgency. Manufacturing companies are increasingly targeted for intellectual property theft.

What are the latest ransomware attack techniques organizations should know about?

Modern ransomware groups employ "living off the land" techniques using legitimate Windows tools like PowerShell and WMI. They exploit unpatched SharePoint vulnerabilities (CVE-2025-49706, CVE-2025-49704) and use BYOVD attacks with vulnerable drivers like NSecKrnl.sys for kernel access.

How can organizations protect against current ransomware threats?

Immediate protection requires patching SharePoint systems, implementing network segmentation, and deploying EDR solutions. Organizations should establish offline backups, conduct regular restoration testing, and provide security awareness training focused on social engineering tactics like ClickFix lures.

What geographic regions are most targeted by ransomware groups?

The United States accounts for nearly 50% of recent ransomware victims, with 16 organizations affected in the past 24 hours. Brazil, Canada, Belgium, and Germany also show significant activity, indicating a global threat landscape with particular focus on North American and European targets.

How has the ransomware threat landscape evolved recently?

Research indicates a shift toward data theft as the primary extortion method, present in 77% of attacks, as traditional encryption-based payments decline. Attackers increasingly use cloud storage services like Amazon S3 for exfiltration and deploy in-memory execution techniques to evade detection.


About PurpleOps

PurpleOps focuses on cyber threat intelligence, ransomware tracking, and dark web research. Our platform provides real-time information into ransomware operations, emerging CVEs, and underground economy activity.

Learn how we help organizations detect, prevent, and respond to ransomware threats: