Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ransomware Groups May Shift Back to Encryption Strategies

Ransomware Groups May Shift Back to Encryption Strategies

Posted on February 9, 2026 By CWS

Ransomware groups are reconsidering their strategies as data theft proves less effective in extorting victims. According to a recent report by Coveware, cybercriminals may increasingly turn back to data encryption to reclaim leverage in their attacks.

Shift from Data Theft to Encryption

Initially, prominent groups like Cl0p found success with data-exfiltration-focused attacks, targeting enterprises without encrypting their data. This method, which involved exploiting vulnerabilities in popular enterprise solutions such as MOVEit and Oracle E-Business Suite, initially yielded significant ransom payouts.

However, the success rate has diminished over time. Coveware highlights that less than 2.5% of those affected by the MOVEit breach opted to pay, compared to higher payment rates in earlier campaigns like the Accellion hack, where over 25% of victims paid. This decline is attributed to increased enterprise awareness regarding the limited benefits of paying ransoms.

Financial Results and Changing Tactics

The diminishing returns from data theft have led groups like Shiny Hunters to adopt similar tactics, albeit with disappointing financial outcomes. In high-profile cases involving companies like Snowflake and Salesforce, ransom payments were scarce.

Coveware anticipates a return to data encryption as a more effective method for extorting victims, given its historical success in driving ransom payments. Encryption disrupts business operations more significantly, providing cybercriminals with greater leverage.

Trends in Ransom Payments

Despite a low willingness to pay ransoms, the average payment amount surged to approximately $600,000 in the fourth quarter of last year, reflecting isolated incidents where businesses prioritized decryption to restore operations swiftly.

These high-value incidents, however, do not indicate a widespread increase in payment willingness. Instead, they underscore the challenges small and mid-sized businesses face, as evident by the median payment amount of $325,000.

Ransom payments accounted for around 20% of incidents in late 2025, driven by the impact of specific attacks rather than a broad resurgence in payment trends.

Resilience and Future Outlook

Organizations are demonstrating increased resilience against encryption-based ransomware attacks, often restoring operations without succumbing to ransom demands. Nevertheless, ransomware activity remains robust, with groups like Akira leading the charge with 14% of observed attacks in the last quarter.

Coveware’s report notes that sectors such as professional services, healthcare, and technology are frequently targeted. Each avoided ransom payment undermines the cyber extortion ecosystem, emphasizing the importance of improved prevention and strategic response in eroding attacker economics.

As ransomware groups adapt to these challenges, the cybersecurity landscape is poised for continued evolution, with organizations urged to bolster their defenses against both encryption and data theft threats.

Security Week News Tags:Cl0p, Coveware, cyber extortion, Cybersecurity, data exfiltration, data theft, Encryption, MOVEit, ransom payments, Ransomware

Post navigation

Previous Post: AI Skill Exploits and Record DDoS Attack Highlight Cyber Vulnerabilities
Next Post: Hackers Utilize DKIM Replay to Exploit Trusted Invoices

Related Posts

NHS Investigating Oracle EBS Hack Claims as Hackers Name Over 40 Alleged Victims NHS Investigating Oracle EBS Hack Claims as Hackers Name Over 40 Alleged Victims Security Week News
3 Million Stolen in Cetus Protocol Hack $223 Million Stolen in Cetus Protocol Hack Security Week News
Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough Security Week News
Web Hosting Firms in Taiwan Attacked by Chinese APT for Access to High-Value Targets Web Hosting Firms in Taiwan Attacked by Chinese APT for Access to High-Value Targets Security Week News
Counter Antivirus Service AVCheck Shut Down by Law Enforcement Counter Antivirus Service AVCheck Shut Down by Law Enforcement Security Week News
Aikido Security Raises  Million at  Billion Valuation Aikido Security Raises $60 Million at $1 Billion Valuation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Target Ivanti EPMM Devices with Hidden Backdoors
  • China-Linked Group Targets Singapore Telecom in Cyber Attack
  • Critical Roundcube Flaw Allows Email Tracking
  • Lema AI Secures $24M to Revolutionize Third-Party Risk
  • Criminal IP Boosts IBM QRadar with Real-Time Threat Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Target Ivanti EPMM Devices with Hidden Backdoors
  • China-Linked Group Targets Singapore Telecom in Cyber Attack
  • Critical Roundcube Flaw Allows Email Tracking
  • Lema AI Secures $24M to Revolutionize Third-Party Risk
  • Criminal IP Boosts IBM QRadar with Real-Time Threat Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark