Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ransomware Groups May Shift Back to Encryption Strategies

Ransomware Groups May Shift Back to Encryption Strategies

Posted on February 9, 2026 By CWS

Ransomware groups are reconsidering their strategies as data theft proves less effective in extorting victims. According to a recent report by Coveware, cybercriminals may increasingly turn back to data encryption to reclaim leverage in their attacks.

Shift from Data Theft to Encryption

Initially, prominent groups like Cl0p found success with data-exfiltration-focused attacks, targeting enterprises without encrypting their data. This method, which involved exploiting vulnerabilities in popular enterprise solutions such as MOVEit and Oracle E-Business Suite, initially yielded significant ransom payouts.

However, the success rate has diminished over time. Coveware highlights that less than 2.5% of those affected by the MOVEit breach opted to pay, compared to higher payment rates in earlier campaigns like the Accellion hack, where over 25% of victims paid. This decline is attributed to increased enterprise awareness regarding the limited benefits of paying ransoms.

Financial Results and Changing Tactics

The diminishing returns from data theft have led groups like Shiny Hunters to adopt similar tactics, albeit with disappointing financial outcomes. In high-profile cases involving companies like Snowflake and Salesforce, ransom payments were scarce.

Coveware anticipates a return to data encryption as a more effective method for extorting victims, given its historical success in driving ransom payments. Encryption disrupts business operations more significantly, providing cybercriminals with greater leverage.

Trends in Ransom Payments

Despite a low willingness to pay ransoms, the average payment amount surged to approximately $600,000 in the fourth quarter of last year, reflecting isolated incidents where businesses prioritized decryption to restore operations swiftly.

These high-value incidents, however, do not indicate a widespread increase in payment willingness. Instead, they underscore the challenges small and mid-sized businesses face, as evident by the median payment amount of $325,000.

Ransom payments accounted for around 20% of incidents in late 2025, driven by the impact of specific attacks rather than a broad resurgence in payment trends.

Resilience and Future Outlook

Organizations are demonstrating increased resilience against encryption-based ransomware attacks, often restoring operations without succumbing to ransom demands. Nevertheless, ransomware activity remains robust, with groups like Akira leading the charge with 14% of observed attacks in the last quarter.

Coveware’s report notes that sectors such as professional services, healthcare, and technology are frequently targeted. Each avoided ransom payment undermines the cyber extortion ecosystem, emphasizing the importance of improved prevention and strategic response in eroding attacker economics.

As ransomware groups adapt to these challenges, the cybersecurity landscape is poised for continued evolution, with organizations urged to bolster their defenses against both encryption and data theft threats.

Security Week News Tags:Cl0p, Coveware, cyber extortion, Cybersecurity, data exfiltration, data theft, Encryption, MOVEit, ransom payments, Ransomware

Post navigation

Previous Post: AI Skill Exploits and Record DDoS Attack Highlight Cyber Vulnerabilities
Next Post: Hackers Utilize DKIM Replay to Exploit Trusted Invoices

Related Posts

Chrome 147 Fixes 60 Security Flaws, Two Critical Chrome 147 Fixes 60 Security Flaws, Two Critical Security Week News
White House Proposes 7 Million CISA Budget Cut White House Proposes $707 Million CISA Budget Cut Security Week News
Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks Security Week News
Developer Who Hacked Former Employer’s Systems Sentenced to Prison Developer Who Hacked Former Employer’s Systems Sentenced to Prison Security Week News
Law Enforcement Shuts Down 53 DDoS Domains Globally Law Enforcement Shuts Down 53 DDoS Domains Globally Security Week News
Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark