Ransomware payments in 2025: fewer victims paying, but higher ransoms

Figures published at the end of February 2026 by Chainalysis paint a paradoxical picture of the ransomware economy in 2025: global payments have fallen, the rate of victims giving in to attackers’ demands has reached an all-time low, and yet ransomware has never struck so hard or so often. This paradox is worth examining.

Payment rates plummet while attacks explode

In 2025, on-chain payments (i.e. recorded directly on the blockchain, and therefore traceable by transaction analysis) linked to ransomware stood at around $820 million, down 8% on the $892 million estimated for 2024. Chainalysis points out, however, that this figure is set to approach 900 million as new payments are awarded, as was the case for 2024, whose initial estimate was 813 million.

Even more striking is the trend in payment rates: in 2025, only 28% of identified victims paid a ransom, compared with 62.8% in 2024 and 78.9% in 2022. This decline has been part of a continuous trend for four consecutive years, and has even accelerated with each passing quarter. Coveware’s data, drawn from its own intervention files, confirms and amplifies this observation: the payment rate fell to 23% in the third quarter of 2025, then to around 20% in the fourth quarter, levels never seen before.

Ransomware data leaks VS payment rates
Data leakage (blue bars) VS payment rate (orange lines) – Source: Chainalysis

This contraction in payments comes against a backdrop of amassive increase in attacks, which have never been so numerous. The number of victims claimed on leak sites rose by 50% year-on-year in 2025. As Corsin Camichel, founder of eCrime .ch, sums up: ” Were seeing a structural shift in targeting, with fewer headline-grabbing major intrusions and more volume focused on small and medium-sized businesses. The assumption is simple: smaller victims pay faster. However, Chainalysis data shows a downward trend in payments despite a record number of public complaints. ” The logical consequence of this discrepancy between the volume of attacks and the volume of payments is that cyber attackers are seeing their returns melt away, even as they redouble their efforts.

Several factors combine to explain this trend:

  • improved incident response capabilities and growing regulatory pressure ;
  • coordinated law enforcement action against operators and their infrastructure;
  • the fragmentation of the RaaS market into a multitude of smaller, more independent groups;
  • in some cases, ransomware – as was the case with VolkLocker – features design flaws that enable decryption by experts specialized in recovering ransomware-encrypted data.

Ransomware rises despite falling payments

The overall drop in revenue masks a more nuanced reality: the median ransom rose by 368% between 2024 and 2025, from $12,738 to $59,556. This leap reflects a concentration of efforts on higher-potential victims, capable of paying more.

Ransomware payment amounts by year
Graph of payment amounts per year – Source: Chainalysis

Coveware’s data for Q4 2025 points in the same direction, although it measures a different perimeter (cases handled directly by the company, which include larger organizations): the average payment reached $591,988 (+57% on Q3) and the median $325,000 (+132%). The marked divergence between average and median reflects a reality well known to experts: a few large-scale settlements, linked to incidents where business stoppages could not otherwise be resolved, pull the average upwards without reflecting the general case.

Amounts of ransoms paid
Average and median ransom amounts paid: Source Coveware

This shift towards medium-sized and larger targets is also well documented: the Akira and Qilin groups, which between them accounted for 44% of all attacks recorded in the third quarter of 2025, have clearly repositioned their activity towards SMEs deemed more likely to pay. The median size of victim companies in the fourth quarter of 2025 was 200 employees, marking a clear decline on the previous quarter, with a high concentration of attacks in structures with 11 to 100 employees.

The most significant cyberattacks of 2025: an alarming balance sheet

The magnitude of these statistics is illustrated by the major cyber incidents of 2025. The attack on Jaguar Land Rover brought international production lines to a halt, generating losses estimated at almost £2 billion, a record in the UK’s economic history. For its part, Marks & Spencer, a target of the Scattered Spider group, suffered prolonged disruption and a significant depreciation in its stock market value. Interlock ‘s offensive against DaVita, the American dialysis specialist, exposed the sensitive data of 2.7 million patients. At the same time, CL0P exploited a zero-day vulnerability in Oracle E-Business Suite to compromise a hundred companies in just a few weeks.

Beyond the ransom, the real consequences of these attacks – business interruption, financial losses, damage to reputation – often far exceed the amount demanded by cybercriminals. The ransomware actors are relentless in their reactivity. Rather than targeting a particular sector, they systematically take advantage of security flaws, faulty configurations or recently revealed vulnerabilities to orchestrate their attacks.

Unencrypted exfiltration literally no longer pays

For years, double extortion – combining data encryption with the threat of publication of stolen information – has redefined the landscape of ransomware cyberattacks. Today, this model remains the most formidable. But a fundamental trend is running through it: one of its pillars is crumbling. Campaigns based solely on data exfiltration, without encryption, are rapidly losing their ability to monetize the threat.

Organizations have now understood the real cost-benefit ratio of paying to “delete” stolen data. Paying does not remove legal notification obligations, does not significantly reduce the risk of litigation, and does not prevent attackers from retaining, selectively disclosing or reusing data. Coveware goes further, pointing out that even engaging in dialogue with cybercriminals represents a growing risk in itself, with malicious actors no longer hesitating to resort to SWATting: sending armed intervention units to executives’ homes to force them to pay.

The result? In Q3 2025, Coveware measured that the payment rate in cases ofexfiltration alone (without encryption) had fallen to 19%, an all-time low for this sub-category. In Q4, this rate rose slightly to ~25%, but remains structurally low, well below historical norms. The signal is clear: threatening to publish data without having encrypted it is no longer convincing.

Percentage ransom payments by quarter
Percentage of ransom payments per quarter – Source Coweware

It’s no coincidence that Akira (14% of attacks) and Qilin (13%) dominate the ranking of the most active groups in Q4 2025: both base their model on encryption as their main lever. Coveware even anticipates a strong comeback for pure encryption – groups that had relied on exfiltration alone may well revert to what has always worked.

Digital identity, the first vector of intrusion

Payment statistics tell only part of the story. To understand why attacks are exploding despite falling revenues, we need to look at the gateway, and that gateway is very often identity.

In the third quarter of 2025, compromised remote access accounted for more than half of all incidents observed by Coveware: insecure VPNs, exposed cloud gateways, SaaS integrations, non-renewed OAuth tokens. This quarter also highlighted a worrying convergence: social engineering has merged with remote access compromise. Attackers are no longer trying to break into systems, they’re convincing humans to open the door for them, by impersonating IT support, manipulating a real-time authentication session, or bypassing an otherwise robust MFA.

Initial access vectors per quarter
Initial access vectors – Source: Coveware

It is precisely this mechanism – compromising identity rather than infrastructure which is at the heart of the campaign by the Scattered LAPSUS$ Hunters alliance, including the ShinyHunters group, led a large-scale vishing offensive against the SSO accounts of over 100 global enterprises in 2025, managing to bypass even the most robust multi-factor authentication systems.

Initial Access Brokers (IABs), the discreet cogs in an industrialized ecosystem

Ransomware relies on an ecosystem of specialized criminal services, of which Initial Access Brokers (IABs ) are a key link. These players specialize in compromising systems and reselling access to ransomware operators, a model found at the heart of the Scattered LAPSUS$ Hunters coalition, some of whose members act precisely as large-scale initial access providers before moving on to extortion.

In 2025, IABs received at least $14 million in on-chain payments, a stable amount compared to 2024, representing just 1.7% of total ransomware payments. The return on investment for buyers is therefore massive. Chainalysis also points out that peaks in IAB activity are a leading indicator: significant increases in IAB transactions precede peaks in ransom payments and new victim publications by around 30 days.

initial access brokers inflows per year
Cost of Initial Access Brokers per year – Source: Chainalysis

The access market is also in the process of industrialization. According to Darkweb IQ, the average price of a network access dropped from $1,427 in Q1 2023 to $439 in Q1 2026. This deflation is explained by automation, the use of AI-assisted tools and the oversupply generated by infostealer logs (databases of credentials stolen by malware specialized in the silent extraction of credentials, etc.) . A divide has opened up in this market: generic access is being sold off, while high-privilege access (domain control, administrator access) remains at premium prices.

targets cost per quarter
Offers VS average target cost per quarter – Source: Chainalysis via Darkweb IQ

Fragmentation of the RaaS market: more groups, fewer giants

The RaaS landscape has changed radically. Checkpoint counted 85 active extortion groups in the third quarter of 2025, an unprecedented figure against a backdrop of collapsing market concentration: the ten most active groups now accounted for just 56% of published victims, compared with 71% at the start of the year. The space once dominated by a few major platforms such as LockBit, dismantled during Operation Cronos in early 2024, has fragmented into a nebula of smaller, more independent and harder-to-trace players: 47 of these 85 groups claimed fewer than ten victims, a sign that affiliates are now operating solo, with no shared infrastructure or known brand.

Ransomware groups by claimed victims Q3 2025
Ransomware groups by claimed victims (3rd quarter 2025) – Source CheckPoint

This fragmentation has ambivalent effects. On the one hand, it contributes to the decline in overall revenues and complicates the rise of high-impact groups. On the other, it redistributes affiliates rather than eliminates them: the closure of RansomHub in April 2025 directly propelled Qilin, which doubled its rate to 75 victims per month in the third quarter, compared with 36 at the start of the year. As Corsin Camichel rightly puts it in the Chainalysis report: disrupting a group no longer guarantees ecosystem-wide impact, and the most effective pressure points are now upstream, on the side of IABs and tools shared between players.

Geographically, leak sites are still concentrated in developed economies: the United States remains by far the most frequent target, ahead of Canada, Germany and the United Kingdom. The sectors most affected are manufacturing, financial and professional services.

Dismantling infrastructure rather than individual groups

Faced with this fragmentation, the authorities have evolved their doctrine. In 2025, repressive actions increasingly targeted shared service providers, bulletproof hosts (hosting that deliberately tolerates criminal activity), residential proxy networks and loaders, which feed the entire ecosystem independently of the groups that exploit them. Operation Endgame, led by Europol and the FBI, was thus extended in May 2025 to neutralize several families of malware used as entry vectors in numerous ransomware campaigns, while OFAC sanctions have targeted hosts such as AEZA Group and Zservers, associated with LockBit.

What the figures mean in concrete terms

All this data points to several areas of attention for organizations:

  • improved backups and incident response are measurable: this is the primary reason why payment rates are falling;
  • paying ransomware to recover stolen data offers no real guarantee: data is frequently retained, resold or reused for later re-extortion;
  • SMEs are the main target: 69% of cases observed by Coveware in the fourth quarter of 2025 concerned organizations with fewer than 1,000 employees;
  • digital identity is now the primary intrusion vector: compromising remote access (VPN, RDP, OAuth tokens, SaaS access) is the dominant vector, often made possible by obsolete credentials or insufficient access hygiene.

As Chainalysis points out, the decline in apparent revenues does not mean that the threat has weakened: ransomware is adapting, diversifying its extortion levers and continuing to produce major operational and economic effects.

Are you a victim of ransomware? Contact our 24/7 assistance service. We provide an exclusive technical response to ransomware incidents, to help you recover your data and get back to business quickly.

Sources :

Chainalysis: Crypto Ransomware: 2026 Crypto Crime Report

BleepingComputer: Ransomware payment rate drops to record low as attacks surge

BleepingComputer: Ransomware profits drop as victims stop paying hackers

Coveware: Mass Data Exfiltration Campaigns Lose Their Edge in Q4 2025

Coveware: Insider Threats Loom while Ransom Payment Rates Plummet

The Record: Ransomware payments dropped in 2025 as attack numbers reached record levels

Check Point Research: The State of Ransomware in Q3 2025

The Hacker News: VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

Partager cet article