Ransomware groups - Sos Ransomware

In 2026, the ransomware landscape remains one of the most dynamic and destructive threat vectors in the cybersecurity world. As attacks increase in both frequency and sophistication, organizations must not only strengthen their defenses but also understand the tactics and motivations of the malicious groups behind these digital extortion operations. The number of active groups is now estimated to exceed 120 distinct actors (source: Europol, 2026)

Top 20 ransomware groups we encountered most frequently in 2025/2026

Qilin
Sinobi
Incransom
Safepay
TheGentlemen
Lockbit5
Dragonforce
MedusaLocker
Play
Devman
Coinbasecartel
Everest
Nova
Rhysida
Handala
Thegentlemen
Lynx
Nightspire
Ransomhouse
Blackshrantac
Anubis

General trends and differentiated behaviors

Encryption and technologies

Many modern groups use ransomware written in Rust or Go, enabling them to operate across multiple platforms and complex infrastructures.

Ransom demands

While some groups demand ransoms of several million dollars, others adjust their demands based on the size, sector, and criticality of the targeted data. ThreatDown by Malwarebytes Sophisticated operations such as those carried out by Qilin or Cl0p tend to target organizations with substantial budgets, justifying higher ransom demands.

Negotiation styles

Accelerated publication of stolen data has become a common tactic to increase pressure on victims. Some groups also facilitate negotiations through automated portals or via affiliates specialized in ransom negotiations.

Ransomware groups are cybercriminal organizations specialized in deploying malware that encrypts victims’ data, making this information inaccessible. Once the data has been encrypted, these groups typically demand a ransom, often paid in cryptocurrency, in exchange for the decryption key enabling victims to recover their data. These attacks can target individuals, businesses, government institutions or critical infrastructures, causing major disruption and considerable financial loss.

Over the years, several ransomware groups have emerged and gained notoriety for their large-scale attacks and exorbitant ransom demands. These groups use sophisticated techniques, exploit vulnerabilities and constantly adapt their methods to evade detection and maximize their profits. In addition to encrypting data, some also threaten to divulge sensitive information if they don’t receive payment, adding an extra dimension of blackmail to their operations.

The most active Ransomware groups in France in 2024

For security reasons, we voluntarily limit the disclosure of detailed information about our specific tools. Our cyber watch unit constantly monitors the activity of ransomware groups.

LockBIT 2.0 & 3.0

LockBit made its debut in 2019. It primarily targets large organizations and uses military-grade encryption technology to hold organizations' IT systems hostage.

BlackCat ransomware

The digital enemy to watch closely in 2023... BlackCat ransomware, also known as Alphv ransomware, is considered to be one of the most sophisticated types of malware.

PYSA ransomware

Pysa ransomware has emerged as a major threat in the cyberthreat landscape. It was first reported by the Federal Bureau of Investigation (FBI) due to its increased activity and high impact.

Monti ransomware

The Monti ransomware stands out for its targeted cyberattacks and sophisticated infiltration strategy. Although still relatively new, it has already inflicted considerable damage on several organizations.

Hive ransomware

The Hive ransomware was a ransomware-as-a-service (RaaS) operation run by the eponymous cybercriminal organization between June 2021 and January 2023. Its main target was public institutions.

And many more...

Browse our knowledge base. We have compiled the available data on the following Ransomware strains

KillSec ransomware
Ransomware groups

KillSec: from hacktivism to ransomware-as-a-service

Since the end of 2023, KillSec has been gradually establishing itself in the global cybercrime ecosystem, perfectly illustrating the modern transformation of hacktivist groups towards