Mar 30, 2023
Nov 20, 2025
Black Kite
Identifying ransomware trends is like a game of Clue: The setting is often the same, but the suspects and murder weapons change. Instead of Colonel Mustard in the library with the wrench, the culprit is often an international ransomware group with malware.
But as ransomware (like a Clue murder weapon) changes, it’s important also to be aware of the changing players and their motivations. Knowing more about the threat landscape will better protect your organization from a late-night mystery incident, breach, or attack.
In this blog, we’ll crack the case for you by looking at the Who (top ransomware groups and actors), What (organizations and industries targeted), and Why (bad actors’ motivations) behind the biggest ransomware trends of 2023.
In 2022, about 25% of cybersecurity attacks involved ransomware – and that number is only growing. Organizations and cybersecurity experts should closely monitor for updates on ransomware bad actors and groups to help guard against this growing attack type in 2023.
To face off with the top ransomware groups, organizations must understand what makes these groups so good at what they do. Cybersecurity specialists evaluating ransomware groups often look at data such as:
Experts also consider a threat actor’s background details (like the attacker’s country of origin and previous attack history) to piece together context around bad actors’ motivations, especially when filtered through current events.
All this information helps security teams identify the patterns and common signs that an attack is imminent – it helps them figure out the “Who” in the cybersecurity game of Clue.
When starting from square one, it can be challenging to know which ransomware groups to check up on – or even which ones are out there.
To help jumpstart your teams’ cybersecurity sleuthing, here’s a cheat sheet on the top five ransomware groups dominating today’s threat landscape:
What exactly is RaaS, and what does it have to do with the current threat landscape?
Ransomware attacks are growing more sophisticated. The rise of RaaS is a significant factor. Ransomware as a Service functions like software as a service (SaaS), providing a complete ransomware product (often with support) for the user and making the launch of devastating attacks a lot more accessible to bad actors without tech backgrounds.
Here’s what the rise of RaaS tells us:
As top ransomware groups change yearly, so do the targeted industries and organizations. That’s the “What” of our game of ransomware Clue — currently targeted organizations and industries.
Why do ransomware targets shift? The reason depends on various factors, including:
As the world re-adjusts to post-pandemic (or at least pandemic-adaptive) life, so are ransomware gangs re-adjusting their pursuits to suit their current goals and needs. Whether it be for personal or political reasons, here are the industries that bad actors have set their sights on for 2023:
One way to safeguard your organization from ransomware gang attacks is to hone in on ransomware gang motivation. Identifying the “why” behind what ransomware threat actors do makes it easier to connect the dots and determine what data, assets, or vulnerabilities in your systems are most enticing.
Here are some of the top reasons why ransomware gangs do what they do:
Even as ransomware attacks rise, overall ransomware payments are down. In 2022, ransomware groups took in a total of $457 million. In 2021, however, that figure was almost twice as high at $766 million. Security specialists believe the downturn in collecting cash is due to a growing number of victims refusing to pay up. That means ransomware groups are likelier to go after targets that will give them a lot of bang for their buck.
On the other hand, ransomware attacks are also under-documented. According to the Senate Homeland Security committee, 75% of ransomware attacks go unreported. Why? Usually, it’s due to companies looking to preserve their reputation, preferring to simply pay the ransomware group, reclaim their data, and move on. This willingness to pay the ransom and avoid reporting means that individual ransomware payouts are likely much higher. In fact, in the final quarter of 2022, the average ransomware payment was 58% higher than the previous quarter.
Remember, ransomware gangs aren’t just a random assortment of people in hoodies at computers. They’re sophisticated crime syndicates that operate like an (illegal) business. That means they have typical business concerns, like streamlining workflows, staying within budget, and acquiring profit.
It pays to be petty. With the rise of RaaS, the technical expertise required to code and implement ransomware is a thing of the past. That means any spurned lovers (or more likely, rivals and users) can harness the power of ransomware to mend their betrayed hearts.
Before, revenge ransomware usually occurred when ransomware groups found themselves attacked by a victim with the skills to do some hacking of their own. Now, organizations are wreaking havoc on their competitors. Today, any individual that feels slighted by a company can access the best ransomware in the world (along with the support to successfully implement it) as long as they’re willing to pay a fee.
When it comes to ransomware, it’s almost impossible to avoid some political motivations. That’s especially true during times of war (like with Russia-Ukraine) or geopolitical tension (China-Taiwan, North Korea, etc.).
For a few years, security specialists have been tracking the evolution of ransomware and hacktivism — or digital attacks done for political activism. Hacktivism events have increased in frequency, and they don’t always deal with money. For example, in 2022 a Belarusian ransomware attack on the country’s railway service demanded the release of 50 political prisoners instead of the standard ransom.
With growing attacks in the U.S. public sector, more politically motivated ransomware attacks in the Russian-Ukraine War, and increased hacktivism from developing global conflicts, this trend will likely continue into 2023 and beyond.
Definitively predicting the ins and outs of what ransomware groups will do next is anyone’s guess. Most cybersecurity experts agree on this theme: Organizations must be vigilant. The ubiquity of ransomware puts virtually all organizations — and as a result, their digital supply chains — at risk, regardless of industry.
That’s why leveraging tools like Black Kite’s Ransomware Susceptibility Index (RSI™) is critical. You’ll get information on third-party vendor risk, ransomware susceptibility of your vendors, and remediation insights to help boost your organization’s cyber defense — and catch the culprits before they commit the crime.