Quick Facts
- Category: Cybersecurity
- Published: 2026-05-21 05:09:21
- 10 Critical Facts About AI Threats to Global Finance from the IMF
- Critical Open Source Projects Rescued from Abandonment: Chainguard CEO Launches Forking Initiative to Secure Software Supply Chain
- 4 Top-Rated Bose Headphone Models on Sale This Memorial Day: Save Up to $120
- VS Code Python Environments Extension Gets Performance Overhaul and Usability Upgrades
- Local Network Access for Laravel Projects Now Easier: New Configuration Method Eliminates 'php artisan serve' Hassle
As we mark International Anti-Ransomware Day on May 12, Kaspersky’s annual report paints a picture of a threat that is paradoxically less frequent yet more cunning. Attack volumes have dipped, but the tactics, tools, and targets have grown more sophisticated. From post-quantum cryptography to initial access brokers, here are the ten trends you need to know about the state of ransomware in 2026.
1. Ransomware Attacks Decline, But Don’t Be Fooled
According to Kaspersky Security Network, the percentage of organizations hit by ransomware fell in 2025 across every region compared to 2024. This decline, however, masks an uncomfortable reality: ransomware operators are now focusing on higher‑value targets and refining their methods. Attackers are investing in precision and scale, meaning each incident carries greater potential for disruption and financial loss. The overall threat level remains high, and cybersecurity teams cannot afford to let their guard down.

2. Manufacturing Sector Bears the Brunt of Financial Damage
Ransomware’s toll on manufacturing is staggering. Research from Kaspersky and VDC Research estimates that attacks on this sector alone caused over $18 billion in losses during the first three quarters of 2025. Production halts, data recovery, and ransom payments compound the damage. With supply chains increasingly digitized, a single infection can ripple through factories and logistics, making manufacturing a prime target for cybercriminals seeking maximum economic impact.
3. EDR Killers Become Standard Tools in Attack Playbooks
In 2026, disabling endpoint detection and response (EDR) systems has moved from a nice‑to‑have to a must‑do for ransomware gangs. Attackers now routinely deploy “EDR killers” before launching their payloads. These tools terminate security processes and deactivate monitoring agents, often by exploiting trusted components such as signed drivers. This trend underscores a shift toward methodical, multi‑stage intrusions where stealth and persistence are prioritized over speed.
4. BYOVD – The Subtle Path to Defense Evasion
Bring Your Own Vulnerable Driver (BYOVD) is a technique that allows attackers to leverage signed, legitimate drivers that contain vulnerabilities. By loading such a driver, adversaries can execute kernel‑level commands, terminate security software, and blend into normal system activity. This method is now a repeatable phase of the attack lifecycle, making it harder for organizations to maintain control of their own endpoints. Detection alone is no longer enough; proactive driver whitelisting and monitoring are essential countermeasures.
5. Post‑Quantum Cryptography Enters the Ransomware Toolbox
As predicted, advanced ransomware groups have begun adopting post‑quantum cryptography (PQC) in 2025. These encryption schemes are designed to resist attacks from both classical and quantum computers, making decryption without the attacker’s key virtually impossible. This evolution means that victims can no longer rely on future breakthroughs to recover data—the only option may be to pay the ransom. PQC represents a generational leap in ransomware capabilities.
6. PE32: A New Family Leveraging ML‑KEM Encryption
One concrete example of PQC‑enabled ransomware is the PE32 family, which uses the ML‑KEM (Module‑Lattice‑Based Key‑Encapsulation Mechanism) standard. This cipher is so robust that even massive computational resources cannot break it. PE32’s appearance signals that cutting‑edge cryptography is no longer confined to academic labs or nation‑state actors—it’s now in the hands of cybercriminals. Organizations must prepare for a future where decryption without payment is not an option.

7. Encryptionless Extortion: The Art of the Bluff
As fewer victims pay ransoms, some groups are experimenting with encryptionless extortion. Instead of locking files, attackers exfiltrate sensitive data and threaten to leak it publicly unless a payment is made. This approach reduces technical complexity and avoids triggering EDR alerts associated with encryption. It also shifts the pressure onto data privacy and reputation, forcing companies to consider whether the cost of a leak outweighs the ransom demand.
8. Initial Access Brokers Double Down on RDWeb
Initial access brokers (IABs) remain a key cog in the ransomware ecosystem. In 2026, these specialists have shifted focus to RDWeb (Remote Desktop Web Access) as their preferred remote‑access vector. By exploiting weak credentials or unpatched vulnerabilities in RDWeb, IABs supply ransomware operators with a reliable entry point. This trend highlights the importance of securing remote access solutions and enforcing multi‑factor authentication to cut off the supply chain of compromise.
9. New Ransomware Families Embrace Sophistication Over Volume
The emergence of new families continues, but the bar for entry is rising. Modern groups invest in research and development, adopting advanced evasion techniques, custom encryption, and even modular architectures. Rather than flooding the market with low‑quality variants, they craft tailored payloads for high‑value targets. This maturation means that defenders face fewer, but far more dangerous, threats—each capable of bypassing traditional defenses with ease.
10. The Bottom Line: Prepare for a Smarter, More Resilient Enemy
Ransomware in 2026 is not just about locking files—it’s about neutralizing defenses, exploiting trust, and leveraging state‑of‑the‑art cryptography. The decline in attack numbers masks a rise in sophistication. Organizations must adopt layered defenses that include driver whitelisting, EDR hardening, remote‑access security, and offline backups. The ransomware ecosystem will only grow smarter; the question is whether your defenses can keep pace.
Conclusion
The ransomware landscape of 2026 is defined by adaptiveness and escalation. Although the number of attacks may have dipped, the cost, complexity, and cunning of each incident have grown. From post‑quantum encryption to EDR‑killing tools, the trends outlined here demand a proactive, future‑ready cybersecurity strategy. Stay informed, stay vigilant, and never underestimate the adversary’s next move.