analyst @ nohacky :~/briefings $
cat / briefings / ransomware-rulebook-rewritten-2026
analyst@nohacky:~/briefings/ransomware-rulebook-rewritten-2026.html
reading mode 14 min read
category threat
published March 2026
read_time 14 min

The Ransomware Rulebook Has Been Rewritten: Why Threat Actors Are Abandoning Encryption and What It Means for Your Organization

A wave of threat intelligence reports published in February 2026 collectively paint a picture of a cyber-threat landscape that has undergone a fundamental transformation. Threat actors are not just changing tools. They are changing business models.

For the better part of a decade, the ransomware equation was brutally simple. Attackers broke in, locked your files with encryption, and demanded payment for the key. Organizations responded in the logical way: they invested heavily in backup infrastructure. They built redundancy. They tested restoration procedures. And by 2025, that defensive investment was yielding results — ransomware victims were refusing to pay in growing numbers, recovery was becoming routine, and the encryption model's leverage was weakening.

So the attackers adapted. And the shift they have made is not incremental. It is structural.

Reports from CrowdStrike, IBM X-Force, Arctic Wolf, Darktrace, Symantec, and others collectively document how encryption, once the cornerstone of every ransomware operation, is increasingly being abandoned in favor of pure data theft and extortion. Attacks are faster than ever, AI is accelerating every phase of the intrusion lifecycle, and the line between nation-state espionage and financially motivated cybercrime has blurred to the point of near-irrelevance.

critical

This is the new reality. If your security strategy was built around the old ransomware playbook, it is already obsolete.

The Data Theft Pivot: From Encryption to Extortion

The single most consequential shift documented across the 2026 threat reports is the explosive growth in data-only extortion. According to the Arctic Wolf 2026 Threat & Predictions Report, published February 17, 2026, data-only extortion incidents surged elevenfold year over year, jumping from 2 percent to 22 percent of their incident response caseload. Ransomware, business email compromise, and data incidents combined accounted for 92 percent of all Arctic Wolf IR cases, but data-focused incidents alone drove that proportional surge. A further 5 percent of cases were classified as pre-ransomware activity — meaning defenders caught attackers before encryption was deployed. The scale of that shift underscores how completely the operational logic of ransomware has changed as organizations have improved their recovery capabilities.

Attackers continue to rely on operational efficiency — logging in instead of breaking in, stealing data instead of encrypting it, and exploiting trusted tools rather than complex vulnerabilities. Organizations that invested in visibility, identity security, and disciplined remote access controls were far more resilient throughout the year. — Ismael Valenzuela, Vice President, Labs, Threat Research & Intelligence, Arctic Wolf

The numbers from other researchers confirm the same pattern. Cognyte's analysis of over 125 ransomware groups in 2025 found that data exfiltration was involved in roughly 76 percent of ransomware cases, with infiltration increasingly preceding or outright replacing encryption. Symantec's research documented a 23 percent increase in total extortion incidents in 2025, reaching 6,182 — and a meaningful portion of that growth came from attacks that never deployed a single encryption payload.

Why is this happening? The logic is devastatingly simple. Data theft is faster, stealthier, and harder to defend against than encryption. Encrypting an entire environment takes hours. It generates noise — disabled services, locked files, ransom notes dropped across systems. Endpoint detection and response tools are specifically tuned to spot this behavior. But exfiltrating data can happen in minutes, often using legitimate tools that already exist in the environment. Azure Copy, PowerShell, Rclone, standard remote management utilities — these blend into normal network traffic seamlessly. There are no ransom notes. No locked screens. No obvious indicators that anything is wrong until the extortion demand arrives.

warning

Perfect backups do not help when the attackers already have your data. The leverage has shifted entirely from operational disruption to reputational damage and regulatory exposure. Under frameworks like GDPR, HIPAA, and an expanding patchwork of state and national breach notification laws, a data breach carries its own financial consequences regardless of whether a ransom is paid.

Some groups have built their entire operating model around this approach. PEAR (Pure Extortion and Ransom) and Silent Ransom emerged in 2025 as groups that exclusively conduct data-only extortion, never deploying encryption at all. The Cl0p ransomware group, widely regarded as the pioneer of the mass-exploitation-for-extortion model, demonstrated the scalability of the approach through campaigns targeting MOVEit, Cleo, and Oracle E-Business Suite customers — acquiring zero-day exploits, compromising as many instances as possible, and extorting each victim individually.

The picture is not entirely one-directional, however. Coveware noted that pure data exfiltration may already be showing diminishing returns for some groups, with payment rates declining and ransom amounts shrinking. The implication is that some operators may circle back to encryption — not as a replacement for data theft, but as an additional layer of leverage. Double extortion (stealing data and encrypting systems) and even triple extortion (adding threats of DDoS attacks or contacting victims' customers directly) are becoming the baseline expectation rather than the exception. Arctic Wolf's data reinforces the payment dynamic: in 77 percent of ransomware cases, organizations chose not to pay, and when they did engage, professional negotiation reduced the initial demand by an average of 67 percent — suggesting that even ransom negotiation has become a standardized, commoditized function on both sides of the table.

Speed Kills: The 27-Second Breakout

If the shift to data theft represents a change in what attackers do, the acceleration of attack timelines represents a change in how fast they do it. And the numbers are staggering.

CrowdStrike's 2026 Global Threat Report documented that the average eCrime breakout time — the interval between initial access and lateral movement to another system — dropped to 29 minutes in 2025. That is a 65 percent increase in speed compared to 2024. The fastest observed breakout was twenty-seven seconds. In one intrusion, data exfiltration began within four minutes of initial access.

This is an AI arms race. Breakout time is the clearest signal of how intrusion has changed. Adversaries are moving from initial access to lateral movement in minutes. AI is compressing the time between intent and execution while turning enterprise AI systems into targets. Security teams must operate faster than the adversary to win. — Adam Meyers, Head of Counter Adversary Operations, CrowdStrike

These timelines are not theoretical. They represent real-world intrusions observed by threat intelligence teams. And they fundamentally undermine the traditional security operations model. When an attacker can move from foothold to lateral movement in under 30 minutes — or in extreme cases, under 30 seconds — the conventional cycle of detect, investigate, then respond collapses under its own latency. A human analyst receiving an alert, logging into a SIEM, and beginning to investigate has already lost the race before they even start.

The speed problem is compounded by an even more unsettling finding: 42 percent of vulnerabilities exploited in 2025 were weaponized before a public disclosure or patch was available, according to CrowdStrike. Zero-day exploitation is no longer a nation-state-only capability — it is a mainstream eCrime weapon. And cloud environments are bearing an increasing share of the impact. CrowdStrike documented a 37 percent overall rise in cloud-conscious intrusions, with a 266 percent surge specifically from state-nexus actors targeting cloud environments for intelligence collection. Valid account abuse drove 35 percent of those cloud incidents.

We continue to see that early detection completely changes the outcome of an attack. When defenders identify malicious activity before an adversary can detonate ransomware or escalate privileges, the difference in cost, downtime, and business disruption is dramatic. Preparedness allows us to be decisive. — Kerri Shafer-Page, Vice President of Incident Response, Arctic Wolf

The speed problem is compounded by the nature of modern intrusions. CrowdStrike found that 82 percent of detections in 2025 were malware-free. Attackers are not deploying payloads that signature-based tools can catch. They are using valid credentials, legitimate identity flows, approved SaaS integrations, and trusted software supply chains. They are, in effect, logging in rather than breaking in. When the attacker's tools are indistinguishable from an administrator's daily workflow, speed becomes the only remaining differentiator between a routine login and a catastrophic breach.

AI: The Great Equalizer

Artificial intelligence is the thread that runs through every dimension of the 2026 threat landscape. It is not that AI has introduced fundamentally new attack categories. Rather, it has compressed timelines, lowered skill barriers, and amplified the scale of existing techniques to a degree that defenders are struggling to match.

CrowdStrike tracked an 89 percent year-over-year increase in attacks by AI-enabled adversaries. IBM's 2026 X-Force Threat Intelligence Index documented a 44 percent increase in attacks beginning with the exploitation of public-facing applications, driven significantly by AI-enabled vulnerability discovery. Amazon Threat Intelligence published a detailed case study of a threat actor with limited technical skills who used commercial generative AI tools to compromise over 600 FortiGate devices across 55 countries between January and February 2026.

case study

Amazon Threat Intelligence documented a Russian-speaking, financially motivated actor formally assessed as having "low-to-medium baseline technical capability, significantly augmented by AI" who compromised over 600 FortiGate devices across more than 55 countries between January 11 and February 18, 2026. CJ Moses, CISO of Amazon Integrated Security, confirmed: "No exploitation of FortiGate vulnerabilities was observed — instead, this campaign succeeded by exploiting exposed management ports and weak credentials with single-factor authentication, fundamental security gaps that AI helped an unsophisticated actor exploit at scale." Moses further described the actor as "likely a financially motivated individual or small group who, through AI augmentation, achieved an operational scale that would have previously required a significantly larger and more skilled team." Separate technical analysis by independent researcher Cyber and Ramen identified the attacker's infrastructure — a misconfigured server exposing 1,402 files across 139 subdirectories, including stolen FortiGate configurations, Active Directory credential dumps, and attack planning documents. The server ran a custom Model Context Protocol server called ARXON that fed reconnaissance data into commercial LLMs, including DeepSeek for attack plan generation. In some cases, Claude Code was configured to execute offensive tools autonomously, without requiring the operator to approve individual commands. The threat actor did not need to be an elite operator. AI was the force multiplier.

Nation-state actors are also leveraging AI, though in more sophisticated ways. CrowdStrike documented that Russia-nexus threat actor FANCY BEAR deployed LLM-enabled malware (dubbed LAMEHUG) that uses the Qwen2.5-Coder-32B-Instruct model via the Hugging Face API to automatically generate reconnaissance commands against compromised systems. North Korean threat actors under the FAMOUS CHOLLIMA umbrella used AI-generated personas and synthetic identities to scale their remote IT worker fraud schemes — and North Korea-nexus incidents overall surged more than 130 percent year over year. PRESSURE CHOLLIMA, a separate DPRK-linked group, was responsible for what CrowdStrike characterized as the largest single financial heist ever reported: the $1.46 billion cryptocurrency theft linked to the Bybit exchange compromise. eCrime actor PUNK SPIDER deployed AI-generated scripts to accelerate credential dumping and erase forensic evidence.

And the AI risk is not limited to attackers using AI as a tool. AI systems themselves are becoming targets. CrowdStrike found that adversaries exploited legitimate generative AI tools at more than 90 organizations in 2025 by injecting malicious prompts to generate commands for stealing credentials and cryptocurrency. ChatGPT was mentioned in criminal forums 550 percent more than any other AI model — a signal of how deeply embedded generative AI has become in the threat actor ecosystem. IBM X-Force reported that over 300,000 ChatGPT credentials were exposed by infostealer malware in 2025, signaling that AI platforms now carry the same credential risk as any other enterprise SaaS application. AI is also reshaping social engineering at scale: CrowdStrike documented a 563 percent increase in incidents using fake CAPTCHA lures, and a 141 percent increase in spam volume, as adversaries leveraged AI to manufacture more convincing pretexts and deliver them at unprecedented throughput.

Attackers aren't reinventing playbooks, they're speeding them up with AI. The core issue is the same: businesses are overwhelmed by software vulnerabilities. The difference now is speed. With so many vulnerabilities requiring no credentials, attackers can bypass humans and move straight from scanning to impact. — Mark Hughes, Global Managing Partner for Cybersecurity Services, IBM

The Blurring Line Between Crime and Espionage

Another significant development documented in the 2026 reports is the accelerating convergence between nation-state operations and financially motivated cybercrime. CrowdStrike tracked a 38 percent increase in China-nexus activity in 2025, with the logistics sector seeing an 85 percent spike in targeting. Sixty-seven percent of vulnerabilities exploited by Chinese threat actors delivered immediate system access, and 40 percent targeted edge devices where EDR solutions often have limited visibility.

IBM's X-Force report noted that large supply chain and third-party compromises have nearly quadrupled since 2020 — driven by attackers exploiting trust relationships and CI/CD automation across development workflows and SaaS integrations. IBM independently documented North Korean IT worker schemes using AI-driven image manipulation to generate synthetic identities and translation tools to operate across global marketplaces at scale. Cyble's research tracked how nation-state actors are increasingly purchasing initial access from cybercriminal brokers rather than conducting their own reconnaissance, effectively blurring the distinction between espionage and crime. IBM X-Force also attributed part of the supply chain surge to a convergence dynamic: techniques once exclusive to nation-state actors are now spreading through underground forums and being adopted by financially motivated groups as AI streamlines the learning curve.

This convergence has practical implications for defenders. Organizations in sectors traditionally targeted by nation-states — energy, telecommunications, defense, finance — can no longer treat cybercrime and espionage as separate risk categories requiring different response strategies. The same initial access broker who sells VPN credentials to a ransomware affiliate on Monday may sell similar credentials to a state-sponsored intelligence operation on Tuesday. The infrastructure is shared. The techniques overlap. And the speed at which both categories of threat actor operate is converging toward the same breakneck pace.

The Industrialization of Cybercrime

If there is a single unifying theme across the 2026 threat reports, it is industrialization. Cybercrime has completed its transformation from a cottage industry of skilled individual hackers into a mature, vertically integrated criminal economy.

The ransomware-as-a-service model has evolved far beyond simple tooling-for-hire. IBM X-Force identified 109 distinct extortion groups active in 2025, up from 73 in 2024 — a 49 percent year-over-year surge driven by ecosystem fragmentation and collapsing barriers to entry. That fragmentation also means the dominance of the largest groups is shrinking: the share of attacks attributed to the top ten groups dropped 25 percent year over year, replaced by smaller, transient operators whose low-volume campaigns complicate attribution. Attack kits that once cost tens of thousands of dollars are now available for a few hundred dollars per month. Initial Access Brokers (IABs) operate thriving marketplaces where network access is priced like a commodity — from under $1,000 for small business credentials to over $100,000 for privileged enterprise access. Vulnerability exploitation overtook phishing as the leading cause of attacks in 2025, accounting for 40 percent of incidents observed by X-Force. Each participant in the ecosystem specializes in their core competency: IABs handle initial compromise, ransomware operators manage encryption and negotiation, and data brokers focus on exfiltration and monetization.

IBM also documented a geographic shift: North America became the most-attacked region for the first time in six years, accounting for 29 percent of all cases — up from 24 percent in 2024. Manufacturing retained its position as the most targeted sector for the fifth consecutive year, representing 27.7 percent of incidents, with data theft the most common impact type.

Arctic Wolf's report documented that 65 percent of non-BEC intrusions stemmed from abuse of RDP, VPN, and RMM tools — up sharply from two years ago — as attackers favored easy remote access over exploits. Phishing drove 85 percent of business email compromise incidents, rising significantly as AI made fraudulent messages more convincing and scalable. A critical detail that cuts against the assumption that defenders need to prioritize novel threats: every top-exploited CVE that Arctic Wolf tracked in 2025 was from 2024 or earlier. The frontier of active exploitation is not zero-day. It is unpatched. And in 77 percent of ransomware cases, organizations did not pay — but when they did, professional negotiation reduced demands by an average of 67 percent, suggesting that even the payment and negotiation process has become a routinized business function for both attackers and defenders.

What Defenders Must Do Now

The convergence of these trends — data theft replacing encryption, AI-accelerated timelines, malware-free intrusions, and industrialized criminal operations — demands a fundamental reassessment of defensive priorities. The organizations that will weather 2026 and beyond are not the ones with the most tools or the longest rule lists. They are the ones that can detect early, respond at machine speed, and prove continuously that their detection coverage matches the adversary's evolving tradecraft.

  1. Identity is now the primary attack surface. With 82 percent of intrusions being malware-free, security strategies must center on identity hardening, least-privilege access, multi-factor authentication, and behavioral analytics that detect anomalous credential usage. Monitoring identity flows across hybrid and cloud environments is no longer optional.
  2. Speed of detection defines impact. When breakout times are measured in minutes, assume-breach is not a philosophy — it is an operational requirement. Organizations need automated detection and response capabilities that can identify and contain threats without waiting for a human analyst to begin investigating. IBM's Hughes put it plainly: "Security leaders need to shift to a more proactive approach, using agentic-powered threat detection and response to identify gaps and catch threats before they escalate."
  3. Data loss prevention must be reimagined. If data theft is the primary extortion mechanism, then preventing unauthorized exfiltration becomes as critical as preventing encryption. This means monitoring for abuse of legitimate tools like Azure Copy, Rclone, and standard remote access utilities that attackers use to blend in with normal operations.
  4. AI must defend against AI. As IBM and CrowdStrike both emphasized, the organizations best positioned to survive are those that combine AI-assisted detection with expert human guidance. AI-enabled attackers are iterating faster than manual processes can keep pace with. Defenders must match that pace.
  5. Fundamentals still matter. Despite all the sophisticated threats documented in these reports, the most common entry points remain basic: unpatched vulnerabilities, weak credentials, exposed management interfaces, misconfigured access controls. IBM X-Force Red penetration testing teams documented that misconfigured access controls were the single most common entry point across their engagements — and every top-exploited CVE that Arctic Wolf tracked in 2025 was from 2024 or earlier. The implication is precise: the active exploitation frontier is not zero-day. It is unpatched. No amount of advanced tooling compensates for neglecting the basics.

The threat landscape of 2026 rewards speed, punishes complacency, and no longer provides the warning signs that defenders once relied upon. The ransomware note on every screen, the encrypted file extensions, the obvious indicators of compromise — those signals are disappearing. What remains is quieter, faster, and far more dangerous. The attackers have rewritten the rulebook. It is past time for defenders to write a new one of their own.

Sources

  • CrowdStrike, "2026 Global Threat Report," released February 24, 2026 — crowdstrike.com/en-us/global-threat-report/
  • CrowdStrike press release, "2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface," February 24, 2026 — ir.crowdstrike.com
  • IBM, "2026 X-Force Threat Intelligence Index," released February 25, 2026 — ibm.com/reports/threat-intelligence
  • IBM Newsroom, "IBM 2026 X-Force Threat Index: AI-Driven Attacks are Escalating as Basic Security Gaps Leave Enterprises Exposed," February 25, 2026 — newsroom.ibm.com
  • Arctic Wolf, "2026 Threat & Predictions Report," released February 17, 2026 — arcticwolf.com/resource/aw/arctic-wolf-threat-report-2026
  • Arctic Wolf press release, "Arctic Wolf Threat Report Highlights 11x Growth in Data Extortion Incidents and Continued Dominance of Ransomware," February 17, 2026 — globenewswire.com
  • Amazon Threat Intelligence, "AI-Augmented Threat Actor Accesses FortiGate Devices at Scale," authored by CJ Moses, CISO of Amazon Integrated Security, February 21, 2026 — aws.amazon.com/blogs/security
  • Cyber and Ramen (independent researcher), FortiGate campaign technical analysis, February 21, 2026 — cyberandramen.net
  • Darktrace, "Annual Threat Report 2026," February 2026
  • Symantec/Broadcom, "Ransomware: Tactical Evolution Fuels Extortion Epidemic," 2026
  • Cognyte, "Ransomware Trends 2026," February 2026
  • Cyble, "Top 10 Threat Actor Trends of 2025 and Signals for 2026," December 2025
  • Coveware, "Ransomware Groups May Pivot Back to Encryption," February 2026
  • Insurance Post, "Threat actors showing dramatic shift in cyber-attack executions," February 25, 2026
— end of briefing