Global ransomware statistics 2026: The data behind the rising threat
Ransomware attacks continue to escalate across the global cyber threat environment. From ransomware as a service operations and double extortion tactics to large scale data theft campaigns targeting critical infrastructure organisations, ransomware threats are now affecting organisations of every size.
If you’re reading this because you think you have experienced a ransomware incident and are unsure how to deal with it, contact Zensec immediately.
The latest ransomware statistics show that ransomware incidents are increasing globally even after major law enforcement actions against some of the world’s largest ransomware gangs.
At the same time, ransomware attackers are evolving faster than many organisations can defend against them.
Threat actors are now:
- Stealing sensitive data before encryption
- Exploiting compromised credentials and exploited vulnerabilities
- Using phishing emails and malicious attachments to gain initial access
- Targeting cloud infrastructure and cloud storage environments
- Demanding multi million dollar ransom payments
- Operating through ransomware as a service affiliate models
According to ransomware.live, publicly listed ransomware victims increased from 5,384 in 2023 to 7,919 in 2025.
That represents a 47% increase in global ransomware activity in just two years.
This article breaks down the latest ransomware statistics globally using data from:
- Unit 42
- Chainalysis
- Verizon DBIR
- Mandiant
- Microsoft
- Sophos
- FBI IC3
- NCSC
- CTIIC
- Europol
- TRM Labs
The goal is simple.
To provide a clear statistical picture of how ransomware attacks are evolving in 2026.
Key ransomware statistics for 2026
| Statistic | Value |
|---|---|
| Publicly listed ransomware victims in 2025 | 7,919 |
| Increase in ransomware victims between 2023 and 2025 | 47% |
| Active ransomware groups in 2025 | 129 |
| New ransomware groups appearing in 2025 | 68 |
| Percentage of breaches involving ransomware attacks | 44% |
| SMB breaches involving ransomware | 88% |
| Median ransomware payment | $1 million |
| Median ransom demand for organisations over $1B revenue | $5 million |
| Organisations experiencing data theft during ransomware incidents | 77% |
| Average ransomware dwell time | 4 days |
| Fastest observed breakout time in eCrime attacks | 27 seconds |
| Estimated ransomware payments in 2024 | $892 million |
| Victim payment rate in 2025 | 28% |
| Increase in nationally significant UK cyber incidents | 129% |
| Most targeted industry globally | Commercial services |
Global ransomware incidents continue to rise
One of the clearest trends across every major ransomware dataset is the continued increase in ransomware attacks globally.
According to ransomware.live:
- 2023 saw 5,384 publicly listed ransomware victims
- 2024 saw 6,034 victims
- 2025 saw 7,919 victims
That represents:
- 12.1% growth from 2023 to 2024
- 31.2% growth from 2024 to 2025
Government intelligence reporting supports the same trend.
The U.S. Office of the Director of National Intelligence recorded:
- 4,591 worldwide ransomware incidents in 2023
- 5,289 worldwide ransomware incidents in 2024
That is a 15% year on year increase.
While methodologies differ across datasets, the overall trend is clear.
Ransomware continues to grow globally.
How many active ransomware groups exist?
The ransomware ecosystem is becoming increasingly fragmented.
Rather than a small number of ransomware gangs dominating the market, dozens of active ransomware groups are continuously emerging.
ransomware.live tracked:
| Year | Active ransomware groups |
| 2023 | 77 |
| 2024 | 110 |
| 2025 | 129 |
In addition:
- 51 new ransomware strains emerged in 2024
- 68 new ransomware strains emerged in 2025
TRM Labs estimates there were:
- 161 active ransomware variants by the end of 2025
- 93 new variants appearing during 2025 alone
This makes ransomware threats significantly harder to disrupt.
Even after major law enforcement actions against LockBit and ALPHV, many ransomware attacks simply shifted toward newer ransomware actors.
How ransomware as a service changed cyber crime
Ransomware as a service has fundamentally changed the cyber security landscape.
Instead of building their own malicious software, ransomware attackers can now lease ransomware platforms from established operators.
This allows:
- Initial access brokers to sell network access
- Affiliates to launch ransomware campaigns
- Threat actors to specialise in credential theft and phishing attempts
- Criminal groups to scale attacks globally
This affiliate based ransomware ecosystem is one reason why ransomware activity continues to rise despite disruption operations by law enforcement agencies.
Recorded Future found that RansomHub attracted affiliates partly through offering a 90% commission structure.
This makes ransomware as a service one of the most profitable cyber threats globally.
Which industries experience the most ransomware attacks?
Ransomware groups continue targeting industries where operational downtime creates immediate pressure.
According to CTIIC global attack data, the most targeted sectors in 2024 were:
| Industry | Recorded attacks |
| Commercial services | 2,167 |
| Manufacturing | 735 |
| Technology and communications | 506 |
| Healthcare and emergency services | 432 |
| Government and defence | 412 |
Manufacturing remains one of the most attractive targets because:
- Operational disruption impacts revenue immediately
- Legacy systems often contain exploited vulnerabilities
- Downtime creates pressure to pay ransom demands
Healthcare organisations also remain heavily targeted because attacks can affect:
- Critical data
- Sensitive data
- Patient care
- Business operations
- Public trust
Critical infrastructure sectors continue to face elevated ransomware threats globally.
Which countries experience the most ransomware activity?
The United States remains the most heavily targeted country globally.
According to Unit 42:
- 47.6% of ransomware victims in 2023 were U.S. based
- The UK accounted for 6.5% of victims
In Q1 2025 alone:
| Country | Victims |
| United States | 822 |
| Canada | 88 |
| United Kingdom | 58 |
Microsoft’s Digital Defense Report also identifies both the U.S. and UK as major centres of ransomware intrusions and cyber incidents.
This reinforces an important point.
Ransomware is now a global operational resilience problem.
Small businesses are increasingly targeted
Ransomware attacks are no longer focused only on large enterprises.
According to Verizon’s 2025 DBIR:
- Ransomware was present in 44% of all data breaches
- 88% of SMB breaches involved ransomware
- Only 39% of larger organisation breaches involved ransomware
Many ransomware actors increasingly target smaller organisations because:
- Cyber security maturity is often lower
- Data security controls are weaker
- Incident response capabilities are limited
- Cyber insurance requirements are inconsistent
- Recovery expenses can still be profitable for attackers
Many ransomware attacks now focus on volume rather than only high value enterprise targets.
What percentage of cyber attacks involve ransomware?
Verizon’s 2025 DBIR found ransomware attacks were present in 44% of all security breaches analysed.
This makes ransomware one of the most common forms of cyber crime affecting organisations globally.
How much do ransomware victims pay?
Sophos found the median ransomware payment in 2025 was $1 million.
For organisations generating more than $1 billion in revenue, the median ransom demand rose to $5 million.
| Metric | Value |
| Median ransomware payment | $1 million |
| Median enterprise ransom demand | $5 million |
| Payments above $1 million | 52% |
| Demands above $1 million | 57% |
The largest ransomware payout figures often attract headlines, but the wider financial impact extends beyond ransom payments.
Additional recovery expenses commonly include:
- Incident response services
- Legal costs
- Business interruption
- Operational downtime
- Data restoration
- Regulatory reporting
- Cyber insurance increases
Are fewer organisations paying ransoms?
Despite rising ransomware incidents, fewer organisations appear to be paying.
Chainalysis estimates ransomware payments totalled:
| Year | Estimated payments |
| 2023 | $1.25 billion |
| 2024 | $892 million |
| 2025 | $820M+ |
Chainalysis also estimates only 28% of ransomware victims paid in 2025.
Possible reasons include:
- Improved backups
- Better incident response preparation
- Greater awareness of double extortion tactics
- Increased law enforcement pressure
- Stricter cyber insurance controls
However, ransomware payments still represent one of the largest forms of financially motivated cyber crime globally.
Double extortion tactics are now standard
Modern ransomware attacks are no longer focused purely on encryption.
Today, many ransomware campaigns involve stolen data before encryption begins.
This allows ransomware attackers to:
- Leak sensitive data publicly
- Threaten data breaches
- Pressure organisations through reputational damage
- Continue extortion even if decryption keys are not needed
The statistics show how rapidly this tactic evolved.
| Year / source | Data theft observed |
| Mid 2021 (Unit 42) | ~40% |
| Late 2022 (Unit 42) | ~70% |
| 2025 (Mandiant) | 77% |
| Microsoft telemetry | 82% |
This means valuable data is often more important to ransomware gangs than encryption itself.
The most common ransomware attack vectors
Across major threat intelligence datasets, the same attack vectors repeatedly appear.
Phishing emails and malicious attachments
Phishing attempts remain one of the most common methods used to gain initial access.
Attackers frequently use:
- Malicious attachments
- Credential harvesting pages
- Malware infections
- Social engineering
Exploited vulnerabilities
Mandiant found exploits caused 33% of investigations in 2024.
VPNs, firewalls and internet facing services remain common entry points.
Verizon also reported vulnerability exploitation accounted for 20% of breaches.
Compromised credentials
Compromised credentials and credential theft remain central to ransomware intrusions.
Microsoft estimates modern MFA reduces identity compromise risk by more than 99%.
However, Sophos found MFA was unavailable in 63% of breached organisations.
Initial access brokers
Initial access brokers continue selling network access to ransomware actors.
This division of labour allows ransomware campaigns to scale faster and target more organisations simultaneously.
Cloud infrastructure is becoming a larger target
Cloud infrastructure and cloud storage environments are increasingly involved in ransomware incidents.
As organisations migrate critical data into cloud platforms, threat actors are adapting their attack techniques accordingly.
This creates additional risks involving:
- Security breaches
- Sensitive data exposure
- Data theft
- Misconfigured cloud storage
- Malware breaches
Modern data security strategies must now protect both traditional infrastructure and cloud environments.
Ransomware attacks are becoming faster
One of the most concerning ransomware trends is attack speed.
Sophos incident response data found:
| Metric | Time |
| Median dwell time | 4 days |
| Time from compromise to exfiltration | 72.98 hours |
| Time from exfiltration to detection | 2.7 hours |
Meanwhile, CrowdStrike reported:
- Average breakout time: 29 minutes
- Fastest observed breakout: 27 seconds
This shrinking response window creates major challenges for cyber security teams.
Traditional prevention focused approaches are struggling against rapidly evolving threats.
Why ransomware statistics remain difficult to measure
Ransomware statistics are inherently imperfect.
Different datasets measure different forms of ransomware activity.
Leak site tracking may:
- Miss private settlements
- Include duplicate victims
- Include fabricated listings
Official complaint data also remains heavily underreported.
For example:
- FBI IC3 recorded more than 3,600 ransomware cases in 2025
- Reported financial fraud losses excluded downtime and many recovery expenses
Similarly, the UK NCSC notes many cyber incidents are never formally reported.
This means no single source captures the full scale of global ransomware incidents.
However, when multiple independent datasets align, the wider trends become difficult to ignore.
Final thoughts
The global ransomware landscape is not shrinking.
It is evolving rapidly.
The latest ransomware statistics show:
- Ransomware victims continue to rise
- More ransomware groups are appearing each year
- Data theft is becoming the dominant tactic
- Organisations are paying less frequently
- Threat actors are operating faster than ever
- Critical infrastructure organisations remain high risk targets
At the same time, ransomware attackers continue adapting their techniques through ransomware as a service operations, phishing campaigns and credential based intrusions.
For organisations, ransomware is now far more than a technical issue.
It is a business operations and resilience challenge.
The organisations most likely to recover successfully are those investing in:
- Threat intelligence
- Incident response readiness
- Identity protection
- Data security controls
- Cloud infrastructure visibility
- Backup resilience
- Vulnerability management
Because in 2026, the question is rarely whether ransomware activity exists.
The question is how quickly organisations can detect, contain and recover from it.
Sources
This article uses research and statistics from:

