
In 2024, international ransomware assaults hit 5,414, an 11% build up from 2023.

After a sluggish get started, assaults spiked in Q2 and surged in This fall, with 1,827 incidents (33% of the 12 months’s general). Regulation enforcement movements towards main teams like LockBit led to fragmentation, resulting in extra festival and a upward push in smaller gangs. The collection of lively ransomware teams jumped 40%, from 68 in 2023 to 95 in 2024.

New Ransomware Teams to Watch
In 2023 there have been simply 27 new teams. 2024 noticed a dramatic upward push with 46 new teams detected. Because the 12 months went at the collection of teams sped up with This fall 2024 having 48 teams lively.
Of the 46 new ransomware teams in 2024, RansomHub changed into dominant, exceeding LockBit’s process. At Cyberint, now a Test Level Corporate, the analysis staff is continuously researching the most recent ransomware teams and inspecting them for doable have an effect on. This weblog will have a look at 3 new gamers, the aforementioned RansomHub, Fog and Lynx and read about their have an effect on in 2024 and delve into their origins and TTPs.
To be told about different new gamers obtain the 2024 Ransomware Document right here.

Ransomhub
RansomHub has emerged because the main ransomware workforce in 2024, claiming 531 assaults on its Knowledge Leak Web page since taking off operations in Feb 2024. Following the FBI’s disruption of ALPHV, RansomHub is perceived as its ‘religious successor,’ probably involving former associates.
Running as a Ransomware-as-a-Carrier (RaaS), RansomHub enforces strict associate agreements, and RansomHub enforces strict adherence to associate agreements, with non-compliance leading to bans and termination of partnerships. It gives a 90/10 ransom break up, Associates/Core Team.
Whilst claiming a world hacker neighborhood, RansomHub avoids concentrated on CIS international locations, Cuba, North Korea, China, and non-profits, displaying traits of a conventional Russian ransomware setup. Their avoidance of Russian-affiliated international locations and overlap with different Russian ransomware teams in centered corporations additional spotlight their most probably connections to Russia’s cybercrime ecosystem.
Cyberint’s August 2024 findings point out a low price fee: most effective 11.2% of sufferers paid (20 of 190), with negotiations continuously lowering calls for. RansomHub prioritizes assault quantity over price charges, leveraging associate enlargement to verify profitability, with the purpose of producing really extensive income over the years regardless of low person price luck.

Malware, Toolset & TTPS
RansomHub’s ransomware, evolved in Golang and C++, goals Home windows, Linux, and ESXi, prominent by means of its rapid encryption. Similarities to GhostSec’s ransomware counsel a pattern.
RansomHub promises loose decryption if associates fail to offer it post-payment or goal prohibited organizations. Their ransomware encrypts knowledge ahead of exfiltration. Doable ties to ALPHV are advised by means of assault patterns, indicating identical gear and TTPs might be used.
Sophos analysis highlights parallels with Knight Ransomware, together with Pass-language payloads obfuscated with GoObfuscate and similar command-line menus.
Fog Ransomware
Fog ransomware gave the impression in early April 2024, concentrated on U.S. instructional networks by means of exploiting stolen VPN credentials. They use a double-extortion technique, publishing knowledge on a TOR-based leak website online if sufferers do not pay.
In 2024, they attacked 87 organizations globally. An Arctic Wolf record from November 2024 confirmed Fog initiated a minimum of 30 intrusions, all by way of compromised SonicWall VPN accounts. Significantly, 75% of those intrusions have been related to Akira, with the remaining attributed to Fog, suggesting shared infrastructure and collaboration.
Fog essentially goals training, industry services and products, go back and forth, and production, with a focal point at the U.S. Apparently, Fog is without doubt one of the few ransomware teams that prioritize the training sector as their number one goal.

Fog ransomware has demonstrated alarming pace, with the shortest seen time from preliminary get admission to to encryption being simply two hours. Its assaults apply a standard ransomware kill chain, encompassing community enumeration, lateral motion, encryption, and knowledge exfiltration. Variations of the ransomware exist for each Home windows and Linux platforms.
IOCs
Kind | Price | Closing Statement Date |
IPv4-Addr | 107.161.50.26 | Nov 28, 2024 |
SHA-1 | 507b26054319ff31f275ba44ddc9d2b5037bd295 | Nov 28, 2024 |
SHA-1 | e1fb7d15408988df39a80b8939972f7843f0e785 | Nov 28, 2024 |
SHA-1 | 83f00af43df650fda2c5b4a04a7b31790a8ad4cf | Nov 28, 2024 |
SHA-1 | 44a76b9546427627a8d88a650c1bed3f1cc0278c | Nov 28, 2024 |
SHA-1 | eeafa71946e81d8fe5ebf6be53e83a84dcca50ba | Nov 28, 2024 |
SHA-1 | 763499b37aacd317e7d2f512872f9ed719aacae1 | Nov 28, 2024 |
SHA-1 | 3477a173e2c1005a81d042802ab0f22cc12a4d55 | Feb 02, 2025 |
SHA-1 | 90be89524b72f330e49017a11e7b8a257f975e9a | Nov 28, 2024 |
Area-Identify | gfs302n515.userstorage.mega.co.nz | Nov 28, 2024 |
SHA-256 | e67260804526323484f564eebeb6c99ed021b960b899ff788aed85bb7a9d75c3 | Aug 20, 2024 |
Lynx
Lynx is a double-extortion ransomware workforce that has been very lively in recent years, showing many victimized corporations on their web page. They state that they keep away from concentrated on govt organizations, hospitals, non-profit teams, and different crucial social sectors.


When they acquire get admission to to a gadget, Lynx encrypts recordsdata, appending the “.LYNX” extension. They then position a ransom be aware named “README.txt” in a couple of directories. In 2024 by myself, Lynx claimed greater than 70 sufferers, demonstrating their persevered process and critical presence within the ransomware panorama.

IOCs
Kind | Price | Closing Statement Date |
MD5 | e488d51793fec752a64b0834defb9d1d | Sep 08, 2024 |
Area-Identify | lynxback.professional | Sep 08, 2024 |
Area-Identify | lynxbllrfr5262yvbgtqoyq76s7mpztcqkv6tjjxgpilpma7nyoeohyd.onion | Sep 08, 2024 |
Area-Identify | lynxblog.web | Sep 08, 2024 |
IPv4-Addr | 185.68.93.122 | Sep 08, 2024 |
IPv4-Addr | 185.68.93.233 | Sep 08, 2024 |
MD5 | 7e851829ee37bc0cf65a268d1d1baa7a | Feb 17, 2025 |
What is to Are available 2025?
Because of the crackdown on ransomware teams, essentially the most new teams on file have gave the impression, in search of to make a reputation for themselves. In 2025, Cyberint anticipates a number of of those more moderen teams to strengthen their features and emerge as dominant gamers, now not simply RansomHub.
Learn Cyberint, now a Test Level Corporate’s 2024 Ransomware Document for the highest centered industries and international locations, a breakdown of the highest 3 ransomware teams, ransomware households price noting, newbies to the trade, arrests and information, and 2025 forecasts.