DEV Community

DeepSeaX
DeepSeaX

Posted on

Ransomware Payment Rate Drops to Record Low in 2026 Amid Surge in Attacks

Ransomware Payment Rate Drops to Record Low in 2026 Amid Surge in Attacks

In 2026, the ransomware landscape saw a significant shift with only 28% of victims paying threat actors, an all-time low, marking a downward trend observed for the past four consecutive years according to blockchain intelligence platform Chainalysis. Despite this, the number of claimed attacks has surged significantly. This article delves into what happened, the technical breakdown, detection strategies, and mitigation steps to combat this evolving threat.

What Happened

The total on-chain ransomware payments in 2025 were recorded at $820 million, with predictions suggesting it could approach or exceed $900 million. This stability in the total number of payments contrasts with a 50% year-over-year increase in ransomware attacks. The payment rate was more than double in 2024, at 62.8%, and 78.9% in 2022. This data aligns with previous reports by Coveware, indicating a steady decline in victim payment rates throughout 2025.

Technical Breakdown

Some of the factors influencing the ransomware economy include improved incident response, regulatory scrutiny, international law enforcement actions, and market fragmentation. Despite a decline in aggregate revenue from ransomware activity, the median ransom payment rose significantly, up 368% from $12,738 in 2024 to $59,556 in 2025. This indicates that victims are paying larger amounts in the hope that cybercriminals will delete the stolen data and not sell it to other threat actors or trade it.

Detection & Hunting

To detect and hunt for ransomware, it is crucial to monitor for the following Indicators of Compromise (IOCs):

  • Network Traffic: Unusual outbound connections, especially to known C2 servers.
  • File Modifications: Sudden changes in file permissions and creation of new suspicious files.
  • Process Anomalies: Unfamiliar processes running with elevated privileges.

A practical YARA rule to detect suspicious activity could look like this:

rule Ransomware_IOC {
  strings:
    $a = "encrypted_file"
    $b = "pay_us"
  condition:
    any of them
}
Enter fullscreen mode Exit fullscreen mode

Mitigation Steps

To mitigate ransomware attacks, organizations should:

  • Implement robust incident response plans.
  • Regularly backup data and ensure backups are not connected to the network.
  • Patch systems promptly to protect against known vulnerabilities.

Attacker Perspective

From a red team perspective, the focus should be on identifying and exploiting weak points in an organization's security posture. This could involve social engineering to gain initial access or utilizing automated tools to scan for vulnerabilities.

Conclusion

The ransomware landscape in 2026 is evolving, with fewer victims paying but larger ransoms being demanded. Organizations must adapt their incident response plans and security measures to counter these threats.


Need help assessing your exposure? Request a free penetration test — currently in open beta.

Top comments (0)