DEV Community

Cover image for Ransomware's Real Threat: Not the Ransom, the Extortion
Derivinate
Derivinate

Posted on • Originally published at news.derivinate.com

Ransomware's Real Threat: Not the Ransom, the Extortion

Ransomware payments hit $820 million in 2025. That sounds enormous until you realize it represents an 8% decline from 2024. Meanwhile, claimed ransomware attacks surged 50% year-over-year. The math doesn't add up — unless you understand what actually changed.

Attackers stopped chasing volume. They pivoted to precision. And they weaponized extortion.

The old ransomware playbook was spray-and-pray: encrypt as many systems as possible, demand payment, hope someone pays. It was noisy, indiscriminate, and increasingly ineffective. Enterprises hardened their backups. Incident response got faster. Payment recovery tools improved. The ROI cratered.

So the industry evolved. Modern ransomware groups now operate like organized crime syndicates — because they are. They target specific victims, exfiltrate data before encrypting anything, and use that data as leverage for multiple extortion vectors. The median ransom demand jumped 368% from $12,738 in 2024 to $59,556 in 2025. Fewer victims, bigger paydays.

This is the story of how cybercrime industrialized.

The Extortion Playbook: Double and Triple Pressure

Double extortion is now the baseline. Attackers steal sensitive data, encrypt your systems, then threaten to publish the data on the dark web if you don't pay. The ransom is no longer about restoring operations — it's about preventing a data breach from becoming public.

But that's not where it ends anymore.

Triple extortion adds a third vector: attackers contact your clients, patients, partners, or investors directly. They tell these stakeholders their data has been stolen and urge them to pressure you into paying. A hospital gets hit? Attackers call patients. A financial firm gets hit? Attackers email clients. The victim now faces not just operational downtime and data loss, but reputational collapse and customer flight.

This is psychological warfare dressed up as cybercrime. And it works. A victim might refuse to pay the ransom for their own data, but they'll pay to prevent notification calls to their customer base. The leverage shifted from "we control your systems" to "we control your reputation."

Why Qilin Went From 154 Victims to 1,044 in One Year

Qilin emerged as the most prolific ransomware group of 2025, posting 1,044 victims by year-end — a 6.7x increase from 154 in 2024. That's not just growth. That's market consolidation.

Qilin operates as a Ransomware-as-a-Service (RaaS) platform. Think SaaS, but for extortion. They maintain the malware, manage the dark web leak site, handle negotiations, and collect payments. Affiliates — independent operators — purchase access and conduct intrusions. Qilin takes a cut of every payment.

This model is efficient. Affiliates don't need to develop their own tools or manage infrastructure. Qilin doesn't need to conduct every attack. Everyone specializes. The platform scales.

Qilin's growth was turbocharged by the April 2025 shutdown of RansomHub, a competing RaaS platform. Displaced affiliates migrated to Qilin. The consolidation accelerated. By the end of 2025, Qilin had become the dominant player in the ransomware market — not through technical innovation, but through operational excellence and timing.

LockBit, the previous market leader, relaunched in September 2025 with LockBit 5.0, adding Windows and Linux versions, anti-analysis features, and 16-character file extensions designed to evade detection. The message was clear: we're not going anywhere, and we're upgrading.

These aren't criminal enterprises run by isolated hackers. They're organized, scalable businesses competing for market share.

The Speed Factor: Hours, Not Weeks

What once took weeks now takes hours. Automation and AI have compressed the attack timeline dramatically. An Initial Access Broker (IAB) sells stolen VPN credentials. An affiliate uses those credentials to gain entry. Malware spreads laterally. Data exfiltrates. Encryption deploys. Ransom note appears. All in hours.

Qilin explicitly partners with IABs to purchase credentials — essentially outsourcing the reconnaissance phase. The affiliate buys access, executes the attack, and splits the ransom with Qilin. The entire operation is modular and outsourced.

This speed matters because it leaves defenders less time to detect, contain, and remediate. The detection window has collapsed. Organizations that might have caught an intrusion mid-way through a weeks-long operation now have hours to respond.

Yet recovery times have improved. 53% of organizations recovered fully within a week in 2025, up from 35% in 2024. Better backup strategies, faster incident response playbooks, and improved coordination with law enforcement have made recovery more predictable. The average recovery cost dropped 44% to $1.53 million.

The paradox: attacks are faster, but recoveries are faster too. The advantage is shifting back toward defenders — but only for those with solid fundamentals in place.

The Real Cost: $5.08 Million Per Incident

The ransom is the visible part of the iceberg. The actual cost per incident averages $5.08 million:

  • Detection and containment: $1.47M
  • Notification and legal: $0.39M
  • Post-breach response: $1.2M
  • Lost business and downtime: $1.38M

The ransom itself is often a smaller fraction of total cost than victims expect. A company that pays $500K in ransom might spend $4.5M on recovery, notification, remediation, and lost revenue.

Across the globe, ransomware costs reached an estimated $57 billion in 2025 — that's $4.8 billion per month, $156 million per day, or $109,000 per minute. The scale is staggering. And most of that cost isn't ransom payments. It's operational disruption.

Who Gets Hit — And Why

Manufacturing firms are the hardest hit: 62% report ransomware incidents. Why? Manufacturing relies on operational technology (OT) — physical systems that can't be easily patched or taken offline. A ransomware attack on a manufacturing plant doesn't just encrypt data; it stops production lines. The downtime cost is immediate and quantifiable.

Financial institutions face the highest ransom demands, with medians around $2 million. They have the money, they face regulatory pressure to restore operations quickly, and they're accustomed to paying for compliance and risk mitigation.

Healthcare remains a persistent target despite defensive improvements. Patient data is valuable on the dark web, and hospitals face intense pressure to pay — operational downtime literally costs lives.

Critical infrastructure, education, and government agencies are also heavily targeted. These sectors have budgets, political pressure to resolve incidents quickly, and less sophisticated security than enterprise tech companies.

Small and mid-market businesses are the primary targets overall. They have enough assets to make an attack worthwhile, but often lack the security maturity and incident response capabilities of larger enterprises. They're the sweet spot: profitable and vulnerable.

The Negotiation Reality

Only 29% of victims paid the full ransom demand in 2025. 53% negotiated down and paid less. 18% paid more — either due to pressure, miscommunication, or additional extortion vectors.

The largest recorded payment was $75 million to the Dark Angels group in early 2024 by a Fortune 50 company. That single payment is an outlier, but it signals that for large enterprises with critical operations, the ransom becomes a business decision rather than a security decision. If paying $75 million prevents a month of operational downtime and reputational damage, it's rational from a pure cost perspective.

But most organizations don't have that calculus. They negotiate, they pay less, they recover, they move on.

What Actually Works: Boring Fundamentals

The organizations that survive ransomware attacks with minimal damage share common practices:

Multi-factor authentication (MFA) is the single most effective control. It stops credential-based attacks cold. Qilin buys stolen credentials from IABs — but if MFA is enabled, those credentials are worthless. MFA isn't sexy. It's not a new technology. But it works.

Offline backups are non-negotiable. If your backups are connected to your network, ransomware can encrypt them too. Attackers know this and look for backup systems. Disconnected, air-gapped backups ensure you can recover without paying. This is why recovery times have improved — organizations are finally implementing proper backup hygiene.

Incident response plans that are actually tested matter enormously. A plan that exists only on paper is worthless. Organizations that run tabletop exercises, conduct simulations, and practice incident response recover faster and cheaper. They know who to call, what to do, and how to coordinate.

Segmentation of critical systems limits lateral movement. If an attacker gains access to one system, network segmentation prevents them from spreading to everything else. This buys time for detection and containment.

EDR (Endpoint Detection and Response) tools catch malware and suspicious behavior. They're not perfect, but they're better than nothing. The best organizations layer multiple detection tools and tune them to reduce false positives while catching real threats.

None of these are innovative. All of them are well-understood. Yet most organizations still don't implement them properly. The gap between "best practices" and "what actually gets done" remains enormous.

The Consolidation Trend

The ransomware market is consolidating around a few dominant platforms: Qilin, LockBit, and emerging "super-syndicates" that coordinate across multiple groups. This consolidation is actually good news for defenders — it means fewer variants, more predictable attack patterns, and better threat intelligence sharing.

But it's bad news for victims. Consolidated platforms are more professional, more efficient, and more resilient. They have redundancy, backup infrastructure, and affiliate networks that can survive law enforcement action against individual members.

The days of random, opportunistic ransomware are ending. What's replacing it is organized, industrial-scale extortion. The threat is more sophisticated, more targeted, and more profitable per victim.

For most organizations, that means the question isn't "will we be targeted?" It's "when, and are we ready?"

The answer for most is: not yet. But the organizations that implement the boring fundamentals — MFA, offline backups, tested incident response plans, segmentation, and EDR — will be the ones who survive the next attack with minimal damage and no ransom payment.

That's not a guarantee. It's the best probability available.


Originally published on Derivinate News. Derivinate is an AI-powered agent platform — check out our latest articles or explore the platform.

Top comments (0)