Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

Ransomware ain’t what it used to be

Cyber threats evolve as technologies and criminal opportunities advance, reshaping the way attackers operate. Nothing stays static. Recently, we have seen changes in the way ransomware cybercriminals operate that demand a reevaluation of defenses to reduce the risk of a damaging attack.

Ransomware has undergone a decades-long transformation, starting with distribution via floppy disks and demands for payment via the mail, but only became a widespread threat once cryptocurrencies allowed for anonymous online payments. Since that time, it has matured, hitting corporate networks and government systems, where encryption and extortion demands soared in scope and sophistication.

The new wave: Escalating volume and shifting tactics

The findings from Zscaler’s latest ransomware research report shine a spotlight on the sheer acceleration of attacks and the shift in how operators are coercing victims. Between April 2024 and April 2025, Zscaler’s cloud services blocked nearly 11 million ransomware attempts—a staggering 146% increase year-over-year and seven times the volume recorded in 2021.

While many attacks are successfully prevented, ransomware operators remain devastatingly effective. Over 7,000 victims globally were identified from dark web-hosted ransomware leak sites last year, with more than half of the victims based in the United States. The 3,671 U.S. incidents mark a twofold increase from the year prior.

This surge in ransomware activity isn’t limited to North America. Each of the top 15 targeted countries saw significant increases, from a 30% rise in Mexico to a 436% increase in Israel, most likely geopolitical targeting.

Country Ransomware Attacks (2024 Report) Ransomware Attacks (2025 Report) Percentage Increase
United States 1,821 3,671 101.60%
Canada 128 377 194.50%
United Kingdom 216 333 54.20%
Germany 149 260 74.50%
India 60 199 231.70%
Italy 118 181 53.4%
France 119 159 33.6%
Australia 73 152 108.2%
Brazil 57 149 161.4%
Spain 62 134 116.1%

Top 10 Countries by Number of Victims and Growth 2024 – 2025.

One of the most striking trends in these attacks is the pivot away from conventional file encryption tactics. Instead, ransomware groups are now focusing on stealing sensitive information—financial records, intellectual property, customer data—and threatening public exposure as leverage to secure hefty payments. 

In some cases, criminal groups are no longer encrypting data at all. Now, the real disruption caused by ransomware lies not in the loss of operational functionality, but in the erosion of trust, reputation, and compliance in victim organizations.

The rise of autonomous ransomware operations

Cybersecurity experts have long predicted that AI would significantly aid attackers in their attempts to breach networks. It can assist in reconnaissance of targets, finding vulnerable devices on a network, creating exploit code, and help deliver attacks via tailored phishing emails. 

However, a recent discovery by Anthropic, the company behind the Claude AI chatbot, highlights just how far some attackers have come: the use of fully automated, agentic AI tools to carry out large-scale extortion operations with minimal human intervention.

In a blog post, Anthropic reported a cybercriminal leveraged Claude Code, an AI model designed for coding, to orchestrate ransomware attacks that were entirely autonomous. Like other widely available generative AI platforms, Claude Code provides both legitimate benefits and a significant opportunity for misuse. 

Seventeen victims across healthcare, emergency services, government offices, and religious institutions were targeted simultaneously. AI handled every stage of the operation, from reconnaissance and credential harvesting to network penetration and determining ransom amounts. This fully automated system even crafted ransom notes with demands for payments up to $500,000 that displayed on victim machines.

The accounts misusing the service were banned following discovery of the attack, but the implications are sobering. Autonomous ransomware allows cybercriminals with limited technical skills to achieve high-impact results, reshaping the landscape of cybercrime. What once required resources, teamwork, and expertise can now be conducted simply with access to generative AI tools. The ability to scale attacks and target multiple organizations concurrently raises the potential for exponential growth in ransomware activity. The hacker abusing Claude Code is unlikely to have stopped their activities, but rather will have simply moved to other tools.

Volume, speed, and impact: The scale of the problem

Let’s break it down: AI has lowered the barriers to entry for ransomware campaigns, enabling attackers to scale operations far beyond what human-driven efforts could manage. Where conventional ransomware operations might require weeks or months of planning and execution for each attack, AI’s capabilities allow operators to target multiple victims simultaneously, with autonomous systems performing both tactical and strategic decision-making. And as technical expertise becomes less critical, the pool of cybercriminals capable of mounting these attacks will grow, including actors who previously lacked the skillsets to conduct them manually.

Organizations of all shapes and sizes are going to have to quickly adapt to this new reality or face repeated compromises. 

What it means for cybersecurity leaders

Ransomware defense strategies that worked even a few years ago are insufficient against these new methods of extortion and the scalability made possible by generative AI. Enterprises cannot rely on past experiences to address future threats.

For CIOs, CISOs, and IT leaders, combating ransomware must become a core component of corporate risk management and enterprise resilience. Proactive thinking and a willingness to challenge conventional strategies are imperative to keep pace with attackers.

To defend against the next evolution of ransomware, organizations must reprioritize and refine their security measures:

  • Minimize external attack surface: Move to a Zero Trust architecture to better secure digital assets. Identify and mitigate vulnerabilities. Strengthen controls to prevent attackers’ ability to spread deeper within networks. 
  • Prevent compromise: Combining Zero Trust with AI makes it possible to detect and stop ransomware or malware, including attacks driven by AI, before systems are compromised.
  • Eliminate lateral threat movement: Use AI-generated adaptive segmentation to give full visibility into user activity and application traffic and prevent attackers from moving from a compromised endpoint to sensitive assets.
  • Prevent data loss: Deploy Zscaler Data Loss Prevention technology to detect and block attempts at data exfiltration. This is especially critical for organizations operating in high-value target sectors.

Emerging stronger from a shifting landscape

The ransomware challenges of 2025 are shaping business risks across industries in ways that can’t be ignored. Enterprises that elevate their defenses, embrace cutting-edge AI-driven solutions, and position cybersecurity as a board-level priority will emerge resilient—not just safeguarding their organizations, but proving their ability to protect operations, safeguard customer trust, and maintain leadership in an increasingly volatile cyber landscape.

To learn more about the latest research into evolving ransomware tactics, download Zscaler’s 2025 Ransomware Report now.


Read More from This Article: Ransomware ain’t what it used to be
Source: News

Category: NewsSeptember 5, 2025
Tags: art

Post navigation

PreviousPrevious post:일문일답 | “속도가 곧 혁신” 라쿠텐 CIO가 밝히는 ‘스피드, 스피드, 스피드’ DNANextNext post:5 critical questions every organization should ask before selecting an AI-Security Posture Management solution

Related posts

オプトインからオプトアウトへ―次世代医療基盤法が変えた医療データのルール
December 13, 2025
AI ROI: How to measure the true value of AI
December 13, 2025
Analytics capability: The new differentiator for modern CIOs
December 12, 2025
Stop running two architectures
December 12, 2025
法令だけでは足りない―医療情報ガイドラインと医療DXのリアル
December 12, 2025
SaaS price hikes put CIOs’ budgets in a bind
December 12, 2025
Recent Posts
  • オプトインからオプトアウトへ―次世代医療基盤法が変えた医療データのルール
  • AI ROI: How to measure the true value of AI
  • Analytics capability: The new differentiator for modern CIOs
  • Stop running two architectures
  • 法令だけでは足りない―医療情報ガイドラインと医療DXのリアル
Recent Comments
    Archives
    • December 2025
    • November 2025
    • October 2025
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.