Tag: cybersecurity

  • Ransomware Report: February 2026 — 722 Attacks, 51 Active Groups

    Ransomware Report: February 2026 — 722 Attacks, 51 Active Groups

    In February 2026, the ransomware landscape continued to demonstrate significant activity and diversification. A total of 722 ransomware attacks were recorded, involving 51 distinct ransomware groups targeting victims across 63 countries. This sustained level of activity underscores the persistent threat ransomware poses to organizations worldwide, with attackers continuously adapting their tactics and expanding their reach.

    Most Active Groups

    The month saw a concentration of attacks by a few dominant ransomware groups. Qilin emerged as the most aggressive group, responsible for 114 victims, accounting for nearly 16% of all attacks in February. Close behind were thegentlemen and clop, who targeted 83 and 79 victims respectively. These three groups alone were responsible for almost 40% of all attacks, highlighting their operational scale and effectiveness.

    Other notable groups included akira with 47 victims and incransom with 40 victims. The presence of these groups in the top five active list indicates a competitive environment among ransomware operators, with each group continually seeking new victims and expanding their footprint.

    Several high-profile victims were linked to these groups, illustrating the broad range of targets ransomware actors are willing to pursue. For example, Pro-Plastics, North Andover Country Club (US), Schmuck Welt (DE), and Unibros Shipping (GR) were attacked by qilin. Other groups like alphalocker and everest also compromised significant companies such as www.pyramisgroup.com (GR) and UD Trucks (JP), respectively. The group vect was active in multiple countries, targeting organizations such as keliweb (IT), Casas del Mediterraneo (ES), and jdaas (IN).

    Geographic Distribution

    The United States remained the most targeted country by a wide margin, with 287 victims accounting for almost 40% of all ransomware attacks. This dominance highlights the US as a primary focus for ransomware operators, possibly due to the number of high-value targets and the potential for lucrative ransom payments.

    European countries also experienced significant ransomware activity. Germany (31 victims), Canada (30 victims), Italy (19 victims), and France (17 victims) rounded out the top five targeted countries. This geographic distribution suggests that ransomware actors continue to prioritize economically developed regions with substantial digital infrastructure. The presence of victims in countries like Greece, Israel, Japan, Spain, and India, as seen in notable cases, further indicates the global reach of ransomware campaigns.

    Sector Analysis

    Sector-specific targeting in February 2026 revealed some noteworthy patterns. Interestingly, the category labeled Not Found accounted for the largest number of victims, with 296 incidents. This likely represents cases where sector data was not publicly disclosed or victims fall outside traditional classification frameworks.

    Among identified sectors, the Technology sector was the most impacted, with 89 victims. This sector’s prominence is consistent with its critical role in the global economy and the valuable intellectual property it holds, making it an attractive target for ransomware groups.

    The Manufacturing sector followed with 60 victims, indicating that ransomware attacks continue to threaten operational technology environments, supply chains, and production continuity. The Healthcare sector was also targeted with 42 victims, maintaining its status as a high-risk sector due to the sensitive nature of patient data and the critical services it provides.

    Financial Services faced 38 ransomware incidents, reflecting the persistent threat to institutions managing sensitive financial data and transactions. This sector remains a lucrative target for attackers seeking both ransom payments and potential secondary gains through data theft.

    Outlook

    Looking ahead, the ransomware threat landscape is expected to remain dynamic and challenging throughout 2026. The continued dominance of groups like qilin, thegentlemen, and clop suggests that well-resourced and organized cybercriminal entities will maintain their operational tempo. Meanwhile, emerging groups such as akira and incransom may increase their activity, contributing to a more competitive and fragmented threat environment.

    The geographic distribution of attacks highlights the need for a global cybersecurity approach, with particular emphasis on bolstering defenses in the United States and across Europe. Organizations in the technology, manufacturing, healthcare, and financial services sectors should prioritize ransomware resilience, including improved detection, incident response, and backup strategies.

    Moreover, the substantial number of victims categorized as Not Found points to a gap in sector reporting and transparency. Enhanced sharing of incident details and victim sector information could aid in better understanding ransomware trends and tailoring defensive measures accordingly.

    In conclusion, February 2026 reaffirmed that ransomware remains a significant cybersecurity challenge, requiring coordinated efforts across industries and governments to mitigate its impact. Vigilance, proactive defense, and collaboration will be critical to reducing ransomware’s reach and effectiveness in the coming months.


    Data from Ransomware.live | Report generated with AI assistance

  • Cyberattack on Gemeinde Matten — March 2026

    Cyberattack on Gemeinde Matten — March 2026

    On the weekend of March 14-15, 2026, the ICT infrastructure of the Matten municipality in Switzerland came under a cyberattack. The attack targeted key municipal systems, resulting in the encryption of some data files. However, thanks to rapid response and robust security measures, the administration was able to maintain operations without interruption, and no data was stolen or published, according to an official statement from the Gemeinde Matten published by Radio BeO.

    The cyberattack affected the local government sector, specifically the administrative systems of the municipality of Matten bei Interlaken. While some files were encrypted during the incident, these were fully recovered without data loss. Importantly, critical systems such as the resident registry (Einwohner- und Fremdenkontrolle), business administration, and finance systems were reportedly never compromised. Throughout the incident, the municipal administration remained accessible to the public during regular hours both by phone and in person, ensuring continuity of essential services.

    Immediately after detecting the attack, Matten’s authorities involved external cybersecurity experts to restore affected systems, conduct a forensic analysis of the event, and secure evidence for further investigation. The Bern Canton Police (Kantonspolizei Bern) was informed promptly, and a criminal complaint was filed against unknown perpetrators. As of current reports, no ransomware group has claimed responsibility, and there is no confirmation of any data breach or exfiltration. The attack vector remains undisclosed, and officials have not provided additional details regarding how the attackers infiltrated the network.

    While the incident did not result in data theft or operational downtime, the municipality acknowledged a reputational impact and the significant effort required to restore and secure their systems. In response, Gemeinde Matten has implemented additional technical and organizational security measures, focusing on hardening their ICT infrastructure. Furthermore, ongoing employee training and cybersecurity awareness programs have been intensified to reduce the risk of future incidents.

    This event underscores the importance of preparedness and swift incident response within public administration environments. Organizations, especially those in the public sector, can draw several key lessons from Matten’s experience. First, maintaining regular backups and robust recovery procedures ensures that encrypted data can be restored without paying ransoms or suffering prolonged outages. Second, the rapid engagement of external cybersecurity specialists and law enforcement can significantly aid in mitigating damage and preserving forensic evidence. Third, continuous strengthening of security protocols and staff awareness are critical to reducing vulnerability to cyber threats.

    For municipal and similar organizations seeking to protect themselves, the following recommendations are prudent:

    • Implement comprehensive data backup strategies with offline or immutable copies to safeguard against encryption attacks.
    • Regularly update and patch ICT systems to close vulnerabilities that attackers could exploit.
    • Establish clear incident response plans that include coordination with external experts and law enforcement.
    • Conduct ongoing cybersecurity training programs to educate employees about phishing, social engineering, and other common attack vectors.
    • Perform routine security audits and penetration testing to identify and remediate weaknesses proactively.
    • Deploy layered security controls such as endpoint protection, network segmentation, and multi-factor authentication.

    The cyberattack on Gemeinde Matten serves as a reminder that even well-prepared public institutions remain targets for cybercriminals. Vigilance, preparation, and swift action remain vital components of effective cybersecurity defense.

    Sources: Radio BeO, https://www.radiobeo.ch/cyberangriff-auf-gemeinde-matten/


    Source: Kategorien: | Data from Ransomware.live | Generated with AI assistance