Ransomware Tactics Evolve Amid Declining Profits and Increased Data Theft
In 2025, the ransomware landscape underwent significant transformations. Once a lucrative criminal enterprise centered on encrypting victims’ data and demanding ransoms, this model faced substantial financial setbacks. Ransom payment rates plummeted to historic lows, average ransom demands decreased sharply, and organizations improved their recovery capabilities. Despite these challenges, cybercriminals have adapted their strategies, making their operations more resilient and their extortion tactics more complex.
Declining Ransom Payments and Changing Strategies
The financial downturn in ransomware operations is evident. In the fourth quarter of 2025, ransom payment rates reached unprecedented lows. Reports indicated that average ransom demands fell by one-third, dropping from $2 million in 2024 to $1.34 million in 2025. Additionally, nearly half of ransomware victims were able to restore their data from backups in 2024, a significant improvement from just 11% in 2022. This enhanced recovery capability has undermined the leverage that ransomware operators traditionally relied upon to secure payments.
Analysts from Google Cloud’s Threat Intelligence Group (GTIG) observed these evolving patterns through incident response investigations across various regions, including Asia Pacific, Europe, North America, and South America throughout 2025. Their findings revealed that the REDBIKE ransomware family emerged as the most prevalent, accounting for nearly 30% of all observed incidents. This marked a new peak, surpassing previous highs set by LOCKBIT and ALPHV, each of which reached 17% in 2023.
Disruption in the Ransomware Ecosystem
The ransomware ecosystem experienced significant upheaval in 2025. Major Ransomware-as-a-Service (RaaS) operations, including LockBit, ALPHV, Basta, and RansomHub, faced substantial setbacks due to law enforcement actions and internal conflicts. However, new groups like Qilin and Akira quickly filled the void, leading to a nearly 50% increase in victim posts on data leak sites compared to 2024. Notably, threat actors shifted their focus towards smaller organizations, moving away from large enterprises with robust defenses to target businesses with less mature security infrastructures.
Rise of Data Theft as a Primary Extortion Method
A significant shift in ransomware tactics was the increased emphasis on data exfiltration as a primary means of extortion. GTIG observed confirmed or suspected data theft in approximately 77% of ransomware incidents in 2025, a substantial rise from 57% the previous year. Attackers now commonly steal sensitive information before deploying encryption, threatening to release the stolen data publicly on leak sites if victims refuse to pay, even if they can restore their systems from backups.
To exfiltrate data from compromised environments, threat actors employed a combination of familiar and widely used tools, including Rclone, Mega, and various cloud storage services. This approach allows them to efficiently transfer large volumes of data while evading detection.
Adapting to the Evolving Threat Landscape
As ransomware actors continue to evolve their tactics, organizations must adapt their defense strategies accordingly. GTIG warns that declining ransom profits may drive some cybercriminals toward alternative income methods, such as conducting phishing campaigns through compromised infrastructure or monetizing access to victim environments in other ways.
To mitigate these evolving threats, organizations are advised to implement comprehensive endpoint hardening measures, establish robust containment protocols, and enhance their recovery preparedness. Following guidance from resources like the Ransomware Protection and Containment Strategies white paper can provide practical steps to bolster defenses against these sophisticated attacks.
Conclusion
The ransomware landscape is undergoing a significant transformation. While traditional encryption-based extortion methods are becoming less effective due to improved organizational defenses and declining ransom payments, cybercriminals are rapidly adapting. The rise in data theft as a primary extortion tactic underscores the need for organizations to remain vigilant and proactive in their cybersecurity efforts. By understanding these evolving threats and implementing comprehensive security measures, businesses can better protect themselves against the ever-changing tactics of ransomware actors.