Daily Ransomware Report – 11/26/2025

Estimated reading time: 4 minutes

Key Takeaways

  • Ransomware activity remains elevated in Q4, with Qilin, Akira, and BenZona as the most active groups.
  • Critical infrastructure and government entities, such as emergency alert systems and legal record authorities, are persistent targets.
  • Supply chain compromises continue to be a significant initial access vector for ransomware operations.
  • The emergence of AI-driven tools like WormGPT 4 and KawaiiGPT is lowering the technical barrier for threat actors, enabling rapid script generation and automated social engineering.
  • The Professional Services sector consistently experiences the highest number of reported incidents across multiple ransomware groups.

Table of Contents

Statistical Overview

Victim Totals

  • This day (24h): 38
  • This month: 641
  • This quarter: 1431
  • Year-to-date: 6855

Quarterly Breakdown

  • Q1: 2295
  • Q2: 1511
  • Q3: 1640
  • Q4: 1431

Ransomware activity remains elevated in Q4, with the current quarter’s victim count already surpassing Q2 and approaching Q3 totals. This sustained pressure is largely driven by groups like Qilin, Akira, and BenZona.

Dashboard showing daily ransomware report metrics and top groups

Introduction

The past 24 hours observed 38 new ransomware victims added to leak sites, indicating persistent global activity. Qilin, Akira, and BenZona were the most active groups, collectively accounting for over half of the reported incidents. Primary targets included professional services, legal, and automotive sectors, with the United States and Canada experiencing the highest concentration of attacks.

Ransomware Summary Table

# Group Victims (24h) Sample Victims Top Geos Top Sectors
1 Qilin 12 Arabia holding, Biopharma services, Burnham brown United States, Canada Professional Services, Real Estate
2 Akira 9 Bergeson, Dobco, Fineline architectural millwork United States, Canada Professional Services, Legal
3 BenZona 5 Dacia-ploiesti.ro, Mazda-ploiesti.ro, Poliserv.ro Romania, Côte d’Ivoire Automotive, Nonprofit
4 2 Cigam software corporativo ltda, Kewaunee scientific Brazil, United States Technology / Software, Manufacturing
5 DragonForce 2 Emond publishing, Healthcare retroactive audits Canada, United States Professional Services, Healthcare
6 1 Allervie health United States Healthcare
7 CyphBit 1 Church of the ascension anglican Canada Professional Services
8 1 National money mart company Canada Financial Services
9 INC_Ransom 1
10 LeakedData 1 Carlton fields United States Legal
11 Play News 1 Adc aerospace Australia Professional Services
12 Rhysida 1 Ags United States Transportation & Logistics

Qilin leads in reported victim counts, demonstrating a broad targeting scope across professional services and real estate in North America. Akira continues its focus on professional services and legal entities, predominantly in the United States and Canada. BenZona shows activity in the automotive sector within Romania and Côte d’Ivoire. Notably, the Professional Services sector remains a consistent target across multiple groups.

Notable targeting today includes the Georgia Superior Court Clerks’ Cooperative Authority (GSCCCA) by Devman, indicating a focus on public-sector institutions managing sensitive legal and real estate records. Additionally, the OnSolve CodeRED platform, a provider of emergency alert systems, was compromised by INC Ransom, underscoring persistent pressure on critical infrastructure.

Victim Distribution

By Country

Country Victims
United States 20
Canada 7
Romania 4
Germany 2
Australia 1

By Industry

Industry Victims
Professional Services 10
Automotive 4
Legal 4
Manufacturing 4
Technology / Software 4

The United States continues to be the primary geographic target, followed by Canada and Romania. Industry-wise, professional services firms consistently experience the highest number of reported incidents, suggesting a focus on organizations handling diverse client data or intellectual property.

Ransomware News

A dynamic threat landscape marks the past 24 hours, with critical infrastructure, government services, and supply chains under pressure while new AI tools lower entry barriers for cybercrime.

The Devman ransomware operation targeted the Georgia Superior Court Clerks’ Cooperative Authority (GSCCCA), forcing websites offline and claiming 500 GB of data exfiltration with a $400,000 ransom demand. Concurrently, the INC Ransom gang claimed responsibility for a cyberattack on OnSolve CodeRED, disrupting emergency notification systems and allegedly exfiltrating user data including clear-text passwords. CoinbaseCartel named Amcor, a global packaging firm, as a victim. Beast ransomware, also known as Gigakick, claimed to have stolen 150GB of patient data from Outback Pharmacies in Australia, including treatment plans and prescribed medicines. Qilin ransomware leveraged a South Korean MSP breach into a “Korean Leaks” data heist, impacting 28 financial-sector victims and exfiltrating over 2 TB of data. Separately, Scattered LAPSUS$ Hunters (SLSH) exploited Gainsight-linked Salesforce access via stolen OAuth tokens tied to a Salesloft Drift supply-chain attack, impacting an estimated 1,500 victims.

November 2025 featured a surge of multi-stage loaders and fileless campaigns, with XWorm delivering an in-memory loader via obfuscated JavaScript, and JSGuLdr delivering PhantomStealer through a three-stage chain. Phoenix Backdoor also appeared in targeted email campaigns. The emergence of WormGPT 4 and KawaiiGPT demonstrates a growing trend of AI-driven tools democratizing the generation of ransomware-capable PowerShell scripts and automating spear-phishing.

The confluence of direct critical infrastructure targeting, sophisticated supply-chain attacks, and the increasing accessibility of advanced attack tools through AI platforms represents a significant escalation in the threat landscape.

Technical Takeaways

  • Persistent targeting of critical infrastructure and government entities continues, as evidenced by attacks on emergency alert systems (OnSolve CodeRED) and statewide legal/real estate record authorities (GSCCCA).
  • Supply chain compromises remain a significant initial access vector, with incidents involving a South Korean MSP leading to clustered Qilin victimization and a Salesforce supply-chain attack impacting Gainsight.
  • The proliferation of AI-driven tools like WormGPT 4 and KawaiiGPT lowers the technical barrier for threat actors, enabling rapid generation of ransomware scripts and automated social engineering.
  • Multi-stage loaders and fileless execution chains, exemplified by XWorm and JSGuLdr, indicate a continued focus on stealthy and complex infection methods to evade detection.

About PurpleOps

PurpleOps operates at the intersection of cyber threat intelligence, ransomware tracking, and dark web research. Our Platform delivers real-time insights into ransomware operations, emerging CVEs, and underground economy dynamics.

Learn how we help organizations detect, prevent, and respond to ransomware threats:

FAQ

Q: What were the most active ransomware groups in the last 24 hours?

A: The most active ransomware groups reported in the last 24 hours were Qilin, Akira, and BenZona, collectively responsible for over half of the new incidents.

Q: Which sectors were primarily targeted by ransomware attacks recently?

A: Primary targets included professional services, legal, and automotive sectors. The professional services sector consistently shows the highest number of reported incidents.

Q: How has AI influenced the current ransomware threat landscape?

A: The emergence of AI-driven tools such as WormGPT 4 and KawaiiGPT is lowering the technical barrier for threat actors, enabling them to rapidly generate ransomware-capable PowerShell scripts and automate spear-phishing campaigns.

Q: What types of critical infrastructure were impacted by ransomware in this report?

A: Critical infrastructure targets included the Georgia Superior Court Clerks’ Cooperative Authority (GSCCCA), which manages sensitive legal and real estate records, and OnSolve CodeRED, an emergency alert system provider.

Q: How does PurpleOps help organizations combat ransomware?

A: PurpleOps provides services such as Cyber Threat Intelligence, Dark Web Monitoring, Protect Against Ransomware solutions, Penetration Testing, and Supply-Chain Security to help organizations detect, prevent, and respond to ransomware threats.