What’s in Each Brief?
• Active ransomware groups: A ranked table of the most active groups with victim counts and month-over-month changes. The top 10 groups typically account for more than half of all victims.
• Targeted countries: Which countries saw the most attacks and which ones entered the top ten for the first time. Victims typically span 70+ countries each month.
• Targeted industries: Victim counts by sector so you can benchmark your own exposure. The rankings shift month to month, so last month’s safe sector can be this month’s top target.
• New and growing groups: Groups that appeared recently or scaled fast. The ransomware landscape turns over quickly, and today’s top ten often includes groups that didn’t exist a year earlier.
• Weekly breakdowns: Attack volume by week so you can see whether activity spiked or stayed steady throughout the month.
• Fake and inflated claims: We call out scam operations and exclude them from the data. Not every leak site post is real, and we flag the ones that aren’t.
• Methodology: How we collect and count the data from ransomware groups’ own leak sites. Numbers reflect publicly claimed victims, not confirmed breaches.
Every report includes tables and percentages you can drop into a board deck or security review without extra formatting.

Why Track Ransomware Trends Monthly?
Benchmark Your Industry’s Risk
Spot New Groups Early
Share Data With Leadership
Trusted by Fortune 500 Security Teams and MSSPs Worldwide
Our team uses Breachsense data to gain initial access during pen testing and red team engagements. The API is simple to use and the support is always helpful and responds quickly.
Our Security Colony platform relies on Breachsense data as part of our dark web monitoring service. The data is continuously updated and high quality. Highly recommend!
We rely on Breachsense for a lot of data. Their frequent database updates, constant availability, and handling of big and small breaches alike means we are always covered.
Frequently Asked Questions
Breachsense publishes a new threat brief every month, covering the previous month’s ransomware activity. Reports are typically available within the first few weeks of the following month.
The data comes from Breachsense’s continuous monitoring of ransomware groups’ own leak sites. These are dark web pages where groups publicly list victims who haven’t paid. The numbers reflect claimed victims, not confirmed breaches.
Yes. The reports are public and designed to be shared. Each one includes tables with victim counts by group, country, and industry that you can use in security reviews or board presentations.
Most ransomware groups buy stolen credentials from infostealer malware logs rather than breaking in themselves. There’s often a gap of days to weeks between when credentials are stolen and when ransomware gets deployed. Monitoring for leaked credentials can help you catch and reset them before attackers use them.
Claimed victims are companies listed on ransomware groups’ leak sites. Some claims are exaggerated or duplicated across groups. The actual number of attacks is higher than what we report because many victims pay before being listed publicly.
Breachsense tracks over 100 ransomware groups. In January 2026 alone, 58 distinct groups were active. The number changes monthly as new groups appear and older ones go quiet.
Related Resources
Context for the data in our threat briefs
Ransomware Reports Archive
Browse all monthly and annual ransomware reports from Breachsense.
Learn MoreRansomware Gangs
Profiles of active ransomware groups, including their tactics and targeting patterns.
Learn MoreDark Web Monitoring
How Breachsense monitors criminal marketplaces and leak sites for your compromised data.
Learn MoreInfostealer Malware
How credential-stealing malware works and why it’s the top initial access vector for ransomware.
Learn MoreDark Web Monitoring Methodology
How Breachsense collects, verifies, and indexes data from dark web sources.
Learn MoreEnterprise Response Playbook
Step-by-step workflows for responding to credential exposures and breach alerts.
Learn More







