This section features information derived from almost 200 ransomware “shame sites” operated by double-extortion ransomware groups, 68 of which posted the names and information of victims from 2023. Cybercriminals use these sites to amplify pressure on victims who do not pay the ransom immediately. The data from these shame sites carries its own biases but still provides valuable insights into the ransomware ecosystem, which is currently the number one risk to businesses. The data presented below was collected for the period between January and December 2023.
Top Double-Extortion Ransomware Actors
In 2023, a total of 68 active ransomware groups reported they had breached the systems of and publicly extorted over 5,000 victims. This marks a substantial increase over past years. The ransomware events only intensified as 2023 went on. H2 recorded more than 2,800 victims compared to 2,200 in the first half of the year. Lockbit emerged as the most active during this period, responsible for 21% of the reported incidents with over 1,050 cases. Typically, threat actors grant victims a one-to-two-week grace period to meet the ransom demands. Victims who pay the ransom are not publicly exposed, which suggests that the actual number of victims could be significantly higher.
ALPHV, also known as BlackCat, targeted over 440 victims in 2023 and was the focus of a law enforcement operation. In December, a US-led operation resulted in the takedown of the group’s websites and the release of a decryption tool. According to CISA, since the beginning of its operations, the group compromised more than 1,000 victims and received ransom payments totaling nearly $300 million. The group has since resumed its criminal operation and its presence on the Dark Web.
CL0P’s activity is underrepresented in this count. In early June, CL0P exploited a zero-day vulnerability that allowed it to gain access to the MOVEit file-transfer software, leading to the compromise of over 2,600 organizations. Most of the victims’ identities were not disclosed on its shame site and therefore not included in the above count. CL0P also utilized alternative methods to further extort its victims. CL0P’s use of zero-day exploits this year also included an attack on GoAnywhere, which is detailed in another section of this report.
In terms of geographical distribution, 45% of the affected companies are situated in the United States, followed by the United Kingdom at 7%, and Canada, Germany, and Italy each at 4%. The presence of Russian victims on this list in 2023 can be attributed primarily to two actors: MalasLocker and Werewolves. Cyberattacks on entities from the former Soviet Union remain relatively infrequent. MalasLocker, active in the first part of 2023, adopted an unconventional approach by replacing traditional ransomware demands with requests for charitable donations.
When analyzing the industry sectors affected by ransomware attacks, data from the Check Point Threat Cloud highlights the education, government, and healthcare sectors as the primary targets. However, the ransomware victim landscape offers a different view. Manufacturing and retail sectors exhibit the highest number of victims, while government and education entities are positioned lower in the target hierarchy. In December 2023 alone, prominent companies like Coca-Cola Singapore (DragonForce), Nissan Motor Australia (Akira), Kraft Heinz (Snatch), Xerox (Inc ransom) were all claimed as victims by double-extortion ransomware groups.
The aforementioned discrepancy likely arises from differences in the willingness of these sectors to comply with ransom demands, with educational and governmental organizations being less inclined to make payments. These sectors are primarily targeted for the exploitation of their data, including personal and technical information, rather than for extortion-based attacks.