GuidePoint Security announced today the release of the GuidePoint Research and Intelligence Team’s (GRIT) annual Ransomware & Cyber Threat Report.
The GRIT 2026 Ransomware & Cyber Threat Report provides exclusive in-depth research, insights and analysis on a year of record-breaking ransomware activity, examining who cybercriminals are targeting (and why), the top tactics threat actors are using and how shifting ransomware group dynamics are redefining the threat landscape.
Findings from this year’s report include:
- Ransomware victim numbers hit a new all-time high. 2,287 ransomware victims were posted in Q4 2025 alone — the largest number recorded in a single quarter since the report’s inception.
- The number of threat groups has reached record levels. 124 distinct ransomware groups were active in 2025, the highest ever recorded and a 46% year-over-year increase.
- The United States remains a top geographic target for ransomware attacks. In 2025, more than half (55%) of ransomware victims were based in the U.S.
- A new RaaS leader has emerged. Qilin’s activity levels in 2025 were the highest of any group ever observed.
- The Manufacturing industry was most heavily impacted by ransomware, accounting for 14% of attacks. The Technology (9%) and Retail/Wholesale (7%) industries followed closely behind.
- High ransomware activity levels should continue in 2026. December 2025 was the most active month for claimed ransomware victims on record with 814 successful attacks — a 42% year-over-year increase.
The report also explores the growing use of AI in ransomware attacks, examines the impact of zero-day vulnerabilities on ransomware and takes an in-depth look at major ransomware operators throughout the year, including an analysis of ransomware payments made to the Qilin and Akira groups.
The GRIT 2026 Ransomware & Cyber Threat Report is based on data obtained from publicly available resources, vendor threat research, internal incident response case data and open-source intelligence collected from illicit forums and marketplaces.
0APT – Scam Ransomware Group – No Evidence Victims Impacted By Threat Actors
Posted in Commentary with tags GuidePoint on February 9, 2026 by itnerdGuidePoint Security today released new research which assesses with high confidence that the victims claimed by “0APT” are a blend of wholly fabricated generic company names and recognizable organizations that threat actors have not breached.
At a high level, the report focuses on a new “scam” ransomware group, 0APT, which emerged as a Data Leak Site in late January 2026 and quickly claimed 200+ victims within a week – but GuidePoint Research and Intelligence Team (GRIT) finds these claims are largely fabricated.
GRIT has observed no evidence that these victims were impacted by a threat actor associated with “0APT”, including through first-hand reporting.
0APT is likely operating in this deceptive manner to extort uninformed victims, re-extort historical victims from other groups, defraud potential affiliates, or garner interest in a nascent RaaS group. GRIT cannot rule out the possibility that 0APT or associated actors may conduct real attacks in the future.
After security reporting emerged highlighting the number of victim organizations and implausible or fabricated organization names, the Data Leak Site went offline on Feb 8, before returning on Feb 9, with a much narrower slate of 15+ very large multinational organizations.
Alleged victims of 0APT should consider activating internal investigative procedures, but are advised that in the absence of a ransom note, encrypted files, or any form of communication from the group, their post on 0APT is almost certainly entirely fabricated rather than representative of an undetected intrusion.
You can read the new research here: https://www.guidepointsecurity.com/blog/gritrep-0apt-and-the-victims-who-werent/
Leave a comment »