AI is the new insider
AI-driven attacks are accelerating identity compromise. New 2026 threat data shows why identity and access management now defines cybersecurity resilience.
Read More
Ransomware became famous for encryption, but it’s going through a shift with serious consequences for victims: data theft increasingly arrives before the locks go on. Darktrace’s Annual Threat Report 2026 describes ransomware incidents in the Americas where adversaries include pre-encryption data exfiltration – a pattern that supports double extortion, and in some cases triple extortion.
For cybersecurity practitioners, that sequence changes what ‘containment’ means. You can halt encryption and restore backups. But stolen data keeps generating risk across weeks and months: regulatory scrutiny, customer notification, legal action, follow-on fraud, and recurring extortion attempts.
The model rewards attackers who treat operations like a supply chain. Access, movement, exfiltration, encryption, negotiation, monetisation – each step can be delivered by specialists.
The same Darktrace Americas section makes it clear why certain sectors feel the squeeze. Manufacturing accounts for 17% of all recorded incidents in the region, and it represents 29% of recorded ransomware incidents.
That is, at least in part, because manufacturing brings a set of extortion-friendly conditions:
Attackers know that business leaders in these environments calculate impact in hours, not quarters.
Darktrace’s regional breakdown is valuable, because it shows extortion behaving like an economic system – adjusting to what works.
In Latin America, the report notes a rapid shift from traditional ransomware to data-leak extortion and information-stealing malware, with a focus on credential theft and sensitive data exfiltration. Even when encryption happens, the leverage often comes from exposure and pressure rather than access to a decryption key.
In Africa, the report points to fast growth and high consequences. Darktrace states ransomware increased 60% year-over-year, ransomware-related activity accounted for 39% of incidents, and data exfiltration appeared in 25% of cases. The same section identifies phishing as a leading entry point at 43%. These are the ingredients of a repeatable business model: low-cost entry, scalable operations, monetisation through disruption and exposure.
Thales supplies a statistic that explains why extortion works so well in cloud-heavy environments: only 47% of sensitive cloud data is encrypted.
Encryption doesn’t prevent theft in every scenario, and it doesn’t eliminate all forms of misuse. But it does change the economics. Plaintext data gives attackers immediate leverage, and it widens the set of victims affected by the incident to include customers, partners, employees, and regulators.
The same Thales report also points to operational risk as a recurring breach contributor: misconfiguration or human error is cited as the most common cause by 28% of respondents whose organisation experienced a data breach. That kind of failure mode feeds extortion – because attackers hunt for the easiest path to readable data.
IBM’s X-Force reporting shows how crowded the extortion market has become. A 49% increase in active ransomware groups versus 2024, and 109 ransomware extortion groups identified in 2025 (up from 73 in 2024).
More groups mean more variability. Some operators run careful intrusions, and others run noisy smash-and-grab campaigns. But the aggregate result still looks the same for victims: heightened frequency, shortened timelines, and pressure applied through multiple channels.
For cybersecurity practitioners, there are some key learnings here to integrate into your ransomware protection and response planning:
Modern ransomware behaves like a market for leverage. You can reduce exposure by treating data as an asset that needs constant protection – and by planning response around long-tail pressure, rather than short-term recovery.
Join the newsletter to receive the latest updates in your inbox.
AI-driven attacks are accelerating identity compromise. New 2026 threat data shows why identity and access management now defines cybersecurity resilience.
Read More
OT cybersecurity took a hit in 2025 as threat groups mapped control loops and targeted distributed energy – shrinking the gap between access and physical impact.
Read More
Ransomware now reaches full encryption in just three hours. Analysis of Barracuda and Securin data reveals how Akira and others are accelerating attacks.
Read More