Blog

Ransomware Activity Report from 28th September - 4th October 2025

Author

Reinvent Security

Posted: October 06, 2025 • 4 min Read

Reports

Ransomware Activity Report from 28th September - 4th October 2025

Between September 28 and October 4, 2025, our threat intelligence service recorded a surge in the volume of ransomware attacks with 193 victims recorded globally, the highest we have seen in recent times. This represents an 85.6% increase from the previous week's figure of 104. The ransomware group Shinyhunters led the charts with 39 recorded victims, the Manufacturing industry was the most affected while the United States remained the top-targeted country with 108 victims.

RANSOMWARE THREAT LANDSCAPE OVERVIEW

There was a notable surge in ransomware activity during the reporting period, with 193 victims recorded, up from 104 in the previous week. The leadership of the RaaS ecosystem experienced a major shift with unanticipated groups taking the top spots. Shinyhunters led with 39 victims followed by Sinobi (24 victims). Akira and Qilin remained part of the top 5 active groups with 21 and 18 victims each.

report

The most targeted industry was Manufacturing, with 30 recorded victims followed by Consumer Services with 27 victims. The Technology industry also witnessed a high number of attacks with 21 recorded victims.

url

Geographically, the United States remained the epicenter of ransomware activity, 108 recorded victims. This figure accounts for 56% of the total victim count. Other countries like Canada, United Kingdom and Germany followed with 11, 8 and 7 victims respectively.

url

OBSERVATIONS

  • Notable Volume Spike:The 85.6% increase in activity to 193 victims is a large, dynamic spike, reflecting a coordinated shift back to high-volume attacks following a brief reduction.
  • New RaaS Leaders: The dominance of Shinyhunters and Sinobi signifies a widespread disruption and power shift in RaaS operations. This suggests very successful, recent recruitments or operation drives by such new leaders.
  • Widespread Industry Targeting: The move of Consumer Services into the second position, with Manufacturing and Technology in the top two, shows that threat actors are targeting any industry with valuable information or high-priority operations.
  • Extreme US Concentration: The The alarming escalation of attacks on the United States reiterates that the nation is the most profitable and preferred target, as noted previously regarding its wealth concentration and willingness to pay.

RECOMMENDATIONS

  • Organizations should develop a well-defined incident response plan. This plan should include not only technical recovery steps but also communication and public relations strategies to manage the reputational fallout.
  • Organization should develop a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location.
  • Organizations should implement a strong foundational security posture now more than ever. This involves implementation of Multi-Factor Authentication (MFA), exhaustive patch management, vulnerability scans, and robust identity and access control.
  • Organizations should leverage real-time threat intelligence on the ransomware groups' TTPs (Tactics, Techniques, Procedures), to ensure early detection.
  • Organizations in the targeted industries must undertake a detailed security control audit with a focus on protecting core operating technology and intellectual property.
  • Organizations in the United States should consider additional protective measures, such as enhanced monitoring of network traffic and a comprehensive incident response plan, to mitigate the higher risk of attack.
  • Organizations should constantly assess the security posture of suppliers and partners because supply chain compromises are the becoming a common way for threat actors to gain access.
  • Organizations should practice timely sharing of attack data among industry peers to improve situational awareness and defense coordination.