Blog

Ransomware Activity Report from 7th September - 13th September 2025

Author

Reinvent Security

Posted: September 15, 2025 • 5 min Read

Reports

Ransomware Activity Report from 7th September - 13th September 2025

Between September 7 and 13, 2025, our threat intelligence monitoring recorded a dramatic increase in ransomware activity, with 136 confirmed victims. This is a significant increase from the previous week and demonstrates the continuing threat from ransomware groups. A new and aggressive group, Thegentlemen, emerged and rose to the top of the list, claiming more victims than any other group. The Manufacturing industry returned to the top spot as the most targeted while the United States still experienced the majority of the attacks.

RANSOMWARE THREAT LANDSCAPE OVERVIEW

The leadership of the ransomware-as-a-service (RaaS) market has been highly dynamic. A new and aggressive group, Thegentlemen, emerged and took the top spot with 32 victims, displacing groups that had dominated previous weeks. Akira and Play also maintained a strong and consistent presence, with 17 and 15 victims respectively, solidifying their position as significant actors in the contemporary threat landscape. The fact that the groups appear again at the top of the list highlights the unstable and highly competitive nature of the RaaS ecosystem.

report

The Manufacturing Industry regained its spot as the most targeted, with 35 of the total victims, which further demonstrates the continued attraction of sensitive operational data and intellectual property for ransomware groups. The Business Services and Technology sectors also experienced significant activity, with 23 and 20 victims, respectively, underscoring their persistent appeal as targets due to their interconnected supply chains and valuable data assets.

url

Geographically, the United States remained the epicenter of ransomware attacks, claiming a disproportionate share of attacks with 66 victims. This consistent trend solidifies the country's status as a prime and very profitable target for ransomware attackers. Other countries like France (7 victims) and Canada (6 victims) were also severely affected, illustrating a global outreach for these sophisticated attacks.

url

OBSERVATIONS

  • The most significant observation during the reporting period was the emergence and rapid ascent of Thegentlemen ransomware group. This is characteristic of the dynamic Ransomware-as-a-Service (RaaS) landscape where affiliates can readily switch to platforms that are more profitable.
  • The Manufacturing Industry returned as the most-targeted. This is not a coincidence, as manufacturing organizations are deemed high-value targets because any disruption to their operations will incur significant financial losses and reputational damage, making them vulnerable to paying the ransom.
  • The week also saw a high-profile attack against a government agency, the Republica De Panama Ministry of Economy and Finance, by the Incransom group, which indicates a growing threat to government agencies. This could have serious consequences, including undermining national security.
  • The week also saw an attack on recoveryransomwareindonesia.com, a service provider that claims to help victims recover from ransomware attacks. This serves as a public display of dominance within the cybercriminal underworld. It sends a clear message that no one, not even those who offer security, is safe from these threat actors.

RECOMMENDATIONS

  • Organizations should develop a well-defined incident response plan. This plan should include not only technical recovery steps but also communication and public relations strategies to manage the reputational fallout.
  • Organizations should implement a strong foundational security posture now more than ever. This involves implementation of Multi-Factor Authentication (MFA), exhaustive patch management, vulnerability scans, and robust identity and access control.
  • Organizations should leverage real-time threat intelligence on the ransomware groups' TTPs (Tactics, Techniques, Procedures), to ensure early detection.
  • Organizations in the targeted industries must undertake a detailed security control audit with a focus on protecting core operating technology and intellectual property.
  • Organizations in the United States should consider additional protective measures, such as enhanced monitoring of network traffic and a comprehensive incident response plan, to mitigate the higher risk of attack.
  • Organizations should constantly assess the security posture of suppliers and partners because supply chain compromises are the becoming a common way for threat actors to gain access.
  • Organizations should practice timely sharing of attack data among industry peers to improve situational awareness and defense coordination.