Home / Industry

A Look Back at the Top 10 Ransomware of 2025

Back in March 2025, we investigated the DNS footprint of what were dubbed 2025’s up and coming ransomware families—RansomHub, LockBit 3.0, Play, Akira, Hunters, Medusa, BlackBasta, Qilin, BianLian, and INC Ransom (aka Lynx). We now looked back at last year’s actual threat landscape and discovered that six of them actually made Picus Security’s top 10 ransomware list—Qilin, Akira, Play, INC Ransom, Lynx, and RansomHub.

Take a look at brief descriptions of the 10 ransomware featured in this report below, along with the links to the reports we obtained lists of network IoCs from below.

RANKRANSOMWAREDESCRIPTIONIoC SOURCEDATE PUBLISHED
1QilinAlso known as “Agenda” and uses advanced techniques, cross-platform variants, and alliances with other major threat groupshttps://www.trendmicro.com/vinfo…12/31/25
2AkiraRaaS that emerged in March 2023 that targeted 250+ organizations worldwidehttps://thedfirreport.com/2025/...08/07/25
3Cl0pOften targets the critical infrastructure, financial, and government sectors using encryptionless tactics to steal data and demand ransoms without encrypting fileshttps://theravenfile.com/2025…11/04/25
4PlayKnown for infiltrating companies via exposed RDP servers and exploiting vulnerabilitieshttps://unit42.paloaltonetworks…05/18/25
5INC RansomKnown for highly aggressive, rapid, and targeted attacks against enterprises in the healthcare, manufacturing, education, and government sectors primarily in North America and Europehttps://www.trendmicro.com/vinfo…01/15/26
6SafePayOperates with a centralized non-RaaS model and frequently executes attacks within a 24-hour window using double-extortion tacticshttps://www.acronis.com/en/tru…07/08/25
7LynxWidely considered a rebranded and more advanced variant of INC Ransom that focuses on double extortion tactics targeting SMBs and large organizations across sectors primarily in the U.S. and the U.K.https://thedfirreport.com/2025/...11/19/25
8RansomHubKnown for operating as a cartel, it lets affiliates keep up to 90% of the ransom payment, attracting experienced threat actorshttps://thedfirreport.com/2025/...07/01/25
9DragonForceOperates by leasing to affiliates who conduct attacks through double-extortion tacticshttps://www.acronis.com/en/tru…11/05/25
10Babuk2Suspected to be led by the actor known as “Bjorka,” it uses the notorious Babuk brand to perpetrate extortion through recycled datahttps://www.rapid7.com/blog/post…04/02/25

With the aid of the WhoisXML API MCP Server, we extracted domains from the subdomains identified as IoCs and weeded out those that belonged to legitimate entities, did not leave DNS traces behind, and were only accessible via the Dark Web. After that, we were left with 267 network IoCs comprising 28 domains, 236 IP addresses, and three email addresses for our analysis, which led to these discoveries:

  • One domain identified as an IoC bulk-registered with eight look-alikes
  • Three domains classified as IoCs likely registered with malicious intent
  • 2,626 unique potential victim IP addresses communicated with 40 distinct IP addresses tagged as IoCs
  • 8,491 email-connected domains, 36 of which were deemed malicious
  • Nine additional IP addresses, eight of which were dubbed malicious
  • 713 IP-connected domains, 75 of which were named malicious
  • 324 string-connected domains, two of which were categorized as malicious

A sample of the additional artifacts obtained from our analysis is available for download from our website.

Divulging More Discoveries about the Domain IoCs Related to 6 Ransomware

Note that while we collated 29 domains identified as IoCs for analysis for six of the top 10 ransomware, one domain was tagged as an IoC for two ransomware variants.

We began our investigation by scouring the Typosquatting Data Feed for signs of the 28 domains. We discovered that the domain simplerwebs[.]world connected to INC Ransom was bulk-registered with eight look-alikes on 3 January 2025.

Next, we sought to find out if any of the 28 domains were likely registered with malicious intent from the get-go. We discovered that three domains related to Akira were tagged as malicious 15—37 days before they were reported as such on 7 August 2025. Here are more details about them.

DOMAIN IoCFIRST WATCH DATENUMBER OF DAYS BEFORE THE REPORT DATE
2rxyt9urhq0bgj[.]org07/01/2537
ev2sirbd269o5j[.]org07/09/2529
ijt0l3i8brit6q[.]org07/23/2515

We then queried the 29 domains on WHOIS API and learned that:

  • They were created between 8 November 2018 and 25 February 2026. Note that the oldest and news domains were both associated with a single ransomware—INC Ransom.
  • They were administered by 11 registrars.

  • While six domains did not have registrant countries on record, the remaining 23 were registered in seven countries.

DNS Chronicle API queries for the 28 domains revealed that they recorded 2,728 historical domain-to-IP resolutions over time. Take a look at more information on five domains with the oldest resolution dates below.

RANSOMWAREDOMAIN IoCNUMBER OF DOMAIN-TO-IP RESOLUTIONSDATES SEEN
Cl0pin2pay[.]com22902/06/17—03/12/26
Cl0ppubstorm[.]com11602/06/17—01/25/26
Akiraangryipscanner[.]org11406/02/17—06/04/25
Cl0phe1p-center[.]com6111/04/17—05/06/25
Akiraopmanager[.]pro5908/24/18—06/16/25

It is interesting to note that the five domains with the oldest resolution dates above were also affiliated with two of the oldest ransomware variants that made the top 10. Cl0p has been around since 2019 while Akira has been active since 2023.

Investigating the IP IoCs Connected to 8 Ransomware

The reports connected to eight of the top 10 ransomware also identified 236 IP addresses as IoCs.

Sample network traffic data from the IASC revealed that 2,626 unique potential victim IP addresses under 166 distinct ASNs communicated with 40 of the IP IoCs between 15 February and 16 March 2026

We then queried the IP addresses on Bulk IP Geolocation Lookup and found out that:

  • They were geolocated in 33 countries. And it is worth noting that four of the geolocation countries were also named as registrant countries of some of the domains tagged as IoCs.
  • While 122 IP addresses did not have ISPs on record, the remaining 114 were administered by 39 ISPs.

DNS Chronicle API queries for the IP addresses showed that 160 recorded 25,643 IP-to-domain resolutions over time. Here are more details for five examples.

RANSOMWAREIP IoCNUMBER OF IP-TO-DOMAIN RESOLUTIONSDATES SEEN
Cl0p46[.]161[.]27[.]1132702/05/17—10/29/22
INC Ransom212[.]83[.]137[.]9465002/05/17—10/21/25
RansomHub164[.]138[.]90[.]225802/05/17—08/25/24
Qilin176[.]113[.]115[.]20922311/01/20—01/17/26
Akira109[.]205[.]195[.]2117207/02/25—08/04/25

Interestingly, all of the IP addresses with the oldest resolution dates were connected to the oldest ransomware in the top 10 list—Cl0p.

Evaluating the Email IoCs Associated with 3 Ransomware

We also collated three email addresses affiliated with three ransomware for this study.

Our checks via the WhoisXML API MCP Server revealed that two were worth avoiding all forms of communication with specifically because they contained the names of two notorious ransomware—Qilin and Babuk. They also showed that none of them were used to register any domain, hence they will no longer appear in the next steps of our analysis.

According to our prompt results, for instance, while the email address named as an IoC qilin@exxxxxx[.]im was correctly formatted and not a catch-all, disposable, or free email address, the SMTP check showed it could not currently receive mail, meaning the mailbox may not be active or blocks SMTP verification. Also, while it was not necessarily tagged as malicious, users should note that Qilin is a well-known RaaS group. As such, the username “qilin’ could indicate it belongs to an actor operating in cybercriminal circles likely on or affiliated with the group.

Amassing New Artifacts Affiliated with the Top 10 Ransomware of 2025

For this step, we only focused on the 28 domains and 236 IP addresses identified as IoCs.

First, we queried the domains on WHOIS History API and discovered that 16 had 49 email addresses in their historical WHOIS records. Further scrutiny showed that 12 were public email addresses.

Our Reverse WHOIS API queries for the public email addresses led to the discovery of 8,491 unique email-connected domains after those already tagged as IoCs were filtered out.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign