
This edition of the Bitdefender Threat Debrief covers the latest developments in the ransomware threat landscape, including an update on LockBit’s move to the Top 10, the Coinbase Cartel’s recent activities, a thwarted BreachForums comeback, and more.
As ransomware continues to evolve, our goal with this monthly Bitdefender Threat Debrief is to help you stay ahead of the curve. To do this, we combine information from openly available sources (OSINT) - things like news reports and research – with data we gather by analyzing Data Leak Sites (DLSs), websites where ransomware groups post details about their victims. It is important to remember that we can't independently verify all of these claims but are confident in the trends we see over time.
For this month's report, we analyzed data from December 1 to December 31 and recorded a total of 839 claimed ransomware victims, which was the second largest number of claimed victims of any month in 2025.
Featured Story: LockBit is Back LockBit returned to the list of Top 10 Ransomware Groups in December, claiming 112 victims. This was a significant milestone for LockBit, which suddenly fell from the Top 10 list in October 2024 and failed to claim any victims at all from June to November 2025. This period of inactivity may be due to changes in infrastructure or allowing time to expand the internal team and affiliate network.
The group’s victims were hit with the LockBit5 ransomware variant, and the main industry targets in December included manufacturing, technology, and construction. The group also targeted other industries like transportation, financial services, and healthcare.
LockBit’s reputation has been both up and down over the years. It took a significant hit following Operation Cronos, which disrupted the group’s operations in 2024. LockBit tried to rebuild its reputation by announcing a 2025 collaboration with the Qilin and DragonForce ransomware groups. However, this may have been more talk than action, and many security researchers remain skeptical that this was a legitimate ransomware alliance amongst the three groups.
And while ransomware groups frequently compromise organizations, they are sometimes targeted themselves, and LockBit is no exception. Details on LockBit’s infrastructure, including their domains and an IP address, have already been leaked. That’s why some security researchers are questioning the longevity of the group’s return and the effectiveness of their operations, which are marked by a history of OPSEC (operational security) deficits.
One helpful development for defenders is that one of the tools LockBit incorporates into its attacks has been identified. The tool, SmokeLoader, has been used by groups like Qilin and ALPHV for several years. This suggests that LockBit lacks the resources needed to incorporate (and develop) a broader range of toolsets into attacks.
Like other ransomware, LockBit5 has iterations to use against different hosts, including Windows, Linux, and VMware ESXi servers. As groups such as LockBit continue to prioritize hypervisors specifically, it is important to ensure that security practices to protect against such threat actors are implemented. The most essential practices include updating hypervisor and related management platforms, implementing a tested, quality backup and recovery plan, and adopting an attack surface reduction solution to identify and mitigate threats as they move across the environment in real time.
Now, let’s explore some other notable news and findings since the last Threat Debrief.
Here are the top 10 most active ransomware groups:
Bitdefender's Threat Debrief analyzes data from ransomware data leak sites, where groups publicize their claimed number of compromised organizations. This approach provides valuable insights into the overall activity of the RaaS market. However, there is a trade-off: while it reflects attackers' self-proclaimed success, the information comes directly from criminals and may be unreliable. Additionally, this method only captures the number of victims claimed, not the actual financial impact of these attacks.
Here are the top 10 countries where ransomware groups victimized organizations:
Ransomware gangs prioritize targets where they can potentially squeeze the most money out of their victims. In many cases, this means focusing on developed countries with higher projected growth rates. Threat actors may also execute strategic attacks that unfold during geopolitical conflicts or periods of social unrest.
Here are the Top 10 industries affected by ransomware attacks. Manufacturing was hardest hit:
Ransomware gangs may target organizations in critical infrastructure sectors, select other organizations that offer services tailored to consumers, or attack organizations that fall into both categories. Understanding the trends and ramifications associated with specific industries, and how specialized services and clientele are impacted is crucial for assessing risk.
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and research from the previous month. Don’t miss the next BDTD release, subscribe to the Business Insights blog, and follow us on X.. You can find all previous debriefs here.
Bitdefender provides cybersecurity solutions and advanced threat protection to hundreds of millions of endpoints worldwide. More than 180 technology brands have licensed Bitdefender technology and added it to their product or service offerings. This vast OEM ecosystem complements telemetry data already collected from our business and consumer solutions. To give you some idea of the scale, Bitdefender Labs discover 400+ new threats each minute and validate 30 billion threat queries daily. This gives us one of the industry’s most extensive real-time views of the evolving threat landscape.
We would like to thank Bitdefenders Stefan Hanu, Mihai Leonte, Gabriel Macovei, and Andrei Mogage for their help putting this report together.
tags
Jade Brown is a threat researcher at Bitdefender. A cybersecurity thought leader who is passionate about contributing to operations that involve cybersecurity strategy and threat research, she also has extensive experience in intelligence analysis and investigation.
View all postsDon’t miss out on exclusive content and exciting announcements!