Ransomware Landscape Q3

Q3 Ransomware Landscape Report

Executive Summary

Q3 of 2022 has provided us with many interesting insights into the ransomware industry.

While the number of incidents this quarter slightly increased compared to the previous quarter. Instead of fairly wide distribution of victims between the various ransomware groups, we saw consistency from Lockbit3.0, as they remain the number one group with 37% of all ransomware attacks this quarter, an increase of 5% since the previous quarter, whereas they participated in “only” 29% of the ransomware incidents (Figure 1).

Top 10 ransomware families
Figure 1: Top 10 ransomware families

The shutting down of Conti, which was responsible for 14% of last Q’s incidents, did not result in the establishment of a new group, but rather led to a somewhat equal distribution of their share of the pie between all of the remaining groups.

USA remains the most targeted region followed by the UK, France, Spain and Germany, which were equally targeted (Figure 2).

Ransomware incidents distribution by country
Figure 2: Ransomware incidents distribution by country

Although it seems like the ransomware industry is owned by one family, we did see some new groups, and promising newcomers have emerged such as BianLian, IceFire, Sparta and the notorious Bl00dy gang.

The most interesting piece of data we were able to find this quarter is that even though we have seen over 85 new ransomware families being introduced to the industry, the number of documented victims is lower by 15% since Q2 and by around 30% compared to Q1.

In this report, we will cover the ransomware trends in targeted sectors and countries, along with the most important cases we have witnessed where ransomware groups were the attackers, but sometimes the victims as well, and how the newcomers will play a part in the future.



Q3 Notable Events and Developments

Lockbit3.0 Back In Shape

Q2 was a “slow” quarter for Lockbit3.0 with 204 incidents. As the group was mainly focusing on expanding and investing time and effort in their infrastructure, their victim count was relatively low. Q3, however, was a totally different story. They in a participated in an interview in July that claimed that they were announcing Lockbit3.0 updates and promised to strike hard in the near future. Promised and delivered. In Q3, the group was responsible for at least 227 incidents.

PR Investments

Lockbit3.0 is not just a ransomware group, they want to remind all of us that they are “the” ransomware group. In order to do so, they believe that being the number one group is not enough. So they also invested in becoming somewhat of a celebrity in the underground community, with PR and other gimmicks that their followers were more than happy to be part of.


Although Lockbit3.0 doesn’t operate any Twitter accounts like other threat groups, they do look to spread their message using other communication channels.

At the beginning of the quarter, a Lockbit3.0 member gave an interview to a cyber security magazine, talking freely about their exploits, describing the structure of the group, giving some success rate stats, and sharing their plans for the future.

Tattoo Campaign

Another Lockbit3.0 PR stunt was their tattoo campaign. The group offered $1000 to anyone getting a tattoo of their logo. As expected, a massive number of followers declared they would, or had already had a Lockbit tattoo done. In light of the massive response, the group had to publish another announcement that they were limiting the offer (Figure 3).

Lockbit’s announcement about limiting the tattoo campaign
Figure 3: Lockbit’s announcement about limiting the tattoo campaign

Bug Bounty Program

Lockbit3.0 is always looking to show how confident they are in their product. One way was by offering a bug bounty program to anyone finding vulnerabilities in their servers.

As expected, the bug bounty program has drawn the attention of many followers and researchers, who have risen to the challenge, leading to over $50,000 in bounties paid to pen testers, the group claims (Figure 4).

Lockbit’s announcement of the first bounty payout
Figure 4: Lockbit’s announcement of the first bounty payout

The confidence and arrogance of this notorious group gained them many followers, but a lot of enemies as well.

Lockbit3.0 Leak

Ever since Conti’s leaks, Lockbit claimed the ransomware throne without any intention of relinquishing it anytime soon.

Although business seems to be thriving for the ransomware group, an unknown threat actor, named Ali Quashji claimed that his group was able to compromise Lockbit’s servers and leaked the builder and keygen module of the group.

As the announcement was published on a dedicated Twitter account (Figure 5), many security researchers and cyber security figures from the community tried to validate the leak, and if it was the actual Lockbit products.

Ali Quashji Tweeting about the leak
Figure 5: Ali Quashji Tweeting about the leak

Eventually, it was confirmed that the published items are in fact used by Lockbit, although many community figures decided not to publish these tools to prevent others from using them for sinister ends.

As we all wait and see if this incident will have the “Conti effect” that will lead to Lockbit’s inevitable end, the group claimed that Ali Qushji was a contractor who did some jobs for them and participated in developing these tools. This is an important piece of information because it proves that no servers were compromised, which means that we are not expected to see massive leaks other than what has already been leaked.

As much as we would like to see this group fall, just as Conti did, this is not a similar situation, and this incident will not lead to the fall of the ransomware ruler.

Bl00dy Gang Uses LockBit3.0’s Tools

As much as many security figures tried to prevent these tools from getting into the wrong hands, one can only do so much, and, as expected, it didn’t take too much for other threat groups to utilize these tools in their own campaigns.

Bl00dy gang, a new group that emerged in September, is already responsible for several campaigns during their short existence. In the last several campaigns, the group was witnessed using the leaked Lockbit3.0’s builder against several organizations.

Given the simplicity and the customization options for whoever is using this builder, it is fairly predictable that Bl00dy gang might be the first, but certainly not the last to use it. New ransomware groups tend to utilize leaked builders instead of developing their own. We have witnessed this several times in Babuk and Conti leaks in the past, and this time is no different.

Negotiation In The Form Of DDoS

In the ransomware industry, negotiation usually includes both sides agreeing or disagreeing on the ransom payment, and that’s about it. This quarter, however, we have been made aware of peculiar incidents where negotiations went south in the most extreme way.

One of LockBit3.0’s many victims this quarter was Entrust, a company that provides software and hardware services to the financial sector. After relatively short negotiation talks, it seems like the victim and LockBit could not find common ground and LockBit reported that they suffered a DDoS attempt from Entrust – a peculiar choice of action by Entrust. But when people from the community were skeptical about the authenticity of the claim, LockBit provided proof of their servers logs (Figure 6) displaying the DDoS requests contained the content “DELETE_ENTRUSTCOM_MOTHERFUCKERS”.

Lockbit’s proof of Entrust’s DDoS attack
Figure 6: Lockbit’s proof of Entrust’s DDoS attack

Although we can’t know for sure whether Entrust initiated or hired someone to perform the DDoS, this is still an unusual event.

Another unique incident occurred as RagnarLocker compromised TAP Air Portugal (Figure 7). To their surprise, TAP Air demonstrated that they are no pushovers and retaliated with a DDoS attack on RagnarLocker’s servers.

RagnarLocker’s announcement of TAP Air Portugal attack
Figure 7: RagnarLocker’s announcement of TAP Air Portugal attack

In addition to RagnarLocker and Lockbit3.0, other groups including LV, Everest, Hive, BianLian, Quantum, Yanluwang and other were documented as being victims of various DDoS attacks.

Intermittent Encryption

The cat and mouse game between ransomware groups and security vendors push both sides to think of new creative ways to achieve their goals. Usually, the result is that the ransomware groups show us new techniques and TTPs we haven’t seen before.

Blackcat/ALPHV and BlackBasta provided us with a new encryption technique. After discovering that security vendors were able to identify their encryption module, these decided to improve their encryption mechanism so that for each file. BlackBasta is basing their new encryption module on file size where for files under 704 bytes they encrypt the whole file, for files that are less than 4KB they encrypt every 64 bytes and skip 192 bytes. For larger files, they encrypt 64 bytes but skip 128 bytes.

Blackcat uses a similar mechanism but they also provide configuration for the user to decide the form of byte-skipping patterns.

Using this technique, the encrypted files are still unreadable/corrupted on the one hand, but on the other hand, the process is quick and undetectable.

It is important to understand that all these small changes seem insignificant when it comes to the development of the module, but it could take weeks or even months until the security vendors identify and expand their products’ capabilities to identify and protect against this technique.

In addition, like many other businesses, it is highly likely that other ransomware groups will copy this mechanism for their campaigns in one form or another.


During Q3 2022, the Cyberint Research team identified over 85 new ransomware groups. Given the competitive and sophisticated skills threat group require in order to succeed in this field, obviously not all of them will become the next Lockbit3.0, but here are a few worth mentioning that we expect to see more of.


BianLian is a new ransomware group that emerged in mid-July and are looking to make a name for themselves.

The group has already managed to compromise at least 21 victims, mainly targeting North America. Given the strong start for the ransomware group, evidence suggests they have invested a lot in strengthening their C&C servers infrastructures and are currently looking to build a better technical foundation.

What makes BianLian versatile is their cross-platform support, which means they are able to target all kinds of assets in the victim’s environment. Their main product is written in GoLang, which more and more threat groups are using for developing their malware (not necessarily ransomware).

Previous campaigns suggest that the group is looking to compromise front-facing instances such as the SonicWall VPN and Microsoft Exchange Server.

The group’s operational flow usually involves leveraging access they’ve gained through installing a Web shell or Ngrok payload. In addition, the group regularly utilizes living off-the-land techniques to achieve lateral movement and monitor network activities.

When it comes to staying undetected in the encryption phase, BianLian uses the relatively new technique used by many other groups. Like others, BianLian often executes the encryption module in Windows Safe Mode, which allows the module to run silently and remain undetected by the various security vendors. The pre-encryption phase includes deleting snapshots and backup files.

In the ransomware industry, it takes time and consistency to become a massive threat. BianLian has achieved a lot in its first three months, and if they’re able to keep up with the big league’s groups, they might become a solid and very threatening ransomware group in the first half of 2023.


IceFire is an unusual ransomware family that has emerged this quarter and targeted victims from less “popular” countries such as Turkey, Pakistan, and Morocco.

Of the three ransomware families we chose to highlight in this report, IceFire has claimed to compromise the highest number of victims − 46. When it comes to sectors, IceFire is also diverse, targeting a range of sectors such as finance, IT, education, and manufacturing.

This new ransomware group publishes all its victims with the “Description” tab that indicates if the victim has already paid or not.

Oddly enough, the names of the victims are published in what seems to be generated strings (Figure 8), so the only way for us to know who the actual victim is if the victim decided not to pay. In this case, the victim’s domain appears in the “Description” tab mentioned.

IceFire Onion site
Figure 8: IceFire Onion site

IceFire seems to be new but skilled with a lot of room to grow. They try to have their own unique style and to separate themselves from “normal ransomware groups”. It seems like their skill might help them stay consistent in the industry for a while.


Sparta is one of the newest ransomware groups that emerged in mid-September. The group has already claimed at least 13 victims, mainly focusing on Spain.

Some speculations suggest that Sparta is a rebrand, or at least contains, former REvil members, given the basic layout of their leak site.

The group operates an onion page where they publish all of their victims. Given the fact that the group is mainly initially focusing on Spain, we can conclude that this region is where they feel most comfortable.

Like other new groups, Sparta has gained much attention in underground forums, both from the members who are advertising the group at any given opportunity and from Telegram and forum admins who talk about and promote the group.

When it comes to targeted sectors, it seems that Sparta doesn’t only focus on one sector, and is looking to cover as many sectors as possible.

The group hasn’t been documented in big-name campaigns so far, but in observing their product, we see that they are still at the point where they are constantly growing and developing foundations for their RaaS (Ransomware as a Service) members.

Although Sparta has less traction and “noise” around them compared to IceFire and BianLian, they have the potential to act as a solid threat actor in the ransomware industry that might not contest the “big leagues”, it is still capable enough to cause some real damage to their victims.


During 2022, so far we have seen a consistent decline in the number of ransomware campaigns from quarter to quarter. The reason for this decline is the disappearance of the experienced groups such as Conti, REvil and PYSA, and the birth of new, inconsistent or immature groups that are still building their own legacy and foundation.

This situation leaves only one veteran, Lockbit3.0, as the group that leads the ransomware industry by a margin, and contrary to the rest of the industry, keeps on growing its victim count.

This decline provides temporary comfort given that once these fairly new groups establish themselves better professionally, we should see the numbers we are used to seeing from Q1, and even higher.

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start