Ransomware & Malware

3 Ransomware Gangs Behind 40% of Attacks

Picture this: three ransomware crews unleashing chaos on 40% of last month's attacks. Qilin leads the pack at 20%, while the US eats over half the blows.

Bar chart of top ransomware groups' share in March 2026 attacks, Qilin leading at 20%

Key Takeaways

  • Three groups—Qilin, Akira, Dragonforce—drove 40% of March's 672 ransomware attacks.
  • US organizations bore 52% of the brunt, highlighting persistent targeting.
  • Expect consolidation: top gangs absorbing affiliates, predicting mega-threats ahead.

Qilin strikes again. Another victim down, data encrypted, demands soaring. That’s your March ransomware attacks in a nutshell—three gangs owning 40% of the mess.

Check Point’s fresh data drops the bomb: 672 incidents last month, up from February. Not shocking, right? But here’s the kicker—Qilin at 20%, Akira 12%, Dragonforce 8%. The rest? Scattered small fry.

Qilin: King of the RaaS Hill?

These guys aren’t newbies. Active since 2022, Quilin’s been bulking up affiliates since early ‘25. Remember Asahi, the beer behemoth? They got hammered last year. Disruptive? Understatement. Now they’re disclosing victims like it’s a trophy wall.

It’s RaaS—ransomware as a service—for the win. Affiliates do the dirty work, Qilin cashes in. Smart. Scary. And damn effective.

“Attackers continue refining precision, timing, and targeting, exploiting seasonal cycles, emerging technologies, and operational blind spots,” said Check Point research.

Precision. That’s the word. Not spray-and-pray anymore.

But let’s call BS on the endless “evolving threat” spiel. We’ve heard it for a decade. Ransomware’s persistent because companies treat it like a bad flu—pop a patch, call it good.

Akira’s Speed Demon Act

Akira? 12% slice. Emerged 2023, already swimming in extorted millions. Windows, Linux, ESXi—no OS safe. Lately, they’re loving business services and manufacturing.

Get this: full attack in under an hour. Compromise to chaos. Researchers spilled that tea recently. It’s not just fast—it’s surgical.

Hundreds of millions paid out. That’s not a glitch; that’s a business model. And we’re the customers footing the bill.

Short para for emphasis: Your backups better be air-gapped.

Akira’s evolution screams one thing: lazy IT shops are chum in the water. Patch Tuesday? Skip it at your peril.

Dragonforce Rides the Wave

Dragonforce grabs 8%. Newer kid, but accelerating. Check Point pins it on slurping up RansomHub’s leftovers—those affiliates jumped ship. Plus, social engineering spikes. Phishing your way to payday.

Absorption. Like ransomware cartels merging turf. Sound familiar? Think drug lords consolidating after a bust. History rhymes—disrupt one group (cough, LockBit takedown), watch the power vacuum fill fast.

That’s my hot take: expect more of this. Top dogs eating the mid-tier. By year’s end, maybe two mega-gangs rule 60%.

Why the US? 52% of Victims

Half the attacks—52%—slam US orgs. Worldwide, 47 groups prowled. But America? Prime real estate.

Seasonal cycles, tech blind spots—Check Point nails it. But c’mon, it’s deeper. Overreliance on legacy crap, underfunded SecOps, that “it won’t happen to us” vibe. (Spoiler: it will.)

Organizations worldwide felt the sting, sure. But US dominance? It’s the fat target with deep pockets.

Is Ransomware Finally Unstoppable?

A decade in, and we’re still here. Attacks more disruptive, costlier, harder to unwind. Patches, MFA, resourced teams—duh, Check Point preaches the gospel.

But here’s the acerbic truth: most won’t listen till the servers melt. Boards chase quarterly profits over zero-days. Security? Lip service.

Dry humor alert: If ransomware were a band, it’d be the Rolling Stones—old, reliable, packing stadiums (your data centers).

Unique insight time. Remember 2017’s WannaCry? Global panic, patches flew. Fast-forward—same holes, new names. Prediction: 2026 ends with a “super-ransomware” from these three merging codebases. Governments scramble, insurers bail.

Why Does This Matter for Your CISO?

You’re the CISO reading this. Or should be. Three groups did 40%. Imagine the intel gap if you’re flying blind.

Steps? Patches yesterday. MFA everywhere—no exceptions. Drill your team on phishing (Dragonforce says hi). And backups—test ‘em. Quarterly.

But don’t stop. Hunt threats proactively. EDR ain’t decor; use it.

Corporate hype check: Check Point’s report? Solid data, zero fluff. Unlike vendor whitepapers promising the moon.

Wander a sec: I once audited a firm post-ransomware. Backups? Corrupted. MFA? “Too annoying.” Six months dark. Don’t be them.


🧬 Related Insights

Frequently Asked Questions

What are the top ransomware groups in 2026? Qilin (20%), Akira (12%), Dragonforce (8%) dominated March attacks per Check Point.

How many ransomware attacks hit the US last month? Over 50%—that’s 52% of 672 global incidents targeted US organizations.

Can companies stop Qilin ransomware? Patch fast, enforce MFA, air-gap backups, and monitor for social engineering. But vigilance is key—no silver bullet.

Elena Vasquez
Written by

Senior editor and generalist covering the biggest stories with a sharp, skeptical eye.

Frequently asked questions

What are the top ransomware groups in 2026?
Qilin (20%), Akira (12%), Dragonforce (8%) dominated March attacks per Check Point.
How many ransomware attacks hit the US last month?
Over 50%—that's 52% of 672 global incidents targeted US organizations.
Can companies stop <a href="/tag/qilin-ransomware/">Qilin ransomware</a>?
Patch fast, enforce MFA, air-gap backups, and monitor for social engineering. But vigilance is key—no silver bullet.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by InfoSecurity Magazine

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.