Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2434 articles · 106129 vulns · 38/41 feeds (7d)
← Back to list
EST
PRE-CVE

Ransomware Tactics in 2025: Blending with Legitimate Activity

56% confidence

Description

The article discusses trends in ransomware attacks, emphasizing attackers' use of legitimate access methods (e.g., RDP, PowerShell, PsExec) to avoid detection. It highlights phishing as a primary initial access vector (40% of cases) and notes the challenges of distinguishing malicious activity from normal operations. Key ransomware groups like Qilin, Akira, and Play are mentioned, along with sector-specific targeting patterns.

Related News (1 articles)

Tier C
Cisco Talos6h ago
Ransomware in 2025: Blending in is the strategy
→ No new info (linked only)
CISA KEV❌ No
Actively exploited❌ No
PublishedMar 31, 2026
Last enriched5h ago
Tags
ransomwaretacticsphishinglateral-movement
Trending Score20
Source articles1
Independent1
Info Completeness2/14
Missing: cve_id, vendor, product, versions, cvss, epss, cwe, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: reported
Confidence: 56%

Vulnerability Timeline

CVE Published
Mar 31, 2026
Discovered by ZDM
Mar 31, 2026