CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Shifting ransomware tactics toward built-in Windows utilities as payment rates decline

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Ransomware operators increasingly rely on native Windows utilities and built-in tooling to evade detection amid declining ransom payments and heightened defensive measures. Initial access frequently leverages stolen credentials (21%) and exploited vulnerabilities in VPNs and firewalls (33%), while lateral movement predominantly uses RDP (85%), SMB, and SSH. Data theft accompanies 77% of attacks, with victim shaming via leak sites rising despite reduced payment rates. The ecosystem’s disruption—driven by law enforcement, crowded actor competition, and improved recovery—has pushed adversaries toward ‘evasion through normalcy,’ reducing reliance on signatured tools like Cobalt Strike Beacon (2% in 2025 vs. 11% in 2024) and Mimikatz (18% in 2025 vs. 20% in 2024).

Timeline

  1. 17.03.2026 23:41 1 articles · 3h ago

    Ransomware actors pivot to native Windows tooling amid declining payment rates

    Analysis of 2025 ransomware incidents shows adversaries increasingly leveraging built-in utilities (PowerShell, RDP, SMB, SSH) and reducing reliance on signatured tools like Cobalt Strike Beacon and Mimikatz. Initial access vectors remain dominated by credential theft and VPN/firewall exploits. Data theft accompanies 77% of attacks, while leak site activity surges despite payment decline to 20% of victims.

    Show sources

Information Snippets