<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Ransomware Tracker</title><description>Ransomware Intelligence — Groups, TTPs, Victims</description><link>https://ransomware-tracker.pages.dev/</link><language>en-us</language><item><title>Black Basta — The Ransomware Group That Thinks Like a Penetration Tester</title><link>https://ransomware-tracker.pages.dev/articles/black-basta-group-profile/</link><guid isPermaLink="true">https://ransomware-tracker.pages.dev/articles/black-basta-group-profile/</guid><description>Black Basta has established itself as one of the most technically capable ransomware operations active in 2025-2026. This profile covers their origins, TTPs, affiliate structure, and the distinctive intrusion patterns that distinguish their campaigns from commodity ransomware operators.</description><pubDate>Fri, 22 May 2026 00:00:00 GMT</pubDate><category>group-profile</category><category>Black Basta</category><category>black-basta</category><category>ransomware</category><category>qakbot</category><category>cobalt-strike</category><category>double-extortion</category><category>windows</category><category>esxi</category><category>RaaS</category></item><item><title>LockBit 4.0: Resurgence After Operation Cronos</title><link>https://ransomware-tracker.pages.dev/articles/lockbit-4-resurgence-2026/</link><guid isPermaLink="true">https://ransomware-tracker.pages.dev/articles/lockbit-4-resurgence-2026/</guid><description>Following the February 2024 law enforcement takedown, LockBit has re-emerged as LockBit 4.0 with hardened infrastructure, a new encryptor, and a reformed affiliate program targeting mid-market enterprises.</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>group-profile</category><category>LockBit</category><category>LockBit</category><category>RaaS</category><category>law enforcement</category><category>encryptor</category><category>rebranding</category></item><item><title>RansomHub: Anatomy of the Dominant RaaS Affiliate Program</title><link>https://ransomware-tracker.pages.dev/articles/ransomhub-affiliate-model-analysis/</link><guid isPermaLink="true">https://ransomware-tracker.pages.dev/articles/ransomhub-affiliate-model-analysis/</guid><description>RansomHub has grown into the most active ransomware-as-a-service operation of 2025–2026, displacing ALPHV/BlackCat and LockBit. An analysis of its affiliate structure, victim statistics, and targeting patterns.</description><pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate><category>group-profile</category><category>RansomHub</category><category>RansomHub</category><category>RaaS</category><category>affiliate</category><category>data extortion</category><category>victim statistics</category></item><item><title>Akira Ransomware: VMware ESXi Campaigns Targeting Healthcare and Manufacturing</title><link>https://ransomware-tracker.pages.dev/articles/akira-ransomware-vmware-esxi-targeting/</link><guid isPermaLink="true">https://ransomware-tracker.pages.dev/articles/akira-ransomware-vmware-esxi-targeting/</guid><description>Akira ransomware actors have refined their VMware ESXi targeting methodology, developing techniques to encrypt entire VM datastores and evade backup-based recovery. Healthcare and manufacturing organizations face elevated risk.</description><pubDate>Sat, 28 Mar 2026 00:00:00 GMT</pubDate><category>campaign-alert</category><category>Akira</category><category>Akira</category><category>VMware</category><category>ESXi</category><category>hypervisor</category><category>healthcare</category><category>manufacturing</category><category>virtualization</category></item><item><title>Cl0p&apos;s CLEO MFT Exploitation: Mass Data Theft at Scale</title><link>https://ransomware-tracker.pages.dev/articles/clop-cleo-exploitation-campaign/</link><guid isPermaLink="true">https://ransomware-tracker.pages.dev/articles/clop-cleo-exploitation-campaign/</guid><description>Cl0p&apos;s systematic exploitation of critical vulnerabilities in CLEO Harmony, VLTrader, and LexiCom managed file transfer software has enabled mass data theft across financial services and logistics sectors globally.</description><pubDate>Fri, 20 Mar 2026 00:00:00 GMT</pubDate><category>campaign-alert</category><category>Cl0p</category><category>Cl0p</category><category>CLEO</category><category>MFT</category><category>zero-day</category><category>supply chain</category><category>data extortion</category></item><item><title>2026 Ransomware Payment Trends: Demands, Negotiations, and Sector Breakdown</title><link>https://ransomware-tracker.pages.dev/articles/ransomware-payment-statistics-2026/</link><guid isPermaLink="true">https://ransomware-tracker.pages.dev/articles/ransomware-payment-statistics-2026/</guid><description>An analysis of ransomware payment data from 2025–2026 covering average demands by sector, negotiation outcomes, payment rate trends, and the growing role of cyber insurance in shaping ransom economics.</description><pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate><category>intelligence-report</category><category>payment statistics</category><category>ransom demand</category><category>negotiation</category><category>cyber insurance</category><category>trends</category></item><item><title>Initial Access Brokers: The Supply Chain Enabling Ransomware</title><link>https://ransomware-tracker.pages.dev/articles/ransomware-initial-access-brokers/</link><guid isPermaLink="true">https://ransomware-tracker.pages.dev/articles/ransomware-initial-access-brokers/</guid><description>An in-depth look at the Initial Access Broker (IAB) ecosystem — how ransomware groups purchase network access, pricing structures, broker profiles, and what defenders can learn from understanding this market.</description><pubDate>Wed, 18 Feb 2026 00:00:00 GMT</pubDate><category>intelligence-report</category><category>initial access brokers</category><category>IAB</category><category>dark web</category><category>access market</category><category>credential theft</category><category>supply chain</category></item></channel></rss>