Report Reveals Huge Transparency Gap in Global Ransomware Attacks

May 8, 2026
Interview
Report Reveals Huge Transparency Gap in Global Ransomware Attacks

Vernon Yai is a preeminent authority in data protection, specializing in the intricate intersection of privacy governance and proactive risk management. With years of experience navigating the fallout of high-stakes breaches, he has become a leading voice on how organizations can build resilient detection systems while maintaining regulatory compliance. In this conversation, he sheds light on the hidden epidemic of undisclosed ransomware and the evolving strategies of modern cybercriminal syndicates.

With undisclosed ransomware incidents outnumbering public disclosures ten-to-one, what internal pressures drive companies to keep these breaches secret? How do these choices impact long-term recovery costs and the industry’s collective security posture?

The pressure to remain silent is often driven by an intense fear of brand erosion and the immediate plummeting of shareholder value that follows a public admission of failure. Executives worry that a 10-to-1 ratio of hidden attacks suggests a lack of control, so they opt for quiet settlements or internal remediation to avoid the spotlight. However, this secrecy creates a “security debt” where the root cause is often patched rather than fully eradicated, leading to recovery costs that balloon over time as persistent threats remain dormant. To balance transparency with protection, leaders must adopt a “disclose-and-defend” strategy, where they share technical indicators with industry peers while controlling the public narrative through a pre-planned crisis communication framework. By treating a breach as an operational challenge rather than a moral failure, companies can mitigate reputational damage while contributing to the collective defense of the entire ecosystem.

Manufacturing and healthcare face drastically different disclosure patterns despite high attack volumes. Why is data exfiltration now present in nearly 100% of reported cases, and what specific metrics should leaders track to determine if their infrastructure is currently being staged for an exfiltration-heavy attack?

The shift toward data exfiltration, which now appears in 96% of all disclosed cases, represents a fundamental change in the criminal business model where leverage is moved from the computer screen to the dark web. In healthcare, the sensitivity of patient data makes disclosure almost mandatory due to regulation, whereas manufacturing firms often prioritize operational continuity and may hide attacks to protect proprietary trade secrets. Leaders need to move beyond simple antivirus alerts and start tracking “egress volume anomalies” and the frequency of unauthorized API calls to cloud storage providers. When you see a sudden spike in outbound traffic to unfamiliar IP addresses or an unusual volume of compressed archive files being created on file servers, you are likely looking at the final staging phase of an exfiltration-heavy event. Monitoring the “mean time to detect” these specific preparatory actions is the only way to stop the data from leaving the building before the encryption even begins.

New frameworks like Lotus C2 and the Venom Stealer infostealer are lowering the barrier for entry for less sophisticated hackers. What are the tell-tale signs of a “ClickFix” infection on a corporate network, and how should security teams reconfigure their playbooks to counter these modular, highly scalable tools?

The “ClickFix” technique is particularly insidious because it mimics legitimate system prompts or browser updates, turning a simple user error into a persistent data pipeline. One of the primary tell-tale signs is the presence of unexpected PowerShell scripts or “mshta.exe” processes running in the background shortly after a user visits a seemingly benign webpage. Security teams need to move away from static playbooks and embrace a modular defense that mirrors the design of tools like Lotus C2, focusing on “living-off-the-land” binaries that hackers exploit. This means implementing strict execution policies that block unsigned scripts and utilizing behavioral analytics to flag any tool that attempts to scrape credentials from browser memory. We have to assume the initial compromise will happen; the goal of the new playbook must be to break the command-and-control link before the modular payloads can be deployed.

About half of employees currently use unauthorized or free AI tools, often connecting them to internal platforms without permission. What are the specific technical risks of “shadow AI” in a ransomware context, and how can organizations implement security protections without stifling the speed benefits employees seek?

The technical risk of “shadow AI” is immense, especially considering that 51% of employees are connecting these unvetted tools to other internal platforms, effectively creating a back door for data leakage. When an employee feeds sensitive corporate data into a free AI tool to save time, that data often becomes part of a public training set or sits on an insecure server where ransomware actors can easily harvest it. To combat this, organizations should implement a “sanctioned sandbox” approach, providing enterprise-grade AI tools that offer the same 60% speed increase employees crave but with built-in data loss prevention (DLP) protocols. We must use Cloud Access Security Brokers (CASB) to automatically discover these 49% of unauthorized applications and redirect users to secure, company-approved alternatives. It is about replacing the word “no” with a “yes, but through this secure channel,” ensuring that productivity doesn’t come at the cost of the entire network’s integrity.

New groups like The Gentlemen and ShinyHunters are quickly gaining ground alongside established gangs like Qilin. What specific maneuvers allow these newer actors to achieve high volume so quickly, and what immediate hardware or software audits should a U.S.-based organization prioritize to mitigate these emerging threats?

Newer groups like The Gentlemen have managed to capture a massive share of the undisclosed market by using “Ransomware-as-a-Service” models that allow them to outsource the initial breach to specialized access brokers. This modular approach allows them to hit 1,070 U.S. targets in a single quarter by focusing purely on the extortion and negotiation phase rather than the technical break-in. U.S. organizations must immediately prioritize an audit of all Internet-facing hardware, specifically looking for unpatched VPN concentrators and legacy RDP ports that these groups favor for entry. Additionally, software audits should focus on identifying any instances of the Lotus C2 framework or unauthorized remote management tools that may have been left behind by previous, smaller intrusions. Checking the “who, what, and where” of every administrative login over the last 90 days is a critical sensory check to ensure these high-volume actors haven’t already established a foothold.

What is your forecast for the evolution of ransomware tactics over the next year?

I anticipate that the “double extortion” model will become the absolute baseline, with attackers moving beyond simple data encryption to focus almost exclusively on high-pressure psychological warfare and public shaming. As the gap between the 264 disclosed attacks and the 2,160 undisclosed ones continues to widen, we will see hackers using AI-driven automation to identify which specific files are most damaging to a company’s reputation before they even start the ransom process. This “hyper-targeted extortion” will likely target C-suite executives personally, using stolen emails to create deep-fake scenarios or leaking private internal communications to force a payout. Organizations will need to shift their focus from “recovery from backup” to “prevention of exposure,” as the value of the data being held hostage will soon far outweigh the cost of the hardware it sits on. Success in the coming year will be measured not by how fast you can restore your servers, but by how effectively you kept your data from ever entering the dark web ecosystem.

Trending

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later