Ransomware activity remained steady to start 2025, with Ransomware-as-a-Service (RaaS) operations continuing to drive attacks. Akira, Lynx, and RansomHub were among the most active ransomware variants in January. The month also saw continued exploitation of vulnerabilities, including Ivanti Connect Secure (CVE-2025-0282) and Oracle WebLogic Server (CVE-2025-21535), which was leveraged by Hunters International for initial access.
Phishing emails, VPN vulnerabilities, lack of MFA, software flaws, drive-by downloads, and social engineering remain the most frequently observed initial access points for ransomware attacks.
In January, several ransomware groups remained active, with RaaS operations continuing to drive attacks across multiple industries. The most active were Akira, Lynx, and RansomHub.
In January, Professional Services faced the highest ransomware activity, followed by Manufacturing & Production and Technology. Healthcare remained a frequent target, while attacks on Food & Beverage highlighted continued risks to supply chain operations. These rankings are based on observed ransomware data leak site activity for impacted organizations in the United States.
MOXFIVE recently observed a Qilin ransomware incident where brute-force attacks were used to gain initial access through a VPN appliance with compromised credentials. The threat actor repeatedly attempted login attempts until successful, ultimately accessing the network and moving laterally. Once inside, they deployed Qilin ransomware to encrypt ESXi hosts, impacting multiple virtual machines and disrupting operations.
Qilin is a RaaS operation that first emerged in July 2022, originally known as Agenda. The group provides affiliates with customizable ransomware, enabling them to tailor attacks to specific targets. Qilin has been used in attacks against large enterprises and high-value sectors, including healthcare and education, often leveraging double extortion by demanding payment for both decryption and the non-release of stolen data.
This incident underscores the importance of securing remote access points against brute-force attacks. Multifactor Authentication (MFA) is a critical defense, preventing unauthorized access even when credentials are compromised.
Brute-force attacks remain a common tactic for gaining unauthorized access to corporate networks, especially through exposed VPN appliances and remote access services. Without additional security controls, attackers can exploit weak or compromised credentials to infiltrate organizations and deploy ransomware.
MFA is one of the most effective defenses against brute-force attacks. By requiring an additional verification step beyond a password, MFA significantly reduces the risk of unauthorized access, even if credentials are stolen or compromised. Benefits of MFA:
Organizations should enforce MFA on all remote access points, implement account lockout policies, and monitor authentication logs for signs of credential-based attacks. Additionally, geo-locking can restrict access to VPNs and remote services from countries where legitimate logins should not occur, reducing exposure to external threats. Combined with strong password policies and continuous monitoring, MFA remains a critical control in preventing ransomware incidents.