Ransomware activity remained high throughout March 2025, with several threat actors continuing to evolve their operations. This report highlights critical vulnerabilities leveraged by ransomware operators, including a zero-day privilege escalation flaw exploited in active campaigns. It also covers the most active ransomware variants, with RansomHub and Akira leading in volume, and outlines which industries were most impacted based on observed leak site data. Finally, we share a real-world case involving a phishing campaign during ransomware recovery and spotlight the value of proactive email security controls in stopping secondary threats.
Phishing emails, VPN vulnerabilities, lack of MFA, software flaws, drive-by downloads, and social engineering remain the most frequently observed initial access points for ransomware attacks.
Several ransomware variants remained active throughout March 2025, with RansomHub and Akira leading in observed activity across both public leak sites and MOXFIVE cases.
For a deeper look into these groups, MOXFIVE has published Threat Actor Spotlights on RansomHub, Akira, Qilin, and Lynx.
Technology and Manufacturing & Production were the most impacted industries in March, together accounting for nearly 40% of observed ransomware activity.
Healthcare, Professional Services, and Retail & Hospitality also remained frequent targets, reflecting continued threat actor focus on sectors where disruption can quickly impact operations and revenue. These rankings are based on observed ransomware data leak site (DLS) activity for impacted organizations in the United States.
Secondary Attack During Recovery
During a recent ransomware recovery engagement, MOXFIVE identified a coordinated phishing campaign targeting users within the impacted environment. The timing was strategic, as threat actors launched the campaign while the organization was still recovering from encryption, attempting to exploit uncertainty and re-establish access. Users received a wave of emails containing links to spoofed login pages designed to capture credentials.
Some users followed the links and submitted information before the campaign was reported, introducing the risk of secondary compromise during a critical phase of the recovery. MOXFIVE quickly moved to contain the threat, identify affected accounts, and assess whether any additional access had been gained.
Email Security Solutions
In response to the phishing campaign, MOXFIVE quickly implemented an email security solution to contain the threat and prevent further exposure. The tool began blocking malicious emails in real time, ultimately quarantining thousands of messages that could have otherwise led to additional compromise. This immediate action helped stabilize the environment and allowed recovery efforts to continue without further disruption.
To improve resilience against similar threats, organizations should:
Strong email controls play a critical role in reducing risk during both active incidents and ongoing operations. Implementing the right protections can stop targeted phishing campaigns before they reach users and disrupt incident response efforts.