Glossary  /  Threats

Glossary

What is ransomware?

Ransomware is malware that encrypts a victim's data and demands payment to decrypt it. The modern variant adds a second threat: pay up, or we leak everything we stole on the way in.

How the modern playbook works

A typical 2025-era ransomware incident looks like this:

Double, triple, even quadruple extortion

The industry calls this layering "double extortion" (encrypt + leak threat). Some groups go further: DDoS attacks against the victim's website during negotiation (triple), or direct harassment of customers and employees whose data was stolen (quadruple).

Leak sites — the public-facing pressure

Most prolific ransomware groups run a Tor-hosted "leak site" where they post victim names with countdown timers. CTI teams monitor these continuously because:

How ThreatCluster monitors this. Our dark web stack tracks ransomware leak sites in real time, matches victim postings against your tracked domains, and alerts you the moment a supplier or partner shows up. No reseller integration — we run our own collection.

Notable groups in recent rotation

Ransomware groups rebrand and re-emerge constantly. ALPHV/BlackCat shut down in early 2024 with an apparent exit scam. Scattered Spider continues to make headlines for social-engineering casino and retail breaches. LockBit had its infrastructure seized in Operation Cronos but partial rebuilds keep surfacing. Newer entrants like RansomHub, Akira, Play, and Medusa fill the gaps.

What CTI teams track

See it in the live feed.

Concepts on this page show up in the platform every day. Sign up free to see them in action.