Pharos Report No. 3: Ransomware’s New Masters: How States Are Hijacking Cybercrime

The third report in the Pharos Series, Ransomware’s New Masters: How States Are Hijacking Cybercrime is authored by Aleksandar Milenkoski, Jiro Minier, Julian-Ferdinand Vögele, Max Smeets, and Taylor Grossman

Ransomware has evolved into one of the most pervasive cyber threats, with high-profile incidents disrupting government organizations and private companies alike. Beyond their financial impact, these attacks now pose direct risks to human safety. While ransomware has long been associated with non-state criminal actors, state-linked actors are increasingly deploying it to achieve their objectives as well. 

This report provides a comparative analysis of ransomware use by groups linked to four states: Russia, China, North Korea, and Iran. The authors find that divergent motives and operational ecosystems contribute to varying uses of state-linked ransomware to gain strategic advantages. 

Russian state-linked groups primarily leverage ransomware as an operational tool in high-tempo conflicts like Ukraine, while China often aims to enhance plausible deniability for espionage activity. Iranian actors most frequently deploy ransomware for disruption, popular perception, and reputation, particularly targeting Israeli organisations. Meanwhile, the evolution of North Korean activity reflects a focus on strategic and tactical financial gain. 

Concurrently, however, the authors find that a degree of convergence can be observed in the state-linked use of ransomware. These convergences include the adoption of best practices from cybercriminal ransomware operations and the increasing involvement of state-linked actors within cybercriminal ransomware ecosystems, not only as beneficiaries but also as active participants.

This report was developed in partnership with SentinelLabs, Deutsche Cyber-Sicherheitsorganisation (DCSO), and Recorded Future

Read the full report below.

The third report in the Pharos Series, Ransomware’s New Masters: How States Are Hijacking Cybercrime is authored by Aleksandar Milenkoski, Jiro Minier, Julian-Ferdinand Vögele, Max Smeets, and Taylor Grossman

Ransomware has evolved into one of the most pervasive cyber threats, with high-profile incidents disrupting government organizations and private companies alike. Beyond their financial impact, these attacks now pose direct risks to human safety. While ransomware has long been associated with non-state criminal actors, state-linked actors are increasingly deploying it to achieve their objectives as well. 

This report provides a comparative analysis of ransomware use by groups linked to four states: Russia, China, North Korea, and Iran. The authors find that divergent motives and operational ecosystems contribute to varying uses of state-linked ransomware to gain strategic advantages. 

Russian state-linked groups primarily leverage ransomware as an operational tool in high-tempo conflicts like Ukraine, while China often aims to enhance plausible deniability for espionage activity. Iranian actors most frequently deploy ransomware for disruption, popular perception, and reputation, particularly targeting Israeli organisations. Meanwhile, the evolution of North Korean activity reflects a focus on strategic and tactical financial gain. 

Concurrently, however, the authors find that a degree of convergence can be observed in the state-linked use of ransomware. These convergences include the adoption of best practices from cybercriminal ransomware operations and the increasing involvement of state-linked actors within cybercriminal ransomware ecosystems, not only as beneficiaries but also as active participants.

This report was developed in partnership with SentinelLabs, Deutsche Cyber-Sicherheitsorganisation (DCSO), and Recorded Future

Read the full report below.

Similar posts

Pharos Report No. 2: The Ransomware Trust Paradox

Virtual Routes is pleased to release the second report in the Pharos Series, The Ransomware Trust Paradox by Max Smeets.

Virtual Routes contributes to second Pall Mall Process conference in Paris

On 3-4 April, the second conference of the Pall Mall Process took place in Paris. The Pall Mall Process is a multistakeholder initiative launched by the UK and French governments to address the risks of commercial cyber intrusion capabilities (CCICs). 

Introducing The Pharos Report Series: The Ransomware Playbook and How to Disrupt It

Virtual Routes is launching the Pharos Report Series, a new report series shedding light on cybersecurity and emerging technology challenges. The series aims to offer clear expert insights helping policymakers, researchers, and practitioners navigate evolving threats.

Thank you for signing up to our newsletter!

Thank you! RSVP received for Pharos Report No. 3: Ransomware’s New Masters: How States Are Hijacking Cybercrime

Thank you for applying! We will be in touch.

Apply for: Pharos Report No. 3: Ransomware’s New Masters: How States Are Hijacking Cybercrime

Pharos Report No. 3: Ransomware’s New Masters: How States Are Hijacking Cybercrime

Cargando...

Cargando…