Three insights from the latest countermeasures tracker update

Image: Vahram Muradyan

We have updated the Virtual Routes Ransomware Countermeasures Tracker with over 50 new cases from the period between May and November 2025. This period does not mark a dramatic shift in how governments respond to ransomware, but it does highlight several developments that stand out when placed against the broader historical dataset. These developments appear gradually, across concrete investigations, arrests, infrastructure takedowns, public warnings, and financial-enforcement actions. Taken together, they help clarify how states are adapting their approach to disrupting ransomware. 

Three developments below stand out most clearly in this latest update:

1. There is a greater emphasis on supporting infrastructure/services

The DanaBot cases from early May illustrate this development well. DanaBot is not a ransomware strain but a malware loader that criminal groups use to gain initial access to systems; disrupting it affects multiple ransomware operations downstream. In this coordinated action, authorities pursued the operators of the loader, arrested individuals in several countries, and seized the servers used to manage infected machines. This operation spanned the United States, Germany, the Netherlands, and Australia.

Alongside this came actions against Black Kingdom and DoppelPaymer affiliates, but the ecosystem-level focus – on delivery mechanisms, infrastructure operators, and supporting services – is what sets these cases apart.

Earlier years contain similar actions, but they appear more sporadically. In this period, they form a consistent thread running through the new cases.

2. We see more routine cross-border operations

While joint actions have long been part of counter-ransomware work, cases in this period show a more steady rhythm of international cooperation. Several of the November entries reflect continued international targeting of infrastructure related to Operation Endgame, a multi-phase campaign originally launched to disrupt malware droppers like IcedID, TrickBot successors, and other components used by major ransomware groups.

The DanaBot intervention also spanned four countries, coordinating server seizures and arrests across the United States, Germany, the Netherlands, and Australia. In another case, the arrest and extradition of a Ukrainian suspect to the United States required coordinated action across Europe and North America.

Together, these examples suggest that the cooperative frameworks developed over the last decade are now being applied more frequently and operationally, rather than only during major, headline-driving takedowns.

3. European agencies are playing a more active role in arrests and convictions

The conviction of a Belarusian hacker by French authorities – after a long-running investigation into intrusions against French regional institutions – highlights Europe’s expanding judicial footprint. In early May, an Irish court sentenced a cybercriminal involved in ransomware-linked fraud, adding to the growing list of European-led prosecutions. We also saw additional arrests and server seizures by the Netherlands, Germany, Spain, and Moldova occur over the past few months.

This does not displace the longstanding dominance of US indictments, but it adds a more balanced geographical spread to enforcement activity than seen in earlier stretches of the dataset.

Overall, the latest update to the tracker adds nuance to the long-term picture. Governments continue using familiar tools (arrests, indictments, extraditions, server seizures, advisories) but their application shows a more consistent focus on the ransomware ecosystem, more routine international cooperation and stronger European leadership.

Authors

Max Smeets

Co-Director, Community Trustee

Apolline Rolland

Policy Researcher in Cyber and Emerging Technologies

Similar posts

Research & Analysis

Pharos Report No. 4 | Assessing the Impact of Ransomware Interventions and Countermeasures: A Framework

The fourth report of the Pharos Series, a joint project of Virtual Routes and Royal United Services Institute (RUSI), is authored by Max Smeets, Jamie MacColl, Sophie Williams-Dunning and Bob Herczeg.
Research & Analysis

Apolline Rolland presents REMIT research at the 2025 Conference on International Cyber Security

At the 2025 Conference on International Cyber Security, we joined a vibrant discussion on how states, technologies, and private actors are reshaping the boundaries of espionage and governance in the digital realm, representing EU-funded REMIT project.
Research & Analysis

OSCE publishes a new Handbook on National Cyber Incident Classification, written by Virtual Routes Co-Director James Shires

The handbook is divided into six steps, from setting the goals and engaging stakeholders to implementing, testing and refining the system.

Thank you for signing up to our newsletter!

Thank you! RSVP received for Three insights from the latest countermeasures tracker update

Three insights from the latest countermeasures tracker update

Loading...

Loading…