Skip to main content
Open mobile navigation menu
  • Log In
  • |
  • Contact Us
Home
  • Solutions

    Toggle Menu
    • Cybersecurity Trends

    • SD-WAN

    • XDR Security

    • Zero Trust Security

    • MSP vs MSSP

    • For Businesses

    • Industries

    • Regulations

    • Organizations
    • Security Models
    • For MSPs

    • Security Tech Stack

    • Security Frameworks

    • Cyber Insurance
    • For SOCs

    • Modern SOC

    • Threat Hunting

    • Unified Security Platform
    • Simplify Your Security.
  • Products & Services

    Toggle Menu
    • Network Security

    • Firewalls

    • Firewall Security Services

    • Secure Access Service Edge (SASE)
    • Network Detection & Response (NDR)

    • Secure Wi-Fi
    • Endpoint Security

    • Endpoint Detection & Response (EDR)

    • Endpoint Protection & Anti-Virus (AV)

    • Patch Management & Data Security

    • DNS-Level Protection

    • Identity Security

    • Multi-Factor Authentication (MFA)

    • Single Sign-on (SSO)
    • Hardware Token

    • Platform Security

    • AI-Powered XDR

    • Cloud Management

    • Compliance Reports

    • Security Operations Center
    • Managed Services for MSPs

    • Managed Detection & Response

    • View All Products

  • Research

    Toggle Menu
    • Threat Lab
    • Internet Security Report
    • Threat Landscape
    • Ransomware Tracker
    • Secplicity Blog
    • The 443 Podcast
    • Product Resources

    • On-Demand Webinars

    • White Papers

    • Datasheets & Brochures

    • Case Studies

    • Help Me Choose

    • UTM vs NGFW

    • WatchGuard Appliance Sizing Tool

    • Compare WatchGuard Appliances

    • Find an Integration
    • Help Me Buy

    • Demos & Free Trials

    • Find a Reseller

    • Online Store (Renewals Only)

  • Partners

    Toggle Menu
    • Become a Partner

    • Channel Partner Program

    • Benefits for the MSP

    • Getting Started as a Partner

    • Join the WatchGuardONE Program

    • Partner Resources

    • WatchGuard Cloud for Partners

    • Unified Security Platform for Partners

    • Specializations & Certifications

    • Partner Tools

    • Partner Success Stories

    • Find A Partner

    • Find a Reseller

    • Find a Distributor

    Handshake with images of people superimposed inside the silhouette
    Become a WatchGuardONE Partner Today

    Join Now

  • Company

    Toggle Menu
    • WatchGuard News

    • Press Releases

    • Press Coverage

    • Corporate News Blog

    • Upcoming Webinars & Events
    • Awards & Recognition

    • Media Contacts

    • About WatchGuard

    • Leadership

    • Real Security for the Real World
    • Social Responsibility

    • Careers

    • WatchGuard Brand Partners
    • Seattle Kraken
    • Girona FC
    Women of WatchGuard
    WatchGuard Careers
    Your new team is waiting for you

    Join Team Red

  • Support

    Toggle Menu
    • Technical Resources

    • Technical Search

    • User Forums

    • Technical Documentation

    • Product & Support Blog

    • Software Downloads

    • Security Portal

    • Training

    • Certification

    • WatchGuard Learning Center
    • Locate a Training Partner

    • Training Schedule

    • Video Tutorials

    • Support Services

    • Hire an Expert

    • Support Levels

    • Additional Support Services

    • Security Advisory List
    • Status Dashboard
    Person touching icons on a floating screen
    Manage Your Support Services
    Products, user profile, cloud services, and more

    Log In

  • Close search
  • Global Sites

    Français
    Deutsch
    Italiano
    Português
    Español
    日本語
  • Try Now
Close search
  • Solutions
  • Products & Services
  • Research
  • Partner Program
  • Support
  • Company
  • Careers
  • Portal Login
  • Contact Us
  • Try Now

Ransomware TrackerBeta

Ransomware Analysis powered by WatchGuard Threat Lab

Go to 

Cybersecurity

  • Cybersecurity Hub
  • Internet Security Report
  • Threat Landscape
  • Ransomware Tracker
  • Secplicity Blog
  • The 443 Podcast

Coverage

Total Ransomware

308

Known Victims

3,982

Total Decryptors

36

Active Groups

88

Ransomware Tracker Map

The map

Hover over a country to see the number of tracked victims.

Ransomware Database

Name Sort descending Ransomware Type First Seen Last Seen
 Active RADAR Data Broker September 2025
Radiant Group Crypto-Ransomware, Data Broker September 2025
Ragnar Locker Crypto-Ransomware, Data Broker, HumOR December 2019 October 2023
RALord Crypto-Ransomware, Data Broker, RaaS March 2025 April 2025
Rancoz
RANION Crypto-Ransomware, RaaS
RansomBoggs Crypto-Ransomware November 2022 November 2022
Ransomcortex Crypto-Ransomware, Data Broker, RaaS July 2024
RansomedVC Crypto-Ransomware, Data Broker
RansomExx Crypto-Ransomware, HumOR May 2020 November 2022
 Active RansomExx2 Crypto-Ransomware, HumOR November 2022
 Active RansomHouse Crypto-Ransomware, Data Broker, RaaS December 2021
RansomHub Crypto-Ransomware, Data Broker, RaaS February 2024
RebornVC Data Broker July 2025
Red Crypto-Ransomware, Data Broker March 2024

Pagination

  • « First
  • ‹‹
  • …
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • …
  • ››
  • Last »
Red lock in front of a honeycomb blue background with icons inside

Threat Landscape

WatchGuard Fireboxes each blocked an average of 4854 malware threats in Q2 2025

See More

Related Blogs

Illustration of a secure digital shield protecting a city network, representing Zero Trust cybersecurity and data protection.
Article

Zero Trust for Mid-Market: Why Modern IT Security Assumes Attacks Will Succeed

Article

Zero Trust for Mid-Market: Why Modern IT Security Assumes Attacks Will Succeed

Why mid-market security must assume breaches will happen. Learn how Zero Trust, EDR, MFA, and 24/7 monitoring reduce real-world risk.

Read Article
blog_image-Black-Friday.jpg
Article

Black Friday: How to Protect Your Retail Clients from Ransomware

Article

Black Friday: How to Protect Your Retail Clients from Ransomware

Black Friday heightens cyber risks for retailers, so MSPs must anticipate threats, prioritize critical issues, and respond fast to stay resilient.

Read Article
Cybersecurity professional analyzing code on multiple monitors in a modern security operations center, investigating threats and system defenses.
Article

How Computer Security Has Evolved and What You Can Do Now

Article

How Computer Security Has Evolved and What You Can Do Now

Learn how computer security has evolved and what steps you can take to protect your identity, devices, and data.

Read Article
Read more
  • About Us
  • Contact Us
  • Real Security
  • Careers
  • Product List & SKUs
  • Media & Brand Kit
  • Support
  • Trust Center
  • PSIRT
  • Cookie Policy
  • Privacy Policy
  • Manage Email Preferences
LinkedIn X Facebook Instagram YouTube

Email Us

Copyright © 1996-2026 WatchGuard Technologies, Inc. All Rights Reserved.
Terms of Use | California Collection Notice | Do Not Sell or Share My Personal Information