Ransomware Groups Pivot Back to Encryption as Tactics Falter [Prime Cyber Insights]

Ransomware threat actors are undergoing a strategic shift, returning to traditional encryption-based attacks as pure data-theft extortion loses its efficacy. A new report from Coveware reveals that while groups like Cl0p pioneered exfiltration-only tactics, improving organizational backup and recovery capabilities have driven down ransom payment rates for these methods. Meanwhile, the UK’s National Cyber Security Centre has issued an urgent alert for critical infrastructure following malware attacks on Poland’s energy grid. Enterprise security is further pressured by a critical 9.9 CVSS vulnerability in BeyondTrust products and the emergence of ZeroDayRAT, a commercial spyware kit capable of total mobile compromise. Additionally, a massive leak has exposed over 536,000 customer records from various stalkerware providers. This episode explores why organizations must harden defenses as attackers evolve their leverage points in a landscape where simple data exfiltration is no longer a guaranteed payday.

[00:00] Aaron Cole: I am Aaron Cole.
[00:02] Aaron Cole: Today on Prime Cyber Insights, we're tracking a major tactical reversal in the ransomware
[00:09] Aaron Cole: world.
[00:10] Aaron Cole: Threat actors are finding that stealing data simply isn't paying the bills anymore.
[00:15] Lauren Mitchell: I'm Lauren Mitchell.
[00:16] Lauren Mitchell: Joining us today is our guest who brings a systems-level perspective on AI, automation,
[00:22] Lauren Mitchell: and security, blending technical depth with creative insight from engineering and music
[00:28] Lauren Mitchell: production.
[00:29] Lauren Mitchell: It's great to have you.
[00:30] Lauren Mitchell: Thanks, Lauren.
[00:31] Lauren Mitchell: It's fascinating to see the systems-level feedback loop here.
[00:35] Lauren Mitchell: According to Coveware, groups like Cal0P pioneered the data theft-only model.
[00:41] Lauren Mitchell: But as organizations have matured their backup and recovery strategies, the leverage of mere
[00:47] Lauren Mitchell: exfiltration has plummeted.
[00:48] Lauren Mitchell: We're seeing a pivot back to encryption because, frankly, it's a more effective lever for
[00:53] Lauren Mitchell: forcing a payment.
[00:55] Aaron Cole: And we are seeing that pressure play out in real time.
[00:58] Aaron Cole: Beacon Mutual Insurance is currently reeling from an INC ransom attack.
[01:03] Aaron Cole: They've restored systems, but the attackers claim to have 275 gigabytes of medical records in PII.
[01:09] Aaron Cole: Lauren, the urgency here is high because even with backups, the sensitivity of that data remains a massive liability.
[01:17] Lauren Mitchell: Exactly, Aaron.
[01:19] Lauren Mitchell: But it's not just corporate data at risk.
[01:21] Lauren Mitchell: The UK's NCSC just issued a severe alert for critical infrastructure.
[01:27] Lauren Mitchell: They're citing malware attacks on Poland's energy sector from this past December as a direct warning sign for the UK's water, transportation, and health systems.
[01:39] Lauren Mitchell: This isn't theoretical. It's a call for immediate hardening.
[01:43] Lauren Mitchell: Lauren, that ties directly into the Beyond Trust news.
[01:47] Lauren Mitchell: we have CVE-2026-1731, a critical RCE vulnerability with a 9.9 CVSS score.
[02:00] Lauren Mitchell: Historically, groups like the China-linked Silk Typhoon have jumped on these kinds of remote access flaws.
[02:07] Lauren Mitchell: From an automation standpoint, an unauthenticated attacker executing OS commands is a worst-case scenario.
[02:15] Aaron Cole: Right. It's a perfect storm when you add the mobile front.
[02:19] Aaron Cole: We're now seeing Zero Day Rat being sold on Telegram.
[02:22] Aaron Cole: This isn't just basic malware.
[02:25] Aaron Cole: It's a commercial toolkit that offers nation state-level capabilities,
[02:29] Aaron Cole: live camera access and key logging to anyone with a crypto wallet.
[02:34] Aaron Cole: it effectively lowers the barrier to total mobile compromise.
[02:38] Lauren Mitchell: And speaking of surveillance, Aaron,
[02:41] Lauren Mitchell: there's been a massive exposure in the stockerware industry.
[02:44] Lauren Mitchell: A hacktivist named Wicked scraped over 536,000 payment records
[02:49] Lauren Mitchell: from companies like UMobics and XSenseBuy.
[02:53] Lauren Mitchell: It's the 27th time a stalkerware provider has been breached or leaked data since 2017,
[03:00] Lauren Mitchell: exposing the very people paying to spy on others.
[03:05] Lauren Mitchell: It shows that the infrastructure of surveillance is often as vulnerable as the targets themselves.
[03:10] Lauren Mitchell: Whether it's high-end RCEs and enterprise tools or trivial web vulnerabilities in stalkerware sites,
[03:18] Lauren Mitchell: The common thread is that our digital resilience is being tested at every layer of the stack simultaneously.
[03:25] Chad Thompson: The message is clear. The threat landscape is evolving, not receding.
[03:30] Chad Thompson: Organizations must prioritize patching CVE-2026-1731 immediately.
[03:37] Chad Thompson: I'm Aaron Cole. Thanks for joining us.
[03:39] Lauren Mitchell: Stay resilient and keep your defenses hardened.
[03:43] Lauren Mitchell: For the full report, visit pci.neuralnewscast.com.
[03:47] Lauren Mitchell: I'm Lauren Mitchell. We'll see you next time on Prime Cyber Insights.
[03:52] Lauren Mitchell: Neural Newscast is AI-assisted, human-reviewed.
[03:56] Lauren Mitchell: View our AI transparency policy at neuralnewscast.com.

Ransomware Groups Pivot Back to Encryption as Tactics Falter [Prime Cyber Insights]
Broadcast by