Ransomware in 2025: Blending In is the Strategy

Summary: According to Cisco Talos, ransomware attacks in 2025 were characterized by legitimate penetration and the use of common tools to expand access. Qilin was identified as the most prolific group.

Talos' analysis on ransomware in 2025 leaves an uncomfortable but clear conclusion: the best way to go unnoticed is to resemble legitimate traffic and tools in the environment. Instead of relying solely on noisy malware, many groups are opting to expand access by using utilities already present in the network, such as RDP, PowerShell or PsExec, blending malicious activity with routine administration.

This approach makes intrusion much harder to detect because the problem is no longer just what tool is used, but how, when, and with what context. Talos also highlights that a significant part of initial access continues to come from phishing, which demonstrates that classic techniques remain effective when combined with more silent and well-chained operations.

The piece is useful as it connects this masking tactic with concrete actors and an annual reading of the phenomenon. Qilin appears as the most prolific group, but the true value of the report lies in the general trend: attacks that work best are not always the most sophisticated at first glance, but those that manage to appear normal long enough to consolidate themselves.

Editorially, the story summarizes well the current moment of ransomware: less spectacle, more mimicry. The attacker who blends best with the network usually gains the most time.

Key facts

  • 40% of initial intrusions are due to phishing attacks.
  • RDP, PowerShell and PsExec are the most commonly used tools by cybercriminals.
  • Qilin was the most prolific group in 2025.

Why it matters

These findings underscore the need for closer monitoring and effective measures to track the misuse of remote management tools in enterprise environments.