- The best secure browsers for privacy in 2025: Expert tested
- 未来を予測する航空機整備革命:JALが切り拓くゼロゼロ100の挑戦
- Update on the Docker DX extension for VS Code | Docker
- This simple Kindle accessory has seriously upgraded my reading experience - and it's cheap
- How to easily run your favorite local AI models on Linux with this handy app
RansomHub Refines Extortion Strategy as RaaS Market Fractures

RansomHub has refined its extortion model and expanded affiliate recruitment efforts amid increasing volatility in the ransomware ecosystem.
Following law enforcement actions and multiple exit scams affecting major Ransomware-as-a-Service (RaaS) players, the group has positioned itself as a viable alternative for displaced affiliates.
According to a new technical analysis by Group-IB, in its affiliate panel’s News section, RansomHub outlines a pricing model based on victim revenue aimed at increasing the likelihood of ransom payments. The guidance emphasizes standard disruption tactics such as deleting Windows Shadow Copies and virtual machine snapshots to prevent recovery.
Earlier versions of the group’s Negotiation FAQ – now removed – included instructions encouraging affiliates to report incidents to regulatory bodies like GDPR, PIPL and PDPL. The aim was to increase pressure by presenting ransom payments as a lower-cost option compared to potential regulatory fines.
Unlike some groups that avoid regulatory disclosure to preserve negotiations, RansomHub previously promoted it as a tactic. Operators initially advised against exposing victim names or data, but if talks fail, stolen data could be leaked via the group’s Data Leak Site (DLS).
Throughout late 2023 and early 2024, operations by Europol, the FBI and NCA disrupted LockBit, ALPHV and others, prompted affiliate migration to other services.
RansomHub responded by promoting favorable terms to attract new partners, including:
- Low commission rates (initially 10%, later increased to 15%)
- Support for personal cryptocurrency wallets
- Full affiliate control over victim negotiations
- Additional customization options in ransom notes
Representatives were active on RAMP forums, highlighting these features while capitalizing on the instability of rivals.
In early April 2025, RansomHub’s infrastructure experienced unplanned downtime. Shortly after, Qilin’s administrator “Haise” became active on RAMP, advertising a new ransomware version and DDoS extortion features.
From February onward, Qilin’s monthly victim disclosures rose significantly, suggesting a potential influx of new affiliates, possibly from RansomHub.
Read more on this malware: Qilin Ransomware’s Sophisticated Tactics Unveiled By Experts
RansomHub and other groups continue to offer broadly similar ransomware functionality, including file encryption, process termination and backup deletion. As technical differences between families narrow, affiliate trust, communication flexibility and perceived reliability increasingly influence group success.
According to Group-IB, the recent shifts highlight a broader trend – affiliate migration and brand perception are playing a larger role in RaaS group dynamics than malware innovation alone.
For defenders, tracking these changes remains essential for anticipating threat actor behavior in an increasingly fragmented threat landscape.