DNS Deep Diving into 2025’s Up and Coming Ransomware Families
Ransomware attacks are expected to continue plaguing individual users and organizations worldwide because they work. As of 2024, victims were asked to pay an average of US$2.5 million per incident.1
A report named 10 of the most active ransomware families in 2024,2 which WhoisXML API decided to further investigate. We obtained lists of indicators of compromise (IoCs) for RansomHub,3 LockBit 3.0,4 Play,5 Akira,6 Hunters,7 Medusa,8 BlackBasta,9 Qilin,10 BianLian,11 and INC. Ransom12 (aka Lynx).13
We expanded a list of 120 IoCs comprising 48 domains and 72 IP addresses to uncover connected artifacts and found: