Expert Op-Ed: Next-Generation Ransomware

Ransomware is undergoing a radical transformation. On one hand, the volume of these attacks is surging, and on the other, they are becoming more targeted and personalized.

Historically, ransomware attacks relied on brute force to breach systems and encrypt data. Today, we are witnessing genuine extortion campaigns, backed by a suite of meticulously organized psychological pressures.

Data encryption is no longer the end goal. Malicious actors leverage stolen data and harness generative artificial intelligence to intensify their operations with unprecedented speed and precision.

To guard against this threat, organizations must elevate their vigilance and innovate the ways they defend themselves.

Read also: Akira: the evolution of ransomware that encrypts up to Nutanix VMs

In this article, we will examine the latest innovations in ransomware and offer recommendations for organizations operating in the most targeted sectors, so they can modernize their security infrastructure and combat threats more effectively.

Extortion campaigns and the use of generative AI: the new winning combo for cybercriminals

Blocking access to victims is no longer the sole objective; cybercriminals now focus on exfiltrating sensitive information and threatening to publish it. This tactic exploits a range of fears for organizations—the prospect of severe reputational harm, regulatory penalties, or the theft of intellectual property. A combination that pushes many to pay the ransom even when system access remains intact.

The influence of generative artificial intelligence has been so profound that it has accelerated this strategic shift, automating reconnaissance, phishing, and the development of malware with chilling efficiency.

Current ransomware campaigns are largely personalized. They rely on identity impersonation and target users with elevated privileges. A single aim: maximize the impact of these campaigns. Large-scale spam has given way to stealthy, targeted intrusions. Lateral movement is widely used to penetrate the networks of targeted organizations. To counter this evolution, IT teams must deploy AI-powered defense strategies. In short, fight AI with AI.

Sectors in peril: manufacturing, healthcare, and tech

Alongside the evolution of ransomware itself, the types of organizations being targeted have changed. Over the past year, ransomware attacks surged in sectors with heavy regulatory exposure, as well as in industries handling sensitive data. For example, the healthcare sector remains a prime target due to the vast volumes of health information it manages, with 725 breaches and 275 million records exposed in 2024.

Beyond healthcare, several other sectors have been targeted. Weakened by the rollout of new processes in the course of their digital transformation, the oil and gas sector, for instance, saw a 935% increase in ransomware attempts, driven by rising automation and vulnerabilities in industrial control systems, making even rudimentary attacks remarkably effective.

The technology sector and the manufacturing industry rank among the most attacked, owing to the volume of data they manage and their operational interdependencies.

Read also: How ransomware infiltrated CH Rueil-Malmaison

The failure of traditional security

The challenge lies not only in digital transformation efforts themselves, but in an obsolete security architecture. Despite the increasing sophistication of ransomware, many sectors still rely on outdated architectures such as VPNs, firewalls, and point solutions like anti-malware that are not designed to address today’s threats. These fragmented systems create blind spots in encrypted traffic.

These organizations lack visibility into existing threats and underutilize security policies. Worse still, they often grant overly permissive access, facilitating attackers’ lateral movement once inside the network.

To meet these challenges, experts recommend moving toward Zero Trust architectures, powered by cloud and AI. These platforms unify security for users, devices, and applications, wherever they are, while reducing risk and simplifying protection.

The four pillars of a modern defense against ransomware

To effectively counter today’s threats, organizations must reduce their attack surface by concealing users, applications, and devices behind a secure cloud proxy. This approach eliminates public IP addresses and direct network access, making it significantly harder for attackers to locate and exploit vulnerabilities.

A robust defense also requires proactive measures to prevent any initial compromise. Comprehensive TLS/SSL traffic inspection, online sandboxing, and the isolation of suspicious files help block threats before they reach the network, thereby neutralizing ransomware before execution.

Preventing lateral movement within the network is equally essential. By establishing direct connections between users and applications, organizations remove opportunities for attackers to move freely once inside. AI-driven segmentation continuously adapts access based on user behavior and context, while decoy technologies strategically lure attackers into monitored traps.

Read also: Toward an anti-ransomware layer in the Google Drive app

Finally, blocking data exfiltration is crucial to deprive ransomware of its leverage. Data loss prevention (DLP), cloud access security brokers (CASB), and full traffic inspection collectively help prevent unauthorized data transfers to shadow IT or command-and-control infrastructure.

Thanks to these integrated, AI-enhanced strategies, organizations can stay ahead of evolving ransomware and better protect their critical assets.

Adapting to a new reality

In this AI-driven era of data extortion, ransomware has become a precision weapon that exploits both technological vulnerabilities and human psychology.

The shift from encryption to exfiltration, amplified by generative AI and personalized targeting, has made attacks faster, stealthier, and more destructive.

As cybercriminals adapt and multiply, organizations must demonstrate equal agility. They need to replace traditional defense tools with intelligent, integrated security frameworks capable of anticipating, isolating, and neutralizing threats before they escalate.

They must act with urgency: the stakes are no longer merely operational. The survival of organizations is on the line.

Dawn Liphardt

Dawn Liphardt

I'm Dawn Liphardt, the founder and lead writer of this publication. With a background in philosophy and a deep interest in the social impact of technology, I started this platform to explore how innovation shapes — and sometimes disrupts — the world we live in. My work focuses on critical, human-centered storytelling at the frontier of artificial intelligence and emerging tech.