MOXFIVE Monthly Insights - February 2026
In this newsletter, we share the latest ransomware and threat actor insights from the MOXFIVE team. Click button below to subscribe if not already on the MOXFIVE mailing list.

Subscribe

Ransomware Highlights for February 2026

The February 28 strikes against Iran marked a significant escalation in geopolitical tension and an immediate shift in the cyber threat environment. Iranian-aligned threat actors have a long history of using cyber operations as an asymmetric tool during periods of conflict, and activity tied to the current escalation was confirmed quickly. State-sponsored intrusions on US networks were identified in the weeks surrounding the strikes, coordinated hacktivist campaigns targeted US, Gulf, and allied organizations, and US-based companies have already experienced destructive attacks resulting in system wipes. This month's Case Study and Resilience Spotlight examine notable threat actors and campaigns active in the current conflict and how organizations can defend and remain resilient going forward.

Ransomware activity remained high throughout February, with RaaS models continuing to account for a large share of deployments. Qilin led for the second consecutive month, while Cl0p, Play, Akira, and DragonForce were all active across multiple industries. Critical vulnerabilities in remote access platforms, email infrastructure, and virtualization environments saw active exploitation during the month. Technology and Financial organizations were the most impacted industries, with Healthcare, Manufacturing and Production, and Construction and Engineering also seeing consistent targeting.

Top Threats & Exploits

Phishing emails, VPN vulnerabilities, lack of Multifactor Authentication (MFA), software flaws, drive-by downloads, and social engineering remain the most frequently observed initial access points for ransomware attacks.

  • BeyondTrust remote code execution vulnerability (CVE-2026-1731): An OS command injection flaw that allows unauthenticated remote code execution on vulnerable Remote Support and Privileged Remote Access instances. Disclosed in February 2026, the vulnerability was later confirmed to be actively exploited. It affects Remote Support versions 25.3.1 and prior and Privileged Remote Access versions 24.3.4 and prior.
  • VMware ESXi arbitrary write vulnerability (CVE-2025-22225): This vulnerability allows an attacker with privileges within the VMX process to trigger an arbitrary kernel write and escape the sandbox on vulnerable VMware ESXi systems. The vulnerability has been linked to ransomware campaigns targeting ESXi environments.
  • SmarterMail authentication bypass vulnerability (CVE-2026-23760): An authentication bypass flaw that allows an unauthenticated attacker to reset the system administrator password on vulnerable SmarterMail instances via a crafted HTTP request, resulting in full administrative compromise. Reports suggest the vulnerability has been used as an initial access vector in campaigns deploying Warlock ransomware.

Active Threat Actors

Ransomware activity in February was high and aligned with levels observed in recent months. RaaS operations continued to account for a large share of activity, with affiliate-driven models supporting many of the variants most frequently deployed during the month. Data extortion groups were also active in February, including ShinyHunters and World Leaks, which continued operations centered on data theft and extortion rather than encryption. The Gentlemen was not among the most active variants in February, but the group showed increased activity during the month.

  • Qilin was the most active ransomware operation deployed in February. The group's commission-based RaaS model, which offers affiliates up to 80-85% of ransom payments, has driven its continued popularity among affiliates. Qilin deployments include payloads for both Windows and Linux environments and rely on double extortion tactics.
  • Cl0p posted victims across multiple industries in February, and continued activity tied to its exploitation of Oracle E-Business Suite first observed in 2025. The operation is known for extended periods of lower visibility followed by large-scale exploitation of a single enterprise technology. Earlier Cl0p campaigns have also centered on MOVEit and GoAnywhere.
  • Play, Akira, and DragonForce were all highly active in February. Play operates as a closed group and is known for using custom tooling to support discovery and data exfiltration. Akira remained one of the most active RaaS operations in 2025, with affiliates frequently relying on credential-based access and remote-access methods for initial access. DragonForce shifted from a RaaS model to a cartel structure in 2025, allowing affiliates to operate under their own brands while using shared infrastructure and tooling.
Graph showing the most active ransomware variants in February 2026/

Figure 1: Top ransomware variants in February 2026 based on number of known victims.

The ransomware and industry rankings below are based on observed ransomware data leak site (DLS) activity for impacted organizations in the United States.

For a deeper look into these groups, MOXFIVE has published Threat Actor Spotlights on Qilin, Cl0p, Play, Akira, and DragonForce.

Top Industries Impacted by Ransomware

Technology was the most impacted industry in February. Service providers, software platforms, and managed IT firms can be attractive targets for ransomware operators due to their access to client networks and cloud environments. Financial organizations saw the second highest impact, as the value of client financial data and the reputational consequences of exposure can raise the stakes of an attack. While tax season does not appear to have been a primary driver of ransomware activity in the sector, several impacted organizations were tax, accounting, or CPA-related firms.

Healthcare, Manufacturing and Production,
and Construction and Engineering also saw ransomware activity in February. Healthcare organizations continue to be at risk due to the sensitivity of patient data and the impact of system downtime. Manufacturing and Production

Graph showing the industries most impacted by ransomware in February 2026.


Figure 2: Top industries impacted by ransomware in January 2026.

remained a frequent target, as production disruption can quickly affect revenue and operations. Construction and Engineering firms also saw continued activity, as these organizations often manage sensitive project and business data that can add extortion value after a breach.

Technology-sector victim postings included Cl0p, Qilin, and Sinobi, with NightSpire, an extortion operation that emerged in early 2025, also posting multiple victims in the sector. Financial-sector victim postings included SilentRansomGroup, a callback phishing and extortion group, as well as DragonForce. Healthcare victim postings were spread across multiple groups, with no single group dominating the sector. Qilin accounted for the heaviest concentration in Manufacturing and Production, while Play and DragonForce were the most active in Construction and Engineering.

Case Study - Iranian Cyber Operations and the Escalating Threat Landscape

The February 28, 2026, strikes against Iran coincided with a more active and volatile cyber threat environment. Iranian-aligned threat actors have long used cyber operations as an asymmetric tool during periods of geopolitical tension, with activity ranging from credential theft and espionage to disruptive and destructive operations, including wiper attacks and ICS targeting. The current conflict has increased concern around U.S.-targeting activity, particularly as multiple Iranian-aligned campaigns and hacktivist groups remain active.

Hacktivist Activity and Risk

State-Sponsored Operations and Risk

State-sponsored threat actors and hacktivist groups are both active in the current conflict, but they are serving different roles. State-linked activity remains focused on access and intelligence collection, while hacktivist activity has largely taken the form of distributed denial-of-service attacks, defacements, and breach claims. MuddyWater’s pre-strike access activity shows that network access was being established before the conflict escalated, while Handala and Agrius show that disruptive and destructive operations stay in play. False claims can also make it harder to separate confirmed intrusions from misleading or exaggerated reporting.

Resilience Spotlight - Defending Against Disruptive and Destructive Cyber Activity

War can raise cyber risk, but the most effective defenses remain the same core security and resilience measures organizations should already have in place. In this case, that means reducing internet-facing exposure, hardening identity and remote access, limiting operational technology exposure, and ensuring the organization can recover quickly from disruptive or destructive activity. The priority is to reduce initial access opportunities, improve detection of early intrusion activity, and maintain continuity if disruption occurs.

Critical Controls for Resilience During Geopolitical Escalation:

How MOXFIVE Can Help

MOXGUARD: Strategic advisory including AD/identity assessments, CVE alerting prioritized to active ransomware exploitation, guidance on segmentation and backup hardening, tabletop exercises with response playbooks, and pre-positioned incident response.

Professional Services: Control validation through EDR coverage assessments, purple team exercises, network segmentation reviews, backup immutability and restoration testing, external attack surface reduction, and SIEM/XDR detection engineering.

Our team has handled hundreds of ransomware cases against Qilin, Akira, Play, and other active operations, aligning preventive, detective, and recovery controls to current threat actor TTPs. Contact us at 833-568-6695 or incident@moxfive.com.