Organizations warned of ransomware risk from smaller operators
They may not have the financial muscle, but small-time cyber crooks can cause havoc for critical systems


The risk from small-scale ransomware cyber criminals is not to be underestimated, according to new research by McAfee.
Thibault Seret, a security researcher on the McAfee Advanced Threat Research team, said that while big ransomware attacks make the headlines, there are many smaller actors without access to the latest ransomware samples.
These small-time hackers are “getting creative and looking out for the latest malware and builder leaks they can be just as devastating to their victims.”
Seret said that away from the gaze of researchers who typically focus on the larger ransomware groups, many individuals and smaller groups are “toiling in the background, attempting to evolve their own operations any way they can.”
He said one small-scale threat actor has evolved from deploying homemade ransomware to using major ransomware. They made the transition by leveraging publicly leaked builders to create their versions of Babuk and Chaos.
Seret said there are two distinct types of cyber criminals taking advantage of leaks such as this. One less tech-savvy group merely copied and pasted the builder, substituting the Bitcoin address in the ransom note with their own. The second group has gone further, using the source material to iterate their versions of Babuk, complete with additional features and new packers.
Seret’s team followed one small-scale hacker and noted how they moved from simplistic ransomware and demands in the hundreds of dollars to toying with at least two builder leaks and ransom amounts in the thousands of dollars.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
“While their activity to date suggests a low level of technical skill, the profits of their cyber crime may well prove large enough for them to make another level jump in the future,” he said.
“Even if they stick with copy-pasting builders and crafting ‘stagers’, they will have the means at their disposal to create an efficient attack chain with which to compromise a company, extort money and improve their income to the point of becoming a bigger fish in a small pond, just like the larger RaaS crews.”
John Fokker, head of Cyber Investigations for McAfee Enterprise's Advanced Threat Research team, told IT Pro that even though REvil accounted for 73% of ransomware detections in Q2 of 2021, cyber criminals are resourceful, and large groups are no longer the only players making a profit.
RELATED RESOURCE
The best defence against ransomware
How ransomware is evolving and how to defend against it
“The threat for businesses is intensifying as smaller-scale ransomware actors build on the work of these larger groups,” he said.
Fokker added that enterprises should use this warning as an opportunity to get ahead of adversaries and figure out how they could tighten up their defenses against future attacks.
“This could include the use of threat intelligence, which helps organizations to predict and prioritize potential threats before pre-emptively adapting their defensive countermeasures, ensuring optimized security and future business resilience,” he added.
Fokker said that organizations should also deploy a security strategy that blends zero trust and SASE approaches so enterprises can protect entry and data at every control point.
“This approach is particularly important as opportunistic actors evolve their tactics and will help to ensure organizations have the necessary barriers to protect against attacks of any size,” he said.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
M&S suspends online sales as 'cyber incident' continues
News Marks & Spencer (M&S) has informed customers that all online and app sales have been suspended as the high street retailer battles a ‘cyber incident’.
By Ross Kelly
-
Manners cost nothing, unless you’re using ChatGPT
Opinion Polite users are costing OpenAI millions of dollars each year – but Ps and Qs are a small dent in what ChatGPT could cost the planet
By Ross Kelly
-
Ransomware attacks are rising — but quiet payouts could mean there's more than actually reported
News Ransomware attacks continue to climb, but they may be even higher than official figures show as companies choose to quietly pay to make such incidents go away.
By Nicole Kobie
-
Cleo attack victim list grows as Hertz confirms customer data stolen – and security experts say it won't be the last
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott
-
Healthcare systems are rife with exploits — and ransomware gangs have noticed
News Nearly nine-in-ten healthcare organizations have medical devices that are vulnerable to exploits, and ransomware groups are taking notice.
By Nicole Kobie
-
Alleged LockBit developer extradited to the US
News A Russian-Israeli man has been extradited to the US amid accusations of being a key LockBit ransomware developer.
By Emma Woollacott
-
February was the worst month on record for ransomware attacks – and one threat group had a field day
News February 2025 was the worst month on record for the number of ransomware attacks, according to new research from Bitdefender.
By Emma Woollacott
-
CISA issues warning over Medusa ransomware after 300 victims from critical sectors impacted
News The Medusa ransomware as a Service operation compromised twice as many organizations at the start of 2025 compared to 2024
By Solomon Klappholz
-
Warning issued over prolific 'Ghost' ransomware group
News The Ghost ransomware group is known to act fast and exploit vulnerabilities in public-facing appliances
By Solomon Klappholz