Ransomware Attacks Reach Peak Levels During December 2025 Holiday Period | #ransomware | #cybercrime


727 Attacks in December Targeted Healthcare, Manufacturing as Cybercriminals Exploited Holiday Staffing Gaps

December 2025 broke every record. With 727 confirmed attack claims, the month surpassed October’s previous high of 631 by 15.2%. The expected holiday slowdown never arrived. Qilin led with 162 claims, but LockBit’s sudden return after 10 months of near-silence stole the month: 96 attacks, representing 83% of their entire 2025 total, all compressed into four weeks.

Four emerging ransomware operations conducted notable campaigns throughout December: Kazu, Benzona, TridentLocker, and MintEye. Collectively they claimed over 30 victims across government agencies, healthcare providers, and critical infrastructure worldwide.

Manufacturing and construction bore the heaviest burden. Healthcare took 45 attacks, continuing a pattern that has persisted throughout 2025. North America absorbed 53% of all attacks, with the United States alone at 47.6%. The four featured emerging actors recorded 12 attacks across 7 industries and 6 countries in their first months of operation.

On the ground, holiday-period attacks disrupted food production, education, and municipal services. Recovery timelines stretched from days to indefinite. Organizations faced encrypted systems and, simultaneously, their stolen data appearing on leak sites. Disclosed ransom demands stayed in the $60,000 to $80,000 range for publicly reported cases.

HAL (Halcyon Attack Lookout)

Data period: December 1-31, 2025 (Complete) | RECORD MONTH

+15.2%

vs October

(Previous Record)

Top Threat Actors

Actor Claims Share
Qilin (Threat Actor Feature of the Month) 162 22.3%
LockBit (December Resurgence: 83% of 2025 total) 96 13.2%
SafePay 64 8.8%
Akira 61 8.4%
Sinobi 47 6.5%

Halcyon Threat Actor Index

Threat Actor Feature of the Month

Top Targeted Industries

Industry Attacks Share
Manufacturing 144 19.8%
Construction 84 11.6%
Business Services 62 8.5%
Healthcare Services 45 6.2%
Retail 45 6.2%
Legal Services 39 5.4%

Regional Distribution

Region Attacks Share
North America 387 53.2%
Europe 167 23.0%
Asia 66 9.1%
South America 36 5.0%
Middle East 19 2.6%
Oceania 18 2.5%

Top Countries

Country Attacks Share
United States 346 47.6%
Canada 36 5.0%
Germany 34 4.7%
United Kingdom 23 3.2%
Spain 20 2.8%

Featured Emerging Actors: December Activity

Actor Claims Industries
Kazu 5 Healthcare, Insurance, Software, Construction
MintEye 3 Construction, Government, Transportation
TridentLocker 3 Transportation, Manufacturing, Insurance
Benzona 1 Business Services

Key Insights

December defied traditional holiday slowdowns with record attack volume. The United States absorbed 47.6% of all claims. Manufacturing (144 attacks) and construction (84 attacks) were the most targeted sectors. Week 4 saw the highest weekly activity, with attackers taking advantage of reduced staffing during the Christmas period.

Halcyon Ransomware Research Center

Qilin: December 2025 Threat Actor Feature

Sinobi: Threat Actor Profile (December 2025)

Nightspire: Threat Actor Profile (2025)

Full Threat Actor Index

LockBit’s December Resurgence

This is not simply a continuation of the LockBit brand. What emerged in December represents the fifth iteration of the operation (LockBit 5.0), following the disruption of LockBit 4.0 during Operation Cronos in February 2024. LockBitSupp, the group’s administrator, announced the 5.0 version in September 2025, promising improved infrastructure and new affiliate recruitment.

December activity followed a distinct pattern: 29 attacks in Week 1 (Dec 1-7), minimal activity in Week 2, renewed operations with 9 attacks in Week 3, then 48 attacks in Week 4 (Dec 22-31). That final week was the highest single week for any threat actor during the holiday period. Targeted organizations spanned 20+ countries across all continents, with particular concentration in manufacturing and professional services sectors.

The timing of the Week 4 surge coincided with reduced holiday staffing at many organizations, a pattern consistent with opportunistic targeting. Several security researchers have noted that the new leak site infrastructure differs from previous versions, and the affiliate network appears to include both returning operators and new recruits. Whether this resurgence represents sustained operational recovery or a temporary spike remains to be seen in early 2026.

Context

LockBit was the dominant ransomware operation from 2021-2023 before law enforcement dismantled much of its infrastructure. The December surge indicates that LockBit 5.0 has regained meaningful operational capacity, though activity levels remain well below pre-Cronos peaks when the group routinely claimed 100+ victims monthly.

Kazu represents the most prolific operation of the four, with confirmed nation-state-adjacent targeting across military, healthcare, and government sectors. According to Bitdefender’s November 2025 Threat Debrief, the group has rapidly expanded operations across Southeast Asia, the Middle East, and South America.

The group operates a double-extortion model prioritizing data theft over traditional encryption. Red Piranha’s December 2025 threat intelligence report documents their deployment of SmokeLoader as an initial loader, subsequently dropping a LockBit 5.0 variant as the ransomware payload. Critically, Kazu implements a locale-based execution guard that skips execution on Russian/CIS language systems.

The group’s most prominent December attack was against New Zealand’s Manage My Health portal, detailed in the Press Coverage section below. Ransom demands have ranged from $60,000 to $500,000.

Benzona emerged in late November with aggressive expansion targeting manufacturing, healthcare, and automotive sectors. As noted by DarkFeed researcher Ido Cohen on X, the name is a Hebrew curse word, making it “one of the strangest branding choices” for a cyber-criminal operation.

A CYFIRMA weekly intelligence report from December 5, 2025 documented extensive anti-analysis capabilities including virtualization detection, timestomping, and shadow copy deletion. The ransomware appends the “.benzona” extension to encrypted files.

Romania accounts for approximately 50% of known victims, with ransomware trackers logging eight confirmed attacks. Additional victims span Côte d’Ivoire, Taiwan, India, and Iran.

TridentLocker has distinguished itself through targeting of government-adjacent infrastructure. Security Affairs and Bleeping Computer reported that in late December 2025, the group compromised a major claims management company’s government services subsidiary, a federal contractor serving multiple U.S. agencies including DHS, ICE, CBP, and notably CISA itself.

According to The Record, the attack targeted an isolated file transfer system. Cyber Press noted the incident was officially confirmed in early January 2026.

So far, threat trackers log 12 confirmed victims with an average dwell time of 12.6 days between attack and public claim. The group’s leak site runs on Kestrel (ASP.NET Core), distinguishing it from typical NGINX-based operations. No IOCs, YARA rules, or technical malware analysis have been published by major vendors.

MintEye represents the least documented threat actor, having emerged only weeks before this report. According to PurpleOps threat intelligence, MintEye was the most active ransomware group on December 12-13, 2025, claiming five victims simultaneously, more than Play News, Medusa, or Qilin.

Reports from DeXpose and RedPacket Security show targets across professional services, architecture, legal, and logistics sectors. Total claimed exfiltration exceeds 6 TB across five victims in the United States and Chile.

Beyond that, public tracking databases maintain only a basic profile. No malware samples, technical IOCs, initial access vectors, or ransom amounts have been disclosed. No coverage exists from enterprise-tier threat intelligence vendors such as Mandiant, CrowdStrike, or Sophos.



Source link

.........................

National Cyber Security

FREE
VIEW