MITRE ATT&CK 2025 Results are LIVE

Double Extortion Blog Feb 2026

Qilin, Green Blood, 0APT: Ransomware Groups to Watch (March 2026) 

Subscribe to get the latest updates and resources

This blog is part of an ongoing series examining the findings in the February 2026 Cyber Threat Intel Report from Cyops. Read the full report here. 

February 2026 delivered 701 confirmed ransomware victims (according to officially announced data, which likely greatly underrepresent the total damage), with the United States as the most targeted country and the technology sector taking the hardest hits. The top group by victim count, Qilin, claimed 113 victims alone. These numbers are not a background statistic. They represent active, ongoing campaigns that are targeting organizations like yours right now. 

Here is what the threat intelligence from this month tells us, and what it demands from defenders. 

Ransomware Groups that Dominated February 

The top 10 groups by victim count last month: 

Group Victims 
Qilin 113 
TheGentlemen 83 
Clop 79 
Akira 47 
IncRansom 39 
DragonForce 34 
Play 32 
NightSpire 30 
LockBit5 29 
Vect 20 

Clop‘s continued high volume is consistent with its known pattern of mass-exploitation campaigns targeting file transfer and enterprise software vulnerabilities. Qilin and Akira remain operationally aggressive across multiple sectors. 

Two New Ransomware Operations Worth Tracking 

Green Blood Group 

Green Blood Group is an emerging double-extortion operation first observed in early 2026. Written in Go (Golang) and compiled as a Windows x64 executable, the ransomware is technically mature, not an amateur operation.

Green Blood Group ransom note.

Key behavioral characteristics identified through analysis: 

  • Privilege validation at runtime: The binary checks for local Administrator group membership before proceeding. If running with admin rights, it executes a full recovery-inhibition routine — deleting Volume Shadow Copies, removing Windows Backup catalogs, disabling the Windows Recovery Environment, and turning off the Windows Firewall. 
  • AES-256 encryption: Files are encrypted and renamed with the .tgbg extension. Ransom notes are dynamically generated with unique Recovery IDs per victim. 
  • Bitcoin-only payment: With a 7-day deadline, escalating price, and a 21-day key destruction threat. 
  • Self-cleanup: A batch script (cleanup_greenblood.bat) is generated and executed post-encryption to delete the ransomware binary and minimize forensic artifacts. 
  • Tor-based leak portal: Victims are publicly listed with structured data including compromised domains, data size, and categorized datasets. 
Green Blood Group’s leak site used in double-extortion ransomware campaigns.

One notable weakness: the attempt to disable Microsoft Defender real-time monitoring via registry modification contained a syntax error and failed to execute successfully. That said, the group’s operational maturity in all other areas suggests this will be corrected in future versions. 

0APT Ransomware 

0APT emerged in late January 2026 promoting a Ransomware-as-a-Service model with a rapid flood of victim claims. While researchers have flagged credibility concerns — the volume of claims appeared artificially inflated and several named organizations showed no evidence of compromise — the group does possess functional ransomware. 

The analyzed sample is a Rust-based 64-bit Windows executable that performs recursive filesystem traversal, appends the .0apt extension to encrypted files, drops a ransom note named README0apt.txt, and modifies the desktop wallpaper. The binary claims AES-256 and RSA-2048 hybrid encryption, enforces a 24-hour payment deadline, and includes aggressive data leak threats. 

Critically, the binary does not elevate privileges and does not perform lateral movement or establish C2 communication — limiting its impact compared to more capable groups. The negotiation portal was also found to be offline during analysis. 

The key lesson from 0APT is not technical — it is strategic. Extortion pressure does not require a confirmed breach. The mere credible threat of a public data leak can trigger premature ransom payments. Your incident response plan must include explicit guidance on validating breach claims through internal telemetry before any external response decision is made. 

The RAMP Forum Seizure: A Win, But Not the End 

The FBI’s seizure of the RAMP forum (one of the most prominent ransomware-associated underground platforms) is a meaningful law enforcement success. RAMP operated as an open marketplace for ransomware promotion and affiliate recruitment, hosting groups including LockBit, ALPHV, Conti, DragonForce, Qilin, and RansomHub over its lifespan. 

The FBI seized the RAMP (Ransom Anonymous Marketplace) forum in late January, 2026.

The forum operator, using the alias Stallman, publicly confirmed the takedown, describing it as having destroyed years of work. 

Despite the short-term win, ransomware ecosystems are resilient. Early indicators already show groups like DragonForce migrating toward alternative platforms such as ReHub. Fragmentation, not dissolution, is the expected outcome. Expect a period of repositioning, followed by reconsolidation on successor platforms. 

This seizure is a disruption, not a structural end to ransomware operations. 

What Defenders Need to Act On Today 

Immediately: 

  • Patch the CVEs covered in this month’s report — particularly CVE-2026-22769 (Dell RecoverPoint, CVSS 10.0), CVE-2026-21643 (FortiClientEMS SQL injection, CVSS 9.8), and CVE-2026-1731 (BeyondTrust RCE, CVSSv4 9.9). Pre-authentication vulnerabilities in internet-facing systems must be treated as critical-priority patches with no delay tolerance. 
  • Audit Volume Shadow Copy and backup catalog protections. Ensure VSS deletion attempts are alerted on in your SIEM. 
  • Confirm that bcdeditwbadmin, and vssadmin executions by non-administrative processes generate high-priority alerts. 

Operationally: 

  • Review your ransomware response playbook. Does it include a step to validate breach claims before engaging with threat actors? If not, add one. 
  • Ensure offline, immutable backups are tested and restorable. Green Blood Group’s recovery inhibition routine is designed specifically to make in-place recovery impossible. 
  • Integrate Go-compiled binary detection heuristics into your EDR ruleset. Both Green Blood Group and Morbius Stealer are Golang-based — a growing trend among threat actors exploiting Go’s cross-platform compilation and limited AV signature coverage. 

Ransomware actors are technically proficient, operationally aggressive, and adapting faster than most organizations are patching. The window between vulnerability disclosure and active exploitation continues to narrow. Treat every critical CVE as if it is already being actively exploited, because statistically, it likely will be soon. For more in-depth analysis of the latest threat actor activity, download the February 2026 Cyber Threat Intelligence Report.

Related Posts

Typosquatting, Steganography, and Worms: The February NPM Attack Wave
February 2026 Cyber Threat Intelligence Roundup: What Security Teams Need to Know This Month
The Helpful Support Agent Scam: How Attackers Are Exploiting Microsoft Teams
The Invisible Intruder: Living Off the Land After a FortiGate Exploit 
Token to Takeover: Inside a Real-World Microsoft Entra ID ITDR Investigation

Keep Reading

Sandworm
blog-bg-threat
Teams Remote Access

Search results for: