Ransomware Landscape Q1 2026: Consolidation and Emerging Trends
TL;DR: The ransomware ecosystem has consolidated significantly in Q1 2026, with the top ten groups accounting for 71% of documented victims. Qilin leads as the most notable operator, while The Gentlemen has rapidly emerged as a force in the landscape.
Main Analysis: The recent report by Check Point Research reveals a significant shift in the ransomware environment, moving from fragmentation back towards consolidation. The landscape saw a marked decrease in active groups, from 85 in Q3 2025 to 71 in Q1 2026, with the top ten groups now dominating 71.1% of all reported victims. This indicates that the ransomware operation model is evolving, as larger groups absorb the talent from smaller, less established players.
During Q1 2026, data leak sites reported a total of 2,122 victims, marking the second-highest figure for Q1 on record. Notably, the emergence of prominent actors like Qilin, which alone recorded 338 victims, and The Gentlemen, which surged by 315% to land 166 victims, underscores the dynamic nature of these organizations. The Gentlemen’s unique approach, characterized by pre-existing access stockpiles and a focus outside the US, differentiates it from traditional ransomware operations.
LockBit, once a dominant force, is making a strong comeback with an increase of 106% in victims from Q4 2025, now claiming 163 victims and targeting a more global audience compared to its previous US-centric model. This shift is observed in its reduced share of US victims, indicating a strategic pivot potentially influenced by heightened law enforcement scrutiny.
Defensive Context: Organizations across various sectors need to be acutely aware of the recalibrating ransomware threat landscape, particularly those in industries known for high ransom yield, such as manufacturing and critical services. Notably, entities with exposure to FortiGate devices, given the reported exploitation of CVE-2024-55591, should prioritize understanding and managing these risks, as such vulnerabilities may impact their operational resilience.
Why This Matters: Companies in sectors heavily targeted by ransomware, especially financial institutions and healthcare providers, face increased existential risk due to the concentration of skilled operators. The renewed focus on broader geographic targets dilutes the effectiveness of traditional defense strategies, necessitating a more nuanced awareness of adversary tactics.
Defender Considerations: Given the operational trends, defenders must enhance their monitoring of emerging ransomware tactics, focusing particularly on known vulnerabilities and the actors responsible for recent spikes in activity. Understanding the infrastructure and affiliations driving these groups is crucial for effective incident response strategies.
Indicators of Compromise: The data does not specify exact IOCs, but entities should monitor for unusual access attempts, particularly relating to FortiGate devices associated with the mentioned CVE, as well as patterns of attack distinct to actors like LockBit and The Gentlemen.






