WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Security Awareness – The Most Active Ransomware Groups this Holiday Season
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Security Awareness – The Most Active Ransomware Groups this Holiday Season

Author: Alec Davison

Created: Thursday, December 23, 2021 - 19:00

Categories: Cybersecurity

The scourge of ransomware endures as criminals continue to find new ways to exploit and compromise systems and networks for their financial gain. WaterISAC is highlighting the most prolific and noteworthy ransomware groups this holiday season for members’ security awareness.

In November, the ransomware group PYSA conducted the greatest number of ransomware attacks, according to a new report from the cybersecurity firm NCC Group. Last month, organizations infected with PYSA increased by 50 percent. Following close behind, Lockbit was another one of the most active ransomware group’s last month. The Conti ransomware group was not quite as active, compared to previous periods, with activities decreasing by 9 percent. Nevertheless, Conti has recently adopted some new tactics and continues to be a pernicious threat.

Some new ransomware actors have also emerged this season. The Everest ransomware gang, a Russian-speaking group, will uniquely sell access to the victim’s IT infrastructure. According to the NCC Group “while selling ransomware-as-a-service has seen a surge in popularity over the last year, this is a rare instance of a group forgoing a request for a ransom and offering access to IT infrastructure – but we may see copycat attacks in 2022 and beyond.” Finally, researchers at the cybersecurity company Sophos have been tracking a new ransomware group known as Avos Locker. A unique characteristic of this ransomware is that it aims to disable endpoint security products by placing a victim’s computer in Safe Mode. Members should visit StopRansomware.gov for more information and tips for preventing ransomware attacks. Read more at BleepingComputer, at Sophos, or access the NCC Group report here.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar