{"id":50372,"date":"2023-02-01T16:30:00","date_gmt":"2023-02-01T16:30:00","guid":{"rendered":"http:\/\/2c7e5c72-a67c-49d1-a13f-aa629ad9b069"},"modified":"2023-02-01T16:30:00","modified_gmt":"2023-02-01T16:30:00","slug":"microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/","title":{"rendered":"Microsoft: We are tracking these 100 active ransomware gangs using 50 types of malware"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/7408fb9905e0fecb4f921235c622f31d5eb7f107\/2023\/02\/01\/5ed83c95-c3d0-4a2d-8798-70ddaee056c5\/three-people-having-a-discussion-in-front-of-a-computer-in-an-office.jpg?auto=webp&amp;width=768\" alt=\"three-people-having-a-discussion-in-front-of-a-computer-in-an-office\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/5891c1d01782b4cdf9b9f9b5c67e949b3332d048\/2023\/02\/01\/5ed83c95-c3d0-4a2d-8798-70ddaee056c5\/three-people-having-a-discussion-in-front-of-a-computer-in-an-office.jpg?auto=webp&amp;width=1024\" alt=\"three-people-having-a-discussion-in-front-of-a-computer-in-an-office\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/0979ca36232874e5687927fbf2a66b7fa78b3e7e\/2023\/02\/01\/5ed83c95-c3d0-4a2d-8798-70ddaee056c5\/three-people-having-a-discussion-in-front-of-a-computer-in-an-office.jpg?auto=webp&amp;width=1280\" alt=\"three-people-having-a-discussion-in-front-of-a-computer-in-an-office\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/0979ca36232874e5687927fbf2a66b7fa78b3e7e\/2023\/02\/01\/5ed83c95-c3d0-4a2d-8798-70ddaee056c5\/three-people-having-a-discussion-in-front-of-a-computer-in-an-office.jpg?auto=webp&amp;width=1280\" alt=\"three-people-having-a-discussion-in-front-of-a-computer-in-an-office\" width=\"1280\" height=\"853.3333333333333\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Image: Getty \/ Bojan89<\/span><\/figcaption><\/figure>\n<p>More than 100 different cyber-criminal gangs are actively conducting ransomware attacks, deploying over 50 different ransomware families in campaigns that see them encrypt networks and demand a ransom payment for the decryption key.&nbsp;<\/p>\n<p>Those figures come from analysis by <a href=\"https:\/\/twitter.com\/MsftSecIntel\/status\/1620474448494075909\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Microsoft Security Intelligence<\/a>, which notes that some of the most prominent <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\/\" rel=\"follow\">ransomware<\/a>&nbsp;attacks of recent times include <a href=\"https:\/\/www.zdnet.com\/article\/fbi-watch-out-for-lockbit-2-0-ransomware-heres-how-to-reduce-the-risk-to-your-network\/\" rel=\"follow\">Lockbit<\/a>, <a href=\"https:\/\/www.zdnet.com\/article\/blackcat-ransomware-targeting-us-european-retail-construction-and-transportation-orgs\/\" rel=\"follow\">BlackCat<\/a>, <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-now-attackers-are-exploiting-windows-printnightmare-vulnerabilities\/\" rel=\"follow\">Vice Society<\/a>, and <a href=\"https:\/\/www.zdnet.com\/article\/this-sneaky-ransomware-gang-keeps-changing-tactics-to-spread-its-malware\/\" rel=\"follow\">Royal<\/a>.&nbsp;<\/p>\n<p>The attacks are also being helped along by how ransomware groups offer <a href=\"https:\/\/www.zdnet.com\/article\/franchises-partnerships-emerge-in-ransomware-as-a-service-operations\/\" rel=\"follow\">ransomware-as-a-service<\/a> (RaaS) schemes, enabling cyber criminals who don&#8217;t develop their own ransomware to get in on the action.&nbsp;<\/p>\n<p>Access to RaaS schemes is sold on underground forums, providing aspiring ransomware attackers with all the tools they need to conduct and manage attacks and extort ransom payments. In many cases, the author of the ransomware takes a cut of any ransom payments the attackers receive.&nbsp;<\/p>\n<p>Some of the most disruptive ransomware attacks have been carried out by attackers using affiliate schemes, with high-profile attacks involving the likes of <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-these-two-gangs-are-behind-half-of-all-attacks\/\" rel=\"follow\">Conti and LockBit<\/a> ransomware being conducted by affiliates.&nbsp;<\/p>\n<p>According to Microsoft, <a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/\" rel=\"follow\">phishing attacks<\/a> are the most common means of attackers gaining initial access to networks. &nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/ransomware-has-now-become-a-problem-for-everyone-and-not-just-tech\/\" rel=\"follow\"><strong>Ransomware has now become a problem for everyone, and not just tech<\/strong><\/a><\/p>\n<p>Targeting usernames and passwords with phishing emails or brute force attacks provides cyber criminals with access to networks using legitimate credentials that are less likely to arouse suspicion &#8212; and it&#8217;s <a href=\"https:\/\/www.zdnet.com\/article\/why-cloud-security-matters-and-why-you-cant-ignore-it\/\" rel=\"follow\">become easier for cyber criminals to access networks in this way<\/a> since the rise of hybrid and remote working.&nbsp;<\/p>\n<p>The attackers can move around the network, potentially even using the compromised account to conduct phishing attacks against other users, gaining the permissions and control required to compromise as much of the network with ransomware as possible, before eventually triggering the encryption process, locking files and servers, and demanding a ransom payment.&nbsp;<\/p>\n<p>But while phishing is the most common method used by ransomware gangs to access networks, it isn&#8217;t the only one.&nbsp;<\/p>\n<p>For example, Microsoft warns about the rise of <a href=\"https:\/\/www.zdnet.com\/article\/this-password-stealing-windows-malware-is-distributed-via-ads-in-search-results\/\" rel=\"follow\">malvertising<\/a> as the initial stage of attacks, where cyber criminals buy online adverts &#8212; commonly to promote false software downloads &#8212; which, if downloaded and installed, will infect the user with trojan malware that the attackers then use to distribute ransomware. &nbsp;<\/p>\n<p>Cyber-criminal affiliates using Royal ransomware have been seen using malvertising to deliver the payload.&nbsp;<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/this-password-stealing-and-keylogging-malware-is-being-spread-through-fake-software-downloads\/\" rel=\"follow\">Fake software updates<\/a> have also become a common means of delivering ransomware. These false warnings, which claim your software needs to be updated, typically come from malvertising links or drive-by-downloads &#8212; downloads that happen in the background without the user knowing. &nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/the-real-cost-of-ransomware-is-even-bigger-than-we-realised\/\" rel=\"follow\"><strong>The real cost of ransomware is even bigger than we realised<\/strong><\/a><\/p>\n<p>The aim of the false update alerts is to scare victims into downloading the malware &#8212; all while they believe they&#8217;re doing the right thing to protect their system.&nbsp;<\/p>\n<p>Cyber criminals are also using the tried and tested method of <a href=\"https:\/\/www.zdnet.com\/article\/these-old-security-vulnerabilities-are-creating-new-opportunities-for-hackers\/\" rel=\"follow\">abusing unpatched cybersecurity vulnerabilities<\/a> to access networks.&nbsp;<\/p>\n<p>&#8220;Even as they evolve, ransomware attacks continue to rely on common security weaknesses that allow them to succeed,&#8221; said Microsoft, which recommends that computers and networks should be updated with the latest security patches as a matter of urgency to prevent cyber criminals from exploiting known vulnerabilities to access networks.&nbsp;<\/p>\n<p>It&#8217;s also important that security updates are only downloaded from official sources, to avoid the possibility of a fake software update infecting your computer with ransomware.&nbsp;<\/p>\n<p>Meanwhile, organizations can try to prevent phishing attacks by ensuring that accounts are secured with <a href=\"https:\/\/www.zdnet.com\/article\/want-a-strong-password-youre-probably-still-doing-it-the-wrong-way\/\" rel=\"follow\">strong, preferably unique, passwords<\/a> and that accounts are secured with <a href=\"https:\/\/www.zdnet.com\/article\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\/\" rel=\"follow\">multi-factor authentication<\/a>.&nbsp;<\/p>\n<p>This additional layer of protection can help to stop attackers from accessing accounts, even if they&#8217;ve gained access to the correct username and password.&nbsp;<\/p>\n<h3><strong>MORE ON CYBERSECURITY<\/strong><\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft warns that phishing, fake software updates, and unpatched vulnerabilities are being exploited for ransomware attacks.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-50372","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft: We are tracking these 100 active ransomware gangs using 50 types of malware 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft: We are tracking these 100 active ransomware gangs using 50 types of malware 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-01T16:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/0979ca36232874e5687927fbf2a66b7fa78b3e7e\/2023\/02\/01\/5ed83c95-c3d0-4a2d-8798-70ddaee056c5\/three-people-having-a-discussion-in-front-of-a-computer-in-an-office.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft: We are tracking these 100 active ransomware gangs using 50 types of malware\",\"datePublished\":\"2023-02-01T16:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\\\/\"},\"wordCount\":657,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/0979ca36232874e5687927fbf2a66b7fa78b3e7e\\\/2023\\\/02\\\/01\\\/5ed83c95-c3d0-4a2d-8798-70ddaee056c5\\\/three-people-having-a-discussion-in-front-of-a-computer-in-an-office.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\\\/\",\"name\":\"Microsoft: We are tracking these 100 active ransomware gangs using 50 types of malware 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/0979ca36232874e5687927fbf2a66b7fa78b3e7e\\\/2023\\\/02\\\/01\\\/5ed83c95-c3d0-4a2d-8798-70ddaee056c5\\\/three-people-having-a-discussion-in-front-of-a-computer-in-an-office.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2023-02-01T16:30:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/0979ca36232874e5687927fbf2a66b7fa78b3e7e\\\/2023\\\/02\\\/01\\\/5ed83c95-c3d0-4a2d-8798-70ddaee056c5\\\/three-people-having-a-discussion-in-front-of-a-computer-in-an-office.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/0979ca36232874e5687927fbf2a66b7fa78b3e7e\\\/2023\\\/02\\\/01\\\/5ed83c95-c3d0-4a2d-8798-70ddaee056c5\\\/three-people-having-a-discussion-in-front-of-a-computer-in-an-office.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft: We are tracking these 100 active ransomware gangs using 50 types of malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft: We are tracking these 100 active ransomware gangs using 50 types of malware 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft: We are tracking these 100 active ransomware gangs using 50 types of malware 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-02-01T16:30:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/0979ca36232874e5687927fbf2a66b7fa78b3e7e\/2023\/02\/01\/5ed83c95-c3d0-4a2d-8798-70ddaee056c5\/three-people-having-a-discussion-in-front-of-a-computer-in-an-office.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft: We are tracking these 100 active ransomware gangs using 50 types of malware","datePublished":"2023-02-01T16:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/"},"wordCount":657,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/0979ca36232874e5687927fbf2a66b7fa78b3e7e\/2023\/02\/01\/5ed83c95-c3d0-4a2d-8798-70ddaee056c5\/three-people-having-a-discussion-in-front-of-a-computer-in-an-office.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/","name":"Microsoft: We are tracking these 100 active ransomware gangs using 50 types of malware 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/0979ca36232874e5687927fbf2a66b7fa78b3e7e\/2023\/02\/01\/5ed83c95-c3d0-4a2d-8798-70ddaee056c5\/three-people-having-a-discussion-in-front-of-a-computer-in-an-office.jpg?auto=webp&amp;width=1280","datePublished":"2023-02-01T16:30:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/0979ca36232874e5687927fbf2a66b7fa78b3e7e\/2023\/02\/01\/5ed83c95-c3d0-4a2d-8798-70ddaee056c5\/three-people-having-a-discussion-in-front-of-a-computer-in-an-office.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/0979ca36232874e5687927fbf2a66b7fa78b3e7e\/2023\/02\/01\/5ed83c95-c3d0-4a2d-8798-70ddaee056c5\/three-people-having-a-discussion-in-front-of-a-computer-in-an-office.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-we-are-tracking-these-100-active-ransomware-gangs-using-50-types-of-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft: We are tracking these 100 active ransomware gangs using 50 types of malware"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=50372"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50372\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=50372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=50372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=50372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}