WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Security Awareness – Researchers Observe an Increase in Ransomware Attacks in November, with Royal Ransomware the Most Active Strain
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Security Awareness – Researchers Observe an Increase in Ransomware Attacks in November, with Royal Ransomware the Most Active Strain

Author: Alec Davison

Created: Tuesday, December 27, 2022 - 20:14

Categories: Cybersecurity

Royal ransomware was the most active ransomware strain in November, knocking Lockbit ransomware from the top spot for the first time since September 2021, according to a recent report from the cybersecurity company NCC Group.

Royal ransomware, a strain that emerged in January of this year, is unique in that it operates without affiliates and is therefore distinct from the traditional ransomware-as-a-service model. The ransomware gang employs partial encryption and multi-threaded ransomware to accelerate the encryption process and evade detection. Royal ransomware is also distinct from other groups in their delivery method; they primarily rely on social engineering tactics, such as phishing attacks, to gain access.

Additionally, the report observed a 41 percent increase in ransomware attacks in November. Specifically, there were 265 ransomware incidents detected in November, making it the most active month for ransomware attacks since April. Royal accounted for 16 percent of all attacks, Cuba ransomware made up 15 percent of attacks, and Lockbit 3.0 accounted for 12 percent. Geographically, North America experienced 151 ransomware attacks (45 percent of all incidents) making it the most targeted region. Access the report at NCC Group or read more at SC Media.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar