Ransomware, repute, threat: Black Hat Europe in evaluate, 2026 in view
Widespread failures in safety that allow vulnerabilities to be exploited, in addition to the politicisation of expertise resulting in its use by nation-states for cyber crime, have been among the many largest points addressed on the Black Hat Europe convention in London held on the very finish of 2025.
The occasion – one of many closing conferences of the calendar yr and recognized for its demonstrations of offensive strategies, analysis, instruments and coaching – got here on the finish of a yr by which main breaches and vulnerabilities dominated the headlines.
Many main incidents final yr have been broadly described as “cyber assaults” fairly than being labelled extra particularly as ransomware or phishing. Within the case of the Asahi Group incident, the corporate confirmed in its assertion that its servers “have been focused by a ransomware assault” and “we’re withholding particular particulars concerning the cyber assault” to forestall additional harm.
Add assaults involving British retailers to the listing, and 2025 turned much less about who was behind the assault and extra about staying on-line and defending delicate buyer knowledge. Are we transferring away from attribution to nation-states and in direction of safety as a precedence, alongside bettering response? Whereas the cyber trade centered on who was behind which incidents and the place blame lay, maybe the problem is that many assaults now have some type of hacktivist factor.
Opening the occasion, Black Hat founder Jeff Moss claimed that as all “expertise is political” now, any technical choice made has a political consequence.
Citing the “crypto wars” of the Nineties over the usage of the PGP algorithm, ongoing debates over backdoors in expertise, and disinformation campaigns across the 2016 US presidential election, Moss mentioned: “My level is that we’re in a political scenario, whether or not you prefer it or not. I need us to acknowledge that. I don’t like acknowledging it, however that’s the place we’re at, and one of the crucial political issues presently is ransomware.”
Moss additionally referenced declarations about whether or not Chinese language expertise is used at his DEF CON occasion, together with having to substantiate that the occasion doesn’t use Chinese language tech, together with statements concerning the place knowledge is saved.
Ransomware and LockBit
The point out of ransomware was significantly related, because the opening keynote from Max Smeets centered on his expertise working with LockBit knowledge seized by the Nationwide Crime Company (NCA) as a part of 2024’s Operation Cronos. On this case, the NCA infiltrated LockBit programs, captured sufferer knowledge and locked out the controllers – an motion that later evaluation discovered had a “important impression on the group’s actions”.
Smeets mentioned his evaluation of the LockBit knowledge confirmed that ransomware and wiper assaults – the place the main focus is on wiping knowledge fairly than extortion – are more and more getting used. He pointed to incidents such because the latest cyber assault on a Venezuelan tanker, in addition to the 2017 NotPetya assault.
Smeets, a senior researcher on the Middle for Safety Research (CSS) at ETH Zurich, made a number of observations on the state of ransomware primarily based on his examination of LockBit conversations:
- Solely a small variety of LockBit associates make actual cash.
- Negotiation techniques are extremely repetitive and scripted, with associates following a well-known playbook and displaying little variation.
- Pricing is crude and never data-driven, with attackers counting on estimates fairly than deep evaluation to grasp leverage over victims.
- Associates desire transferring to a brand new sufferer fairly than partaking in extended negotiations.
A slide offered by Smeets confirmed that throughout two variations of LockBit, solely eight % of victims paid to have their knowledge decrypted, reinforcing that attackers have a single purpose: to receives a commission. Amongst those who did pay, victims appeared extra continuously in e-mail dialog lists and didn’t seem to pay much less in subsequent incidents.
Smeets additionally highlighted the significance of repute in ransomware operations. Attackers should be trusted to decrypt knowledge and never leak it, and it’s typically simpler to rebuild infrastructure than to rebuild repute.
Vicious and damaging assaults
Chatting with Pc Weekly, Rafe Pilling, director of Risk Intelligence within the Sophos Counter Risk Unit (CTU), mentioned there may be now a greater variety of menace actors coming into the ransomware ecosystem.
“Lots of it was once very a lot Russian-speaking organised crime and their friends,” he mentioned. “Now it’s Western-based, UK-based, English-speaking menace actors and even youngsters getting concerned in ransomware – a few of which find yourself being fairly vicious and damaging assaults.”
On the significance of repute, Pilling defined that ransomware depends on a model that victims have sufficient religion in to imagine they are going to obtain a means out in the event that they pay. If that belief is damaged – for instance, if decryption isn’t supplied – then the repute of the operator is broken.
“There appears to be some type of inverse ratio between the variety of victims you hit directly and the sum of money you make,” Pilling mentioned. “It’s a lot better to hit smaller numbers of victims over an extended time period than to aim a big-bang assault.”
Pilling added that for contemporary ransomware operators similar to BlackCat and LockBit, repute is central to their operations, and that “an enormous a part of the NCA technique for going after LockBit was not simply to disrupt them, however to disrupt and undermine their repute”.
This got here on the finish of a yr by which the UK authorities introduced a crackdown on ransomware funds, and with a invoice presently progressing via the Home of Commons that will require cyber extortion and ransomware assaults to be reported to the federal government inside a specified timeframe. Whereas ransomware is unlikely to vanish, it could develop into much less impactful as new measures are put in place.
The person’s impression
One other recurring theme was the function of customers. Linus Neumann from the Chaos Pc Membership mentioned points across the human issue, arguing that the actual downside lies with “the individuals who constructed and function it”.
Echoing Moss’s feedback about classes from the previous not being adopted, Neumann mentioned too many assaults are nonetheless enabled by human error, whereas an excessive amount of effort is spent on detection and restoration. Prevention, he mentioned, fails far too typically.
“We are going to proceed to fail till we perceive what enterprise does, and wish to speak to staff,” he mentioned, pointing to an inclination accountable customers fairly than fixing the environments constructed for them.
Neumann claimed that “there is no such thing as a unsolved IT safety downside” from his perspective, citing advances similar to two-factor authentication, smartcards and end-to-end encryption – applied sciences that exist however are nonetheless not broadly or persistently deployed.
AI growing amplification and automation
AI was additionally a outstanding subject, with Tenable’s Gavin Millard specializing in applied sciences that he mentioned wouldn’t “destroy the world”, however are as a substitute growing amplification and automation “sooner and at scale”.
Millard warned that organisations with important current safety points and poor remediation processes could also be most weak. He famous that agentic AI may help to cut back the “disclosure to publicity hole” and, if used accurately, handle long-standing hygiene points – whereas additionally acknowledging that it inevitably expands the assault floor.
“To mobilise an agentic military, it must have the appropriate context, and that is the place AI goes to be extremely helpful,” Millard mentioned. He pointed to AI’s capability to deal with patching, noting {that a} poorly utilized patch can deliver down a community, and that AI may help decide which vulnerabilities must be prioritised no matter severity scores.
“We have to have guardrails for agentic AI,” he mentioned. “We have to say [to agents] you possibly can’t patch something that requires a reboot; you possibly can’t patch something that requires admin privileges. You have to outline your coverage function for agentic AI to work with out disrupting operations.”
Safe software program, secure researchers
On the subject of vulnerabilities, Microsoft’s Tom Gallagher mentioned the rules of “safe by design” and “assume breach” as a part of the corporate’s efforts to construct safer merchandise, highlighting how bug bounty programmes and exterior collaboration strengthen software program safety.
A panel additionally examined challenges round vulnerability disclosure and authorized reform, significantly in relation to the UK’s Pc Misuse Act. The dialogue highlighted how reporting vulnerabilities will be dangerous, time-consuming and unrewarded, with researchers going through authorized threats and potential harm to their careers. Held underneath the Chatham Home Rule, the panel concluded that higher incentives and protections are wanted for researchers, and that vulnerability reporting must be handled as a public good.
General, the themes at Black Hat Europe underscored the political, financial and social dimensions of cyber safety – from expertise and repair decisions to company governance round customers and technical hygiene, and the way AI is reshaping the capabilities of each defenders and attackers.
As 2026 begins, new challenges await, and the teachings of 2025 ought to serve organisations effectively. Nonetheless, many of those themes are acquainted and repeatedly mentioned. Are these points genuinely unresolved, or are they merely persistent? The place the trade finds itself on the finish of 2026 could assist to reply that query.

