Your hospital lights flicker. Screens freeze. No backups work because some kid in a basement botched the code.
That’s ransomware today — not some nation-state symphony, but a clown show with real body counts. Cynthia Kaiser, ex-deputy assistant director at the FBI’s cyber division, knows this better than most. After two decades chasing Chinese spies and Russian bots, she’s flipped the script. Now at Halcyon’s Ransomware Research Center, she’s screaming from the rooftops: the ransomware wannabes are deadlier than the pros.
Kaiser’s late to the party on this one — admits it herself. Spent years eyeballing existential threats from North Korea, Iran, the usual suspects. Critical infrastructure? Pre-positioned malware? That’s her jam. But ransomware? It crept up, slow and ugly, hitting hospitals, killing patients in the here-and-now.
“I’m also really angry about ransomware because ransomware targets hospitals today, it kills people today.”
She’s not wrong. Last year, ransomware plus extortion drained $155 million from U.S. pockets. Her team’s fresh digs? From Iran-backed Pay2Key smashing a healthcare org to newbie outfits like Sicarii, whose encryptor spits out new keys every time — locking data forever.
Why Do Wannabes Scare Ex-FBI Brass More Than Pros?
Pros like Akira? Slick. Zip from breach to encryption in under an hour. Checkpoint systems in their decryptors? Genius — resume big-file recovery mid-stream, making payouts tempting. Dwell time? Vanished. Two years ago, you had days to spot ‘em. Now? Minutes.
But here’s the kicker, the acerbic truth Kaiser drops: pros want your cash. They test decryptors, offer proofs, play nice(ish). Wannabes? They don’t know their ass from their encryption elbow. Sicarii emerged December — flawed malware galore. Generates fresh crypto keys per run. Pay up? Useless. Data’s gone, poof. No recovery, no negotiation. Just destruction.
And destruction sticks. Businesses fold. Hospitals triage by flashlight. Pros might negotiate down from $10 million; amateurs leave you with zilch.
Iran’s Pay2Key crew? Different beast. Late February hit on U.S. healthcare — right as U.S.-Israel strikes lit up the Middle East. They’d lurked via a compromised admin account for days. Boom: full encryption in three hours. No data theft, which is weird for these extortion pros. Upgraded anti-detection since July. Kaiser links it loosely to Albania 2022 — Iran spied 14 months, then flipped access to ransomware thugs for chaos.
“There’s this really distinct ransomware threat that has some government connections, and it appears in this case it was much more aimed at destruction than just the ransom and financial gain.”
Government shadows make it geopolitical napalm. But even without that, wannabes amplify the mess.
Look, I’ve seen hype cycles before. Remember 2017 WannaCry? Nation-state slop, patched holes. We adapted. But this amateur horde? It’s like Prohibition: mobsters ran tight ships; bootleggers blew up distilleries, poisoned booze. (My unique twist: today’s wannabes echo that — sloppy ops flood the black market with unfixable junk, forcing cyber insurance to crater premiums or bail. Bold call: by 2026, expect a ‘ransomware recession’ in policies, pricing out SMEs.)
Is Ransomware Evolving Too Fast for Defenders?
Akira’s speed? Terrifying. Hundreds of hits last year, most encrypted in four hours flat. No more lolling around post-breach. Defenders — you don’t have the dwell time you used to have, Kaiser warns.
Sicarii’s idiocy? Equally brutal. Flawed encryptor means no keys match post-pay. Victims stare at ransom notes, wallets open, data dust. Halcyon’s probing these ends of the spectrum: polished financial sharks versus greenhorn gorillas.
Kaiser’s pivot? June 2025, she bails FBI for Halcyon. Center launches Black Hat. Targets the scourge head-on. From Pay2Key’s destructive pivot to Sicarii’s self-sabotage, they’re mapping it all.
But here’s the dry humor: pros get faster, we buy EDR toys. Amateurs bumble, and suddenly basic patching — the stuff we skipped for ‘shiny AI defenses’ — is your lifeline. Corporate PR spins ransomware as ‘sophisticated APTs.’ Bull. Half the pain’s from knuckleheads who can’t code a stable lock.
Pay2Key’s upgrade? Massive. Better evasion. No exfil, pure wipeout. Echoes Albania: espionage to smash. Kaiser can’t pin it to war drums definitively, but existing accesses? Goldmine for state proxies. Operationalize anytime. Chilling.
Wannabes thrive in RaaS bazaars. Low barrier — grab a kit, point, encrypt(ish). Result? More attacks, less rationality. Pros haggle; these clowns vanish.
How Did an Ex-FBI Honcho Miss the Ransomware Memo?
Kaiser was nation-state obsessed. China prepositioning on grids? Existential. Russia, Iran, DPRK — her beat as section chief.
“Ransomware was a slower evolution for me to realize that’s who is stealing from us today, that’s the threat facing us today - it’s not the potential catastrophic threat of tomorrow.”
Fair. But anger fuels her now. Hospitals dark? People die. Not tomorrow’s nuke — today’s bleed-out.
Her center’s early wins: dissecting Pay2Key, Sicarii. Broader trend? Double-extortion fading for some; destruction rising. Akira tempts with reliable decrypts. Others? Nah.
Defenders, wake up. Patch like your life depends — it does. Multi-factor everywhere. Segment networks. Test backups offline. Wannabes won’t give second chances; pros might.
This ain’t hype. It’s the new normal: chaos from incompetence trumps precision every time. Pros evolve? Fine, we counter. Amateurs multiply? We’re screwed unless basics harden.
Prediction time — my spin: as RaaS kits cheapen, we’ll see ‘ransomware as protest’ spikes, blending geopolitics with idiocy. Governments nudge proxies; kids ape for lulz. Cyber insurers? They’ll ghost small biz, birthing a black market for underground recovery.
Kaiser’s right to rage. But let’s not wait for her center’s silver bullet. Lock it down, yesterday.
🧬 Related Insights
- Read more: Fake Avast Site Runs Bogus Scan, Drops Venom Stealer on Naive Users
- Read more: Chaos Malware’s Bold Leap: From Routers to Cloud Servers
Frequently Asked Questions
Are ransomware wannabes really more dangerous than professional groups?
Yes — pros want payout and provide working decryptors; amateurs botch it, leaving data irrecoverable forever.
What is Sicarii ransomware and why is it flawed?
New December outfit using RaaS; its encryptor generates new keys each run, making ransom payments pointless.
How can businesses protect against fast-moving ransomware like Akira?
Patch aggressively, enforce MFA, segment networks, and test air-gapped backups — dwell time is dead.