Tempest Logo
Ransomware Intelligence: Anticipating Campaigns and Monitoring Forums and Leaks

Ransomware Intelligence: Anticipating Campaigns and Monitoring Forums and Leaks

26 de jan. de 2026

Ransomware continues to be one of the most destructive attacks an organization can suffer. Combining extortion, data leakage, and service disruption, this type of attack has evolved from a simple threat, focused on the individual user, to a sophisticated cybercrime model — operating with division of tasks, customized campaigns, and even technical support.

However, while many companies still focus only on backups and antivirus, a more strategic approach has gained traction in recent years: the use of Cyber Threat Intelligence (CTI) to anticipate ransomware campaigns before they happen.

In this article, you will understand how CTI can detect early signs, monitor leaks, identify attack patterns, and strengthen your response against this type of threat.

The evolution of ransomware: from encryption to layered extortion

The first ransomware campaigns focused only on file encryption and demanding payment for release. Today, groups adopt much more aggressive strategies, such as:

  • Double extortion: besides encrypting, they threaten to leak data to publicly pressure the victim.
  • Triple extortion: they threaten customers, partners, or suppliers with the stolen data.
  • RaaS (Ransomware-as-a-Service): operators rent the ransomware to affiliates, decentralizing the attacks.

With this, ransomware has become a collaborative industry. Understanding its operational chain is essential to combat it — and this is where CTI comes in.

The role of Cyber Threat Intelligence in combating ransomware

CTI is not just for reacting to an attack. Its value lies in identifying indicators, behaviors, and the attacker’s infrastructure before the attack happens.

See how CTI works:

🧠 1. Monitoring forums and clandestine channels

  • Identifying criminals who gain access to companies and sell them to other criminals: the Initial Access Brokers (IABs)
  • Observing discussions about new campaigns, attack languages, and target sectors.
  • Following the discovery of new vulnerabilities and their exploitation by the gangs.
  • Monitoring the recruitment of affiliates in various groups.

🔍 2. Detecting initial leaks

  • Tracking leak panels maintained by ransomware groups.
  • Detecting when data from your organization or from partners and suppliers appears — even if the attack has not yet been notified.
  • Creating alerts for keywords, domains, file extensions, and sensitive brands.

⚙️ 3. Infrastructure and TTPs analysis

  • Identifying domains and IPs used in command and control communication or for data exfiltration.
  • Mapping tactics, techniques, and procedures based on the MITRE ATT&CK® framework: a common “language” among industry experts.
  • Providing indicators of attack for detection in EDR, SIEM, and other technologies that can detect the threat through its behavior.

📊 4. Group and campaign profiling

  • Associating vectors, payloads, and modus operandi with known groups, which allows predicting next steps.
  • Using intelligence to inform detection playbooks, Red Team simulations, and proactive hunting.

Practical example: anticipating an attack

Imagine that the CTI team observes on a Russian-language forum that an RDP access to a Brazilian logistics company is being auctioned by an Initial Access Broker.

At the same time, the ransomware group recruits affiliates interested in attacking companies in this sector. Analysts connect the dots.

Based on this, the company:

  • Reviews its remote access and blocks exposed ports.
  • Alerts the SOC to intensify the detection of lateral movement.
  • Prepares communications and reviews the incident response plan.

All this before the attack has even started.

The role of leak panels

Groups like those already mentioned maintain their own leak portals (usually on the dark web). On these sites, they publish:

  • Proofs that they possess stolen data
  • Countdown timers for the “full disclosure” of the stolen data
  • Public threats against companies that do not negotiate

Monitoring these sites with CTI allows:

  • Seeing if your company (or partners) have been compromised
  • Assessing the type of leaked data
  • Anticipating exposure before it becomes a headline in the press

How to start applying CTI against ransomware

  1. Map the most active groups attacking your sector and region.
  2. Implement monitoring of leaks and forums with contextual alerts.
  3. Integrate CTI into your SOC: feed tools with indicators and context.
  4. Update your Red Team and incident response exercises based on real TTPs.
  5. Create risk reports and executive dashboards, based on ransomware profiles and forum movements.

How Resonant can help

You don’t need to wait for ransomware to lock your systems and expose your data to act.

With Resonant’s CTI approach, it’s possible to:

✅ See the signs before intrusion

✅ Prepare your teams and processes based on real threats

✅ Intercept the attack still in the preparation phase

Cybercrime has evolved — and your defense needs to evolve too.

🔎 Want to understand how to structure your intelligence against ransomware? Speak with the Resonant team.

Access our social networks and follow the latest news