• WRAVEN
  • Posts
  • The Ransomware Boom Isn't Slowing Down: Here's Who's Getting Hit

The Ransomware Boom Isn't Slowing Down: Here's Who's Getting Hit

Ransomware attacks in the U.S. are up 49% in 2025, with SMBs as primary targets. WRAVEN breaks down who’s behind it, why it’s working, and how Michigan is being hit.

Over the past six months, ransomware activity across the U.S. has surged, up 49% compared to the same period last year. The groups behind the most damage? Qilin, SafePay, and Akira.

These are Ransomware-as-a-Service (RaaS) groups. They license out their tools to affiliates, making it easy for low-skill attackers to launch high-impact campaigns. Their targets aren’t massive corporations. They’re going after small and mid-sized businesses (SMBs).

Who's Getting Targeted

Most victims are organizations with limited resources and underpowered IT teams:

  • Construction and engineering firms

  • Small manufacturers

  • Regional IT providers

  • Healthcare systems

  • Local governments

In the first half of 2025, there were 4,198 reported ransomware cases in the U.S. Nearly half affected businesses directly. One survey found 72% of U.S. organizations experienced a ransomware incident in the past year. The average recovery cost was $4.5 million.

What's Happening in Michigan

Michigan has seen its own wave of attacks. One of the most significant incidents involved McLaren Health Care, a large medical system in the state. The breach affected more than 740,000 individuals, exposing sensitive patient and staff data, including Social Security numbers and medical records.

Outside of healthcare, local businesses in manufacturing and tech have seen an increase in phishing and credential theft attempts. These are two of the most common ways ransomware groups gain initial access.

Some organizations in the state have started to implement stronger defenses:

  • Multi-factor authentication

  • Offline backups

  • Basic endpoint detection

  • Phishing awareness training

Still, many remain vulnerable. RaaS operators see that as opportunity.

WRAVEN's Perspective

We’re tracking Qilin, SafePay, and Akira through our internal WATCHTOWER dashboard. These groups continue to evolve rapidly, adapting to new defenses and using double extortion tactics to pressure victims into paying.

Security is no longer optional. Small targets are still targets.

If your organization has weak backups, exposed services, or reused passwords, you're on the list.

Want WRAVEN to take a look?

If you’re part of a local business, nonprofit, or organization and want a second set of eyes on your cybersecurity posture, we’re happy to help. WRAVEN works with small teams to assess risk, offer practical guidance, and strengthen defenses: free of charge.

We also welcome sponsorships, project collaboration, and speaking opportunities.

Get in touch: [email protected]

Or learn more at wraven.org

Let’s keep Michigan a little harder to breach.

Sources