March 2026 Cyber Threat Landscape: Ransomware, Access Brokers, and Critical Vulnerabilities Drive Global Risks
The cybersecurity threat landscape in March 2026 saw heightened activity, with ransomware attacks, data breaches, and underground access markets shaping a volatile environment. According to Cyble Research & Intelligence Labs (CRIL), financially motivated cybercriminals intensified their operations, targeting industries reliant on uptime or handling sensitive data.
Ransomware Surges, Dominated by Five Major Groups
Ransomware remained the leading attack vector, with 702 incidents recorded globally. Five threat groups Qilin, Akira, The Gentlemen, Dragonforce, and INC Ransom accounted for 56% of all activity, leveraging double-extortion tactics to maximize pressure on victims. The most affected sectors included:
- Construction
- Professional Services
- Manufacturing
- Healthcare
- Energy & Utilities
The U.S. was the primary target, influenced by geopolitical tensions, including those involving Iran.
Compromised Access Market Expands
The sale of unauthorized network access surged, with 20 incidents tracked across cybercrime forums. Professional Services (25%) and Retail (20%) were the most targeted sectors. Three threat actors vexin, holyduxy, and algoyim dominated the market, facilitating ransomware, espionage, and financial fraud.
Data Breaches Expose Massive Volumes of Sensitive Information
CRIL documented 54 significant data breaches, with notable incidents including:
- "nightly" claiming theft of 5TB of data from Hospitality Holdings, including biometric data and CCTV footage.
- XP95 advertising 3.8TB of South African government data for sale.
- A breach exposing 95,000 travel records, including passport and payment details.
Critical Vulnerabilities Exploited at Scale
Attackers actively targeted flaws in CISA’s Known Exploited Vulnerabilities (KEV) catalog, including:
- CVE-2026-20131 (Cisco Secure Firewall Management Center)
- CVE-2025-53521 (F5 BIG-IP APM)
- CVE-2026-20963 (Microsoft SharePoint Server)
- CVE-2026-33017 (Langflow AI)
- CVE-2021-22681 (Rockwell Automation ICS)
Both zero-day exploits and unpatched legacy vulnerabilities were weaponized, highlighting persistent patch management gaps.
Emerging Threats: AI, Supply Chain, and Geopolitical Risks
- AI-Driven Attacks: Threat actors used CyberStrikeAI, an open-source framework, to compromise 600+ Fortinet FortiGate devices across 55 countries.
- Supply Chain Risks: North Korean-linked actors distributed 26 malicious npm packages containing remote access trojans (RATs) via Pastebin and Vercel.
- Geopolitical Cyber Activity: Iran-linked operations are expected to escalate, with potential ransomware and hacktivist campaigns targeting Middle Eastern organizations.
Source: https://thecyberexpress.com/march-2026-threat-landscape/
CRI San Francisco cybersecurity rating report: https://www.rankiteo.com/company/cri-san-francisco
Cybersecurity from Rockwell Automation cybersecurity rating report: https://www.rankiteo.com/company/cybersecurity-from-rockwell-automation
F5 Labs Threat Research cybersecurity rating report: https://www.rankiteo.com/company/f5labs
Fortinet cybersecurity rating report: https://www.rankiteo.com/company/fortinet
"id": "CRICYBF5LFOR1776854731",
"linkid": "cri-san-francisco, cybersecurity-from-rockwell-automation, f5labs, fortinet",
"type": "Vulnerability",
"date": "3/2026",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'industry': 'Hospitality',
'name': 'Hospitality Holdings',
'type': 'private'},
{'industry': 'Public Sector',
'location': 'South Africa',
'name': 'South African government',
'type': 'government'},
{'customers_affected': '95,000', 'industry': 'Travel'},
{'industry': 'Construction'},
{'industry': 'Professional Services'},
{'industry': 'Manufacturing'},
{'industry': 'Healthcare'},
{'industry': 'Energy & Utilities'},
{'industry': 'Retail'}],
'attack_vector': ['double-extortion',
'initial_access_broker',
'zero-day_exploits',
'unpatched_vulnerabilities',
'malicious_npm_packages'],
'data_breach': {'data_exfiltration': 'yes',
'number_of_records_exposed': ['5TB', '3.8TB', '95,000'],
'personally_identifiable_information': 'yes',
'sensitivity_of_data': 'high',
'type_of_data_compromised': ['biometric_data',
'CCTV_footage',
'government_data',
'passport_details',
'payment_information']},
'date_detected': '2026-03',
'date_publicly_disclosed': '2026-03',
'description': 'The cybersecurity threat landscape in March 2026 saw '
'heightened activity, with ransomware attacks, data breaches, '
'and underground access markets shaping a volatile '
'environment. Financially motivated cybercriminals intensified '
'their operations, targeting industries reliant on uptime or '
'handling sensitive data.',
'impact': {'data_compromised': ['5TB (Hospitality Holdings)',
'3.8TB (South African government)',
'95,000 travel records'],
'identity_theft_risk': 'high',
'payment_information_risk': 'high',
'systems_affected': ['Cisco Secure Firewall Management Center',
'F5 BIG-IP APM',
'Microsoft SharePoint Server',
'Langflow AI',
'Rockwell Automation ICS',
'Fortinet FortiGate devices']},
'initial_access_broker': {'data_sold_on_dark_web': 'yes',
'high_value_targets': ['Professional Services',
'Retail']},
'motivation': ['financial_gain', 'espionage', 'geopolitical'],
'post_incident_analysis': {'root_causes': ['unpatched_vulnerabilities',
'supply_chain_compromise',
'geopolitical_tensions']},
'ransomware': {'data_encryption': 'yes',
'data_exfiltration': 'yes',
'ransomware_strain': ['Qilin',
'Akira',
'The Gentlemen',
'Dragonforce',
'INC Ransom']},
'references': [{'date_accessed': '2026-03',
'source': 'Cyble Research & Intelligence Labs (CRIL)'}],
'threat_actor': ['Qilin',
'Akira',
'The Gentlemen',
'Dragonforce',
'INC Ransom',
'vexin',
'holyduxy',
'algoyim',
'North Korean-linked actors',
'Iran-linked actors'],
'title': 'March 2026 Cyber Threat Landscape: Ransomware, Access Brokers, and '
'Critical Vulnerabilities Drive Global Risks',
'type': ['ransomware',
'data_breach',
'unauthorized_access_sale',
'vulnerability_exploitation'],
'vulnerability_exploited': ['CVE-2026-20131 (Cisco Secure Firewall Management '
'Center)',
'CVE-2025-53521 (F5 BIG-IP APM)',
'CVE-2026-20963 (Microsoft SharePoint Server)',
'CVE-2026-33017 (Langflow AI)',
'CVE-2021-22681 (Rockwell Automation ICS)']}