top of page

Dark Markets, Data Leaks, and Double Extortion: Inside North America's Surging Cyber Threat Matrix

From stolen healthcare records advertised on Telegram to ransomware gangs targeting green architecture firms, the past year has painted a grim picture of North America's cybersecurity landscape. SOCRadar’s latest threat intelligence report, spanning July 2024 to July 2025, reads like a dystopian tech thriller—only it's all real.


And the U.S.? It’s at the epicenter.


America: The Bullseye of the Digital Battlefield


The United States absorbed a staggering 82% of all dark web threat activity in North America and nearly 89% of ransomware attacks. “It’s not just volume,” one analyst noted privately. “It’s about target richness. U.S. organizations are digitally fat, highly networked, and often under-protected.” Financial services, government agencies, and the info sector are prime targets, with financial and insurance companies alone accounting for over 12% of all reported incidents.


Canada and Mexico, while trailing in raw numbers, were by no means spared. Canadian legal services, Mexican manufacturers, and niche ERP software vendors have all found themselves on the wrong side of cybercriminal forums.


The Underground Economy of Breaches


More than half (59%) of dark web threats revolve around selling something: credentials, data dumps, or access. Leaks are often peddled with chilling nonchalance. One 2025 listing offered a CSV file supposedly containing 21 million records from a U.S. health agency—no frills, just "US Healthcare" and a Telegram contact.


Another ad put admin-level access to a Mexican financial platform on the block, promising SQL backend control and digital tax receipts from over 3.5 billion pesos in income. Price: Bitcoin only.


Three-Letter Threats: PLAY, Akira, and RansomHub


When it comes to ransomware, three groups have carved out a dark notoriety. PLAY leads with 9.19% of known attacks, followed closely by RansomHub and Akira. All three use a brutal combo of data theft and encryption—double extortion that forces victims to pay not only for decryption but silence.


PLAY, while newer, exhibits behaviors akin to the defunct Hive gang, using tools like AdFind to probe networks. RansomHub, a self-proclaimed "global coalition of hackers," carefully avoids Russian allies, signaling deep roots in traditional Eastern bloc ransomware operations. Akira, meanwhile, has built a reputation on aesthetics and aggression, targeting everything from schools to finance firms.


Phishing: Still a Favorite, Just Smarter Now


While ransomware grabs headlines, phishing continues to quietly devastate. Nearly 62% of phishing activity is aimed at the U.S., with attackers mimicking everything from Google to government portals. In an ironic twist, most phishing pages (71%) use HTTPS—a protocol meant to convey security—to fool users.


“HTTPS doesn’t mean safe,” the report warns. “It means encrypted. That’s it.”


The most targeted sector? Government. Nearly 1 in 5 phishing attempts aim at public administration, followed closely by information services and the NFT/crypto world.


DDoS: Fast, Furious, and Frequent


The volume of DDoS attacks is nothing short of seismic. With 1.5 million incidents recorded, North America saw average attack durations of 49 minutes and peak bandwidths topping 1857 Gbps. The most common vectors: TCP ACK, ICMP floods, and DNS amplification.


It’s disruption at scale, often just for the lulz—or to cover for more covert attacks unfolding behind the scenes.


What’s the Fix? Not Just Tech—Culture


SOCRadar’s report closes with the usual prescription: multi-factor authentication, endpoint security, employee training. But it also emphasizes something less tangible—culture. “Build a cybersecurity-first mindset,” the analysts urge, stressing that the human layer is often the softest target.


As cybercrime continues to professionalize and decentralize, the line between nation-state ops and freelance mercenaries blurs. It’s not just one ransomware group or phishing site anymore—it’s an ecosystem. And unless businesses and governments alike start treating cyber hygiene like public health, the threat will only escalate.


After all, in the age of dark markets and AI-enhanced attacks, security isn’t a feature—it’s survival.

bottom of page