Ransomware Is a Business, Not a Crime Spree
The popular image of a ransomware attacker is a lone hacker in a hoodie, working from a basement. The reality in 2026 is closer to a well-run franchise operation. Ransomware-as-a-Service (RaaS) groups operate with the structure and discipline of legitimate software companies. They have developers who build and maintain the encryption payload. They have affiliate managers who recruit and support the operators who deploy the ransomware. They have negotiators who handle victim communications and payment processing. Some even have help desks that walk victims through purchasing cryptocurrency and submitting payment. This is organised crime operating at industrial scale, and South African organisations are firmly in the crosshairs.
How the RaaS Business Model Works
RaaS operators build the ransomware platform and recruit affiliates through dark web forums. Affiliates pay for access, either through an upfront fee, a subscription, or a revenue share on successful ransoms (typically 20-30% to the operator, 70-80% to the affiliate). Initial access brokers sell compromised credentials and VPN access to affiliates for a separate fee. Each role specialises, creating an efficient supply chain where no single actor needs end-to-end capability.
R2.7bn+
estimated ransomware losses in South Africa in 2025
70-80%
of ransom payments go to the affiliate who deployed the attack
21 days
average time from initial access to ransomware deployment
Double and Triple Extortion: Raising the Stakes
The original ransomware model was straightforward: encrypt the victim's data and demand payment for the decryption key. When organisations improved their backup strategies and began recovering without paying, attackers adapted. Double extortion adds data theft to the equation. Before encrypting systems, the attackers exfiltrate sensitive data and threaten to publish it on leak sites if the ransom is not paid. Triple extortion goes further, targeting the victim's customers, partners, or patients directly. South African organisations handling personal information under POPIA face a particularly harsh calculus. A data breach requires notification to the Information Regulator and affected data subjects.
Ransomware groups do not hack for ideology or curiosity. They are profit-maximising businesses. They target organisations that can pay, that have inadequate defences, and that have data worth stealing. South African enterprises tick all three boxes with alarming frequency.
Why Traditional Antivirus Fails Against RaaS
Signature-based antivirus was designed for a world where malware was written once and deployed widely. RaaS operations generate unique payloads for each affiliate, each campaign, and sometimes each target. Polymorphic code, fileless execution techniques, living-off-the-land binaries, and encrypted command-and-control channels render traditional AV largely ineffective. Moreover, RaaS affiliates typically spend days or weeks inside a network before deploying ransomware, using legitimate administrative tools like PowerShell, PsExec, and Remote Desktop Protocol. None of these activities trigger traditional antivirus alerts because the tools themselves are legitimate.
Building Ransomware Resilience
Effective ransomware defence is not a single technology. It is a layered strategy that assumes breach and focuses on containment, detection, and recovery. Start with Zero Trust principles: least-privilege access, micro-segmentation, and continuous verification. Implement robust, tested, air-gapped backups. Deploy endpoint detection and response across every endpoint, including servers. Run tabletop exercises that simulate ransomware scenarios. Include your legal team, communications team, executive leadership, and your cyber insurance provider.
The Ransomware Resilience Checklist
Verify that your backups are immutable, air-gapped, and tested quarterly. Confirm that no single compromised account can reach your backup infrastructure. Ensure EDR coverage on 100% of endpoints, including legacy systems. Validate that your incident response plan has been exercised in the last six months. Confirm your cyber insurance policy covers ransomware, data extortion, and business interruption. If any of these are not in place, you have work to do before the next affiliate campaign targets your sector.
Sources & Further Reading
Evaluate your ransomware resilience
Talk to our security advisory team about your specific environment.
Book a Briefing
