Threat Intelligence Spotlight Report

Threat Intelligence

March 18, 2026

February Threat Intelligence Spotlight Report

Each month, our Cyber Threat Intelligence team compiles data from our engagements to determine key industry trends. We look at the initial access methods threat actors are using to gain entry into a network, types of incidents most commonly impacting organizations, which sectors are being more heavily targeted, and which threat groups are most prevalent. 

 

Our Methodology 

  • Kroll CTI monthly spotlights are based on intelligence from Kroll’s cyber incident response engagements where we are engaged to respond, manage, or mitigate a cybersecurity incident.
  • Kroll’s incident response work is informed by intelligence gained from the 3,000+ engagements handled per year by the Kroll Cyber Risk team. 
  • Data is collected and processed by the Kroll Cyber Threat Intelligence team during the initial scoping intake as well as during the lifecycle of a Kroll engagement. 

Download the February Report

We will use this information to respond to your inquiry and process your data in accordance with our privacy policy.

Industry Analysis

  • Finance and Insurance was the most impacted industry in February 2026
  • Email Compromise was the top threat incident type impacting the Finance and Insurance industry.
  • In February, threats against the Finance and Insurance industry most often involved Phishing: Non-Technical as the initial access method.
  • Professional, Scientific, and Technical Services was the 2nd most impacted industry in February 2026.
  • Unauthorized Access and Ransomware were the top reported threat incident types impacting the Professional, Scientific, and Technical Services industry.
  • In February, threats against the Professional, Scientific, and Technical Services industry most often involved External Remote Servics as the initial access method.
     

Ransomware Analysis

  • INC was the most common ransomware variant observed by Kroll in February 2026.
  • In February, Professional, Scientific, and Technical Services was the top industry targeted by ransomware actors across Kroll engagements.
  • Ransomware actors primarily gained initial access through External Remote Services, such as VPN. The most frequently observed VPN was Fortinet Firewall.
  • Manufacturing was the top industry for victims posted to ransomware actor-controlled shaming sites and blogs.
  • North America was the top region for victims posted to ransomware actor-controlled shaming sites and blogs.

Stay Ahead with Kroll

24x7 Incident Response

Kroll is the largest global IR provider with experienced responders who can handle the entire security incident lifecycle.

Cyber Risk Retainer

Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services.

Computer Forensics

Kroll's computer forensics experts ensure that no digital evidence is overlooked and assist at any stage of an investigation or litigation, regardless of the number or location of data sources.

Mobile Device Forensics

With a global mobile device forensics team and a proven track record in investigation and litigation support, Kroll enables key digital insights to be accessed quickly and securely.