
Get 24/7 incident response assistance from our global team
- APAC: +65 3159 4398
- EU & NA: +31 20 890 55 59
- MEA: +971 4 540 6400
- LATAM: +56 2 275 473 79
Get 24/7 incident response assistance from our global team
Please review the following rules before submitting your application:
1. Our main objective is to foster a community of like-minded individuals dedicated to combatting cybercrime and who have never engaged in Blackhat activities.
2. All applications must include research or a research draft. You can find content criteria in the blog. Please provide a link to your research or research draft using the form below.

Group-IB’s March 2026 Intelligence Insights provide a deep dive into four critical pillars: ransomware, hacktivism, compromised accounts and financial fraud.
Unlike aggregated open-source reports, this intelligence is drawn directly from Group-IB’s proprietary telemetry, dark web monitoring and infostealer tracking.
The Gentlemen is the most active and dangerous group, executing 36 attacks in March 2026 – the single highest output of any ransomware group in the region. Qilin remains significant with 12 incidents, followed by Gunra and Payload Ransom with 8 incidents each. Australia and Thailand are jointly the most targeted countries, and manufacturing is the hardest hit sector.
Targeting varies by threat type. For ransomware: Australia and Thailand lead jointly with 18 incidents each; followed by India, Malaysia and Taiwan. For DDoS and hacktivism, India and South Korea together represent approximately 80% of all regional activity. For infostealer-driven account compromise, India accounts for 43% of the regional total. For bank card fraud, India and Japan are the primary targets, contributing nearly half of all cases between them.
Vidar is the dominant malware family in APAC, responsible for nearly 60% of all compromised accounts in March 2026 — up from 48.6% in January 2026. It primarily targets saved passwords, session tokens, and browser cookies, allowing threat actors to access accounts and bypass multi-factor authentication. India, Indonesia and the Philippines are the most heavily affected countries.
Telegram and TG bots together now account for over 93% of all stolen bank card distribution tracked by Group-IB in March 2026. The move to Telegram allows criminals to automate card sales via bots, reach buyers at scale, and reduce their exposure to law enforcement takedowns. Dark web forum monitoring now covers less than 7% of distribution activity, making Telegram channel intelligence the primary detection surface for stolen financial data.
The Gentlemen is a financially motivated ransomware group active since May 2025, with approximately 15 members. Unlike traditional Ransomware-as-a-Service operations, the group distributes tools directly via Tox messenger without an affiliate panel. In March 2026 alone, the group executed 36 attacks across nine APAC countries. Group-IB has published a full TTP overview “Hasta la vista, Hastalamuerte” providing detailed analysis of the group’s tactics, techniques and procedures.
This free report is an essential 15-minute read for APAC Security and Risk Professionals:
If you are responsible for protecting digital assets, customers or national infrastructure in APAC, this report is for you.