Dmitry Volkov, CEO of Group-IB, has outlined his cybersecurity prediction for 2026, one in which he is warning of agentic extortion becoming a new form of ransomware, and he has declared that the fight for the safety of tomorrow has to start today.

The world of cybercrime is entering one of its most chaotic phases yet, and the rules of the game are changing. Thanks to rapid advancements in artificial intelligence, what was once science fiction is now becoming our daily reality. Cybercriminals are smarter, faster, and more unpredictable, and businesses will find themselves facing attacks that are not only autonomous but also creative and efficient.
The following insights draw from years of proprietary research and frontline cyber defense, offering a glimpse into the future of cybersecurity. This roadmap outlines the challenges posed by the new underworld— a world ruled by AI-led worms, automated extortion, weaponized APIs, an unstable crypto-ecosystem, and more. The threats of tomorrow are here, and survival will depend on how prepared your defenses are today.
Let’s dive into the trends shaping the upside-down world of cybercrime in 2026 and beyond.
- The silent spread: AI-driven worm epidemic
Self-propagating malware has been around for years, as seen with WannaCry, NotPetya, and Mirai. These malicious strains caused billions of dollars in damage by exploiting vulnerabilities and spreading rapidly. However, 2026 will mark a step change with AI-powered malware. These new worms will autonomously manage the entire attack chain—from identifying vulnerabilities to executing lateral movements—spreading with speed and precision previously unseen. Companies must prepare for this next evolution by investing in detection systems capable of keeping pace with the autonomy of AI-driven threats.
- Agentic extortion: A new form of ransomware?
If you thought ransomware had reached its peak with double and triple extortion tactics, think again. By 2026, ransomware won’t just encrypt files or leak sensitive data—it’ll run like a hyper-efficient enterprise.
AI agents will integrate into Ransomware-as-a-Service (RaaS) platforms, supercharging operations for even the least skilled cybercriminals. These AI-powered bots will execute rapid encryption, destroy backups, and disable defenses in a matter of minutes—all while scaling attacks. Businesses will need to reassess response strategies to mitigate ransomware that operates faster than conventional defensive measures.
- Artificial Intelligence-In-The-Middle Attacks
Identity is the cornerstone of cybersecurity. But in 2026, adversaries will weaponize artificial intelligence to hijack these very identities. Traditional authentication methods like 2FA and biometrics are no longer sufficient as Adversary-in-the-Middle (AiTM) attacks grow more prevalent. By embedding AI into these frameworks, attackers will automate session hijacking and credential harvesting, rendering current verification systems ineffective. In 2026, businesses will require AI-enhanced defenses to counter automated attacks that dynamically adapt to their environments.
- Crypto and stablecoins: A billion-dollar business opportunity or vulnerability?
Crypto’s promise of financial revolution comes with a dark side—one cybercriminals are eagerly exploiting. In 2026, as more banks adopt crypto and stablecoins for faster, more transparent transactions, they’ll also open themselves to new threats.
Fraudsters armed with AI tools will deploy ingenious laundering schemes, from manipulating DeFi systems to exploiting smart contracts. Identity fraud will reach new heights, with crypto and stablecoins fueling entire cybercrime economies.
With trillions at stake, financial institutions must address this double-edged sword, implementing fraud detection systems to outpace criminals who are increasingly ahead of the curve.
- The API wild west
Modern businesses are leveraging cloud and API ecosystems to drive growth and efficiency, with APIs enabling seamless automation and scalability. However, as these systems become increasingly machine-managed, they may also introduce vulnerabilities.
By 2026, AI-driven attacks could target cloud environments by exploiting APIs that control critical functions like permissions, storage, and network settings. This could lead to disruptions or tampered configurations unless robust safeguards are in place.
APIs offer both attackers and defenders the ability to scale operations, making strong governance and proactive monitoring essential to tipping the scales in favor of security.
- Rise in phone scams: Your fear is the power they have over you
Scammers don’t just rely on technology to manipulate users; they psychologically cave them in. The common assumption among digital users is that when “someone” asks them to perform a risky action, they won’t give in. Yet, in high-pressure situations, fear, urgency, or authority overrides logic.
Fraudsters are bypassing outdated methods like asking for OTPs or card details, opting instead to manipulate victims into taking out loans or selling valuable assets. The sophistication and pressure tactics employed by scammers will only increase in 2026, making awareness campaigns and preventative measures critical for mitigating the human element of cybercrime.
- Secure-by-sovereignty, exposed-by-design
Global collaboration in cybersecurity is hindered by increasing data localization regulations. Regionalizing data storage and analysis creates silos that limit collective threat intelligence sharing. Group-IB’s Digital Crime Resistance Centers (DCRCs) address this challenge, enabling regions to use global threat indicators without transferring sensitive data. Organizations must prioritize advanced threat intelligence to combat the rise of cross-border cyber threats.
- Invisible backdoors in AI-assisted code
AI is transforming coding, making software development faster and more efficient. But this progress comes with risks. By 2026, nation-state actors will exploit AI coding tools to introduce invisible backdoors into widely used libraries and software. These hidden vulnerabilities could remain undetected until they’re exploited on a massive scale. Developers and organizations must maintain rigorous code reviews and enforce strict supply-chain security protocols to prevent this scalable threat.
- Unified SOC against AI-driven cybercrime
The traditional Security Operations Center (SOC) model is no longer sufficient in the face of AI-driven threats. By 2026, SOCs must evolve into collaborative Cyber-Fraud Fusion Centers that combine real-time intelligence, continuous monitoring, and cross-functional teamwork to combat AI-driven threats. These centers will unify efforts across cybersecurity, fraud prevention, and risk management to address multi-dimensional threats in minutes, not hours.
- Explainable AI (XAI) as a Necessity
As AI systems take on greater decision-making power in cybersecurity, transparency becomes non-negotiable. Explainable AI (XAI) will be essential by 2026 to ensure that decisions made by AI systems are accountable, auditable, and free of bias.
Without XAI, businesses risk relying on opaque systems that could themselves be gamed by adversaries. The question will no longer be “Where do you use AI?” but “Can you explain what your AI is doing?”
The Fight for Tomorrow Starts Today
The cyber threats of 2026 may sound like scenes from a dystopian thriller, but they’re already brewing in the shadows of the digital landscape.
In this new era, a collaborative approach to fraud intelligence is critical. Additionally, combining predictive threat and fraud intelligence with adversary-centric insights allows organizations to not only understand who is behind these attacks but also anticipate their next moves. Working with trusted partners with “Glocal” capabilities who analyze regional and country-specific cyber threats within the context of cultural, linguistic, and jurisdictional nuances, businesses gain access to highly accurate risk assessments, enabling them to act preemptively and neutralize fraud before it materializes.
The question isn’t whether you’re ready for 2026. It’s whether your defenses are. By embracing these forward-thinking strategies, organizations can stay one step ahead in the race against next-generation cybercrime.





