Ransomware Claims in 2026: What the Data Tells Underwriters About Pricing Risk

Ransomware claims frequency is shifting again in 2026. Here is what the latest data patterns mean for how underwriters price cyber risk, structure deductibles, and evaluate ransomware-specific endorsements.

Ransomware claims frequency is shifting again in 2026. Here is what the latest data patterns mean for how underwriters price cyber risk, structure deductibles, and evaluate ransomware-specific endorsements.

The ransomware landscape in 2026 does not look like 2021, and it does not look like 2024 either. The threat actors have evolved. The defensive tooling has improved. The regulatory environment has tightened. And the claims data is telling a story that underwriters need to understand if they are going to price risk accurately.

I have been looking at ransomware claims patterns across the European cyber insurance market, and several trends stand out. None of them are comfortable.

The Shift from Encryption to Exfiltration

Two years ago, the typical ransomware claim was about encryption — attackers locked systems, demanded payment for a decryption key, and the insured had to decide whether to pay or restore from backups.

In 2026, the dominant pattern is data exfiltration with extortion. Attackers do not need to encrypt anything. They copy sensitive data — customer records, financial details, trade secrets — and threaten to publish it. This fundamentally changes the loss dynamics:

  • No decryption key to wait for. The damage is done the moment data leaves the network.
  • Regulatory exposure is immediate. Under GDPR, a data breach triggers notification obligations within 72 hours, regardless of whether a ransom is paid.
  • Business interruption is harder to quantify. Unlike encryption events where systems are clearly down, exfiltration events may not cause visible operational disruption — but the financial impact through fines, legal costs, and reputational damage can be larger.

For underwriters, this means traditional BI triggers based on system downtime may not capture the full loss exposure. Policies need to account for extortion costs, regulatory fines (where insurable), and third-party liability arising from data exposure — even when the insured’s operations never stopped.

Claims Frequency Is Up, Severity Is Bimodal

The overall frequency of ransomware claims has increased roughly 15-20% year over year in the European market. But the severity distribution tells a more interesting story:

Small and medium businesses (SMBs): Claims are more frequent but individually smaller. Attackers are using automated tools to target companies with revenue under €50M, demanding ransoms in the €10,000–€50,000 range. Many of these companies lack mature incident response plans, so they pay — and the claims close quickly.

Large enterprises: Claims are less frequent but significantly more severe. When a Fortune 500 or DAX-listed company gets hit, the ransom demand alone can exceed €5M, and total insured losses (including BI, data recovery, legal fees, and regulatory fines) regularly exceed €20M.

This bimodal distribution has pricing implications. A portfolio concentrated in SMB risks will see different loss ratios than one weighted toward large enterprise. Underwriters should be explicit about which segment they are pricing for and adjust their frequency/severity assumptions accordingly.

The Ransom Payment Question

One of the most contested areas in claims handling is whether to allow ransom payments. Several developments in 2026 are relevant:

  1. OFAC and EU sanctions enforcement has become more aggressive. Paying a ransom to a sanctioned entity — even inadvertently — creates legal exposure for both the insured and the insurer.

  2. Law enforcement disruption operations have increased. Europol and national agencies have had notable successes in taking down ransomware infrastructure, which sometimes makes payment unnecessary (data recovered through law enforcement channels).

  3. The “no-negotiation” trend among large insurers. Some carriers now include policy language that discourages or limits ransom payments, instead directing insureds toward incident response firms and data recovery specialists.

For underwriters, the key question is: does your policy language adequately address the ransom payment decision tree? If the insured pays without insurer approval, is that covered? If law enforcement recovers data after payment, is there a clawback mechanism? These details matter.

NIS2 and Its Impact on Claims Behavior

The NIS2 Directive, now in its enforcement phase, is changing how organizations respond to ransomware incidents — and therefore how claims are filed:

  • Mandatory reporting within 24 hours of becoming aware of a significant incident means claims are notified earlier. This is generally good for insurers (earlier intervention, better loss mitigation) but increases administrative costs.
  • Management liability provisions mean that C-suite executives can be held personally liable for inadequate cybersecurity. This is driving demand for D&O coverage alongside cyber policies.
  • Supply chain due diligence requirements mean that an insured’s ransomware incident may trigger claims from their customers and partners — expanding the pool of potential claimants.

Underwriters should be asking about NIS2 compliance as part of their risk assessment. Non-compliant organizations present a higher risk not because they are more likely to be attacked, but because the regulatory consequences of an attack are more severe.

What This Means for Pricing

Based on the trends above, here is how I would think about pricing ransomware risk in 2026:

FactorDirectionPricing Impact
Exfiltration over encryptionUpIncrease third-party limits pricing
SMB claims frequencyUpHigher frequency load for SMB portfolios
Large enterprise severityUpAdequate catastrophe load
Law enforcement disruptionUp (positive)Slight offset on severity
NIS2 regulatory exposureUpCompliance discount for prepared insureds
Sanctions/payment riskUpStricter policy language, possible exclusion

The Bottom Line

Ransomware risk in 2026 is not the same risk it was three years ago. The attack vectors have shifted, the regulatory environment has changed, and the claims patterns reflect both. Underwriters who rely on 2022 vintage loss data and assumptions are likely mispricing risk.

The best underwriting approach today combines:

  1. Updated frequency/severity models that reflect the exfiltration-first attack pattern
  2. Explicit policy language around ransom payments, sanctions compliance, and regulatory exposure
  3. NIS2 compliance assessment as a standard part of the underwriting questionnaire
  4. Portfolio-level analysis that accounts for the bimodal SMB/enterprise distribution

If you are pricing cyber risk in 2026 and not adjusting for these trends, you are flying blind.

Get the full picture with premium access

In-depth reports, assessment tools, and weekly risk intelligence for cyber professionals.

Single Report

€9 per report

24-48 page professional analysis

Browse Reports →
Best Value

Pro Membership

€49 €19 /month

Founding member price — lock it in forever

Unlimited reports + tools + alerts

Subscribe Now →
30-day money-back
Secure via Stripe
Cancel anytime

Free NIS2 Compliance Checklist

Get the free 15-point PDF checklist + NIS2 compliance tips in your inbox.

No spam. Unsubscribe anytime. Privacy Policy

Featured

NIS2 Penalties Explained: Essential vs Important Entities and What They Mean for Coverage

NIS 2 ·

8 min read

NIS2 Underwriting Questions: What Every Cyber Insurance Broker Should Ask

NIS 2 ·

14 min read

Agentic Security: What Underwriters Need to Know in 2026

Agentic AI ·

8 min read

The NIS2 Audit Crunch: What Underwriters Need to Know Before June 30, 2026

NIS 2 ·

10 min read

Premium Report

2026 Cyber Risk Landscape Report

24 pages of threat analysis, claims data, and underwriting implications for European cyber insurance.

View Reports →

Related posts

Agentic Security: What Underwriters Need to Know in 2026
Agentic AI · · 8 min read

Agentic Security: What Underwriters Need to Know in 2026

Autonomous AI agents are entering production at scale — and they bring a completely new attack surface that traditional cyber insurance questionnaires weren't designed to capture.

How AI Is Changing Cyber Risk Assessment
AI Ops · · 1 min read

How AI Is Changing Cyber Risk Assessment

A look at how AI and multi-agent systems are starting to transform the way we evaluate and underwrite cyber risk.

AI in Cyber Underwriting: Attacker, Defender, and Underwriter Perspectives
AI · · 7 min read

AI in Cyber Underwriting: Attacker, Defender, and Underwriter Perspectives

Exploring how AI transforms cyber risk from three angles: how threat actors weaponize it, how security teams deploy it, and how underwriters must adapt their approach.