Ransomware attacks are levelling up extortion tactics

Representational image depecting cybersecurity protection
(Image credit: Shutterstock)

Ransomware attacks have been a significant issue for organizations in recent years as more and more malware gangs become adept at extracting money, usually in the form of cryptocurrencies, from businesses. 

New research from Venafi  shows us how ransomware is evolving over time to become more sophisticated and, crucially, harder to mitigate. 

According to its survey of 600 IT workers across the US, UK, France, and Germany, attacks are increasingly using new threats to scare organisations into complying. 

Double extortion

The study found 83% of successful ransomware attacks now include alternative extortion methods to try and squeeze money out of their victims.

This includes 38% of ransomware attacks using stolen data to extort customers, 35% threaten to expose data on the dark web, and 32% inform customers their data has been stolen, relying on the implicit threat contained within. 

Worryingly, 18% of those who paid the ransomware demands still had their data exposed on the dark web. Only 8% refused to pay the ransom and faced the consequences - and a stunning 35% of victims who paid were still unable to access their data.  

“Ransomware attacks have become much more dangerous. They have evolved beyond basic security defenses and business continuity techniques like next-gen antivirus and backups,” said Kevin Bocek, vice president of business development and threat intelligence at Venafi. 

“Organizations are unprepared to defend against ransomware that exfiltrates data, so they pay the ransom, but this only motivates attackers to seek more. The bad news is that attackers are following through on extortion threats, even after the ransom has been paid! This means CISOs are under much more pressure because a successful attack is much more likely to create a full-scale service disruption that affects customers.”

On the rise 

Ransomware has been a menace for companies for several years but the increase in value of cryptocurrencies, the main vector through which attackers get paid, seems to only have increased the devastating practice.

The study found nearly three-quarters (72%) of those surveyed agreeing ransomware attacks are evolving faster than the security controls needed to protect against them.

As a result, 76% of companies said they planned to spend more in 2022 on ransomware-specific controls due to the threat of double and triple extortion.

Such attacks lock up internal IT systems and then extort organisations into giving them large quantities of currency to return data and control. 

A recent example came from the REvil gang, which at one point was dominating the global ransomware scene. The risks are clear, however: REvil was taken off-line by a multinational law enforcement effort. 

Max Slater-Robins has been writing about technology for nearly a decade at various outlets, covering the rise of the technology giants, trends in enterprise and SaaS companies, and much more besides. Originally from Suffolk, he currently lives in London and likes a good night out and walks in the countryside.

Read more
Concept art representing cybersecurity principles
How to combat exfiltration-based extortion attacks
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
Less than half of ransomware incidents end in payment - but you should still be on your guard
Hands typing on a keyboard surrounded by security icons
35 years on: The history and evolution of ransomware
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
More reports claim 2024 was the worst year for ransomware attacks yet
A computer being guarded by cybersecurity.
The impact of the cyber insurance industry in resilience against ransomware
Ransomware attack on a computer
Ransomware attacks surged in 2024 as hackers looked to strike faster than ever
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras