Ransomware threat actors use different techniques to extort money from victims. Some of the main methods include:
Double extortion In a double extortion ransomware attack, the threat actors first
encrypt the victim's data. They then threaten to publicly release exfiltrated data if the
ransom is not paid. This puts additional pressure on the victim to pay the ransom to avoid having
sensitive data leaked. According to analysis from cybersecurity firm
Zscaler, 19 ransomware families adopted double or multi-extortion approaches in 2021. By 2022, this number grew to 44 families using this technique. Groups like Babuk and SnapMC pioneered double extortion ransomware. Other actors like RansomHouse,
BianLian, and Karakurt later adopted it as well.
Multiple extortion Multiple extortion is a variant of double extortion. In addition to encrypting data and threatening to leak it, threat actors also launch DDoS attacks against the victim's website or infrastructure. This adds another element to pressure victims into paying.
Pure extortion In a "pure extortion" or "encryption-less ransomware" attack, the threat actors exfiltrate sensitive data but do not encrypt any files. They threaten to publish the stolen data online if the ransom is not paid. This approach allows threat actors to skip the complex technical work of developing encryptors. Groups like
LAPSUS$ and
Clop have used pure extortion techniques in high-profile attacks. Since victims' systems are not locked, this method tends to cause less disruption and draws less attention from authorities. However, the financial impact on targeted organizations can still be severe. == Prevention ==