In the fast-changing world of cyberthreats, new tactics are constantly emerging. One of them is “double extortion,” a sneaky approach that combines traditional ransomware with the threat of disclosure of stolen data. 

What is Double Extortion?

Double extortion is a type of cyber-attack where the attackers not only encrypt the victim's data with a ransomware but also threaten to reveal or disclose the stolen sensitive information unless a ransom is paid. This double layer of pressure makes the attack even more devastating for victims, forcing them to make difficult decisions between recovering data and protecting privacy.

How does it work:

Infiltration: Attackers gain access to victims' systems through methods such as phishing, vulnerabilities or the use of compromised logins.

Encryption: Once inside the system, attackers use ransomware to encrypt data, making it inaccessible to the victim.

Extortion: Instead of just encrypting data, attackers threaten to make the stolen information public. This may include sensitive company data, personal customer information or confidential documents.

Ransom Note: The attackers demand a ransom in cryptocurrencies in exchange for the decryption key and a promise not to disclose the stolen data.

The targets of these attacks are many:

Healthcare Sector Under Attack: During 2023, the healthcare sector was hit by double extortion attacks. Sensitive patient data, including medical records and personal information, was encrypted by the attackers. The latter have threatened to publicly disclose this data, putting the privacy and safety of patients at risk. Healthcare facilities have been forced to strike a difficult balance between recovering data and maintaining patient safety.

Impact on Manufacturing Industry: In 2023, the manufacturing industry fell victim to double extortion attacks that compromised supply chains. The attackers encrypted operational data and threatened to reveal production plans and supply chain management information. This caused significant disruptions in production and jeopardized the competitiveness of the companies involved.

Financial Sector Under Pressure: Financial institutions were hit by double extortion attacks during the year. The attackers targeted sensitive financial data and customer identity information. Threats of public disclosure have undermined trust in financial transactions, prompting victims to seriously consider paying ransoms.


Regular Backups: Maintain regular backups of critical data and ensure they are separated from the main network. This will allow you to restore your data without having to pay the ransom.

Security Planning: Implement stringent security policies, including multi-factor authentication (MFA) and constantly updating system and software patches.

User Awareness: Provide training to employees on identifying phishing and social engineering tactics. Teach them to recognize and report suspicious messages.

Monitoring for anomalous activity: Use intrusion detection systems (IDS) and log analysis systems to identify anomalous activity on the network.

Network Segmentation: Separate your network into segments to limit the spread of any attacks and minimize the impact.


Compromised System Isolation: Immediately isolate compromised systems to prevent the spread of the attack.Forensic Analysis: Conduct a detailed forensic analysis to determine the nature of the attack, the entry point and the extent of the damage.

Involvement of Authorities: Report the incident to the appropriate authorities and work with them to gather evidence and identify the attackers.

Decryption and Recovery: If possible, work with security experts to attempt to decrypt data without paying ransom. Use backup for recovery.

Communication with Interested Parties: Communicate with employees, customers and stakeholders to inform them about the incident, the measures taken and the precautions to be taken.

Involvement of Experts: In case it is necessary, involve external cyber security specialists for assistance in dealing with the attack and mitigating its impact.

2023 has shown that double extortion is an increasingly real and harmful threat in the world of cyber threats. The growing sophistication of attacks requires a holistic approach to cybersecurity, including investments in advanced technologies, user training, and incident response plans. Collaboration between organizations, authorities and cybersecurity experts remains crucial to effectively address the challenges posed by double extortion and protect the sensitive data of organizations and individuals.

Double extortion represents a dangerous evolution of cyber threats. Attackers exploit victims' fear of their sensitive data being leaked to force them to pay. To mitigate this type of attack, investing in robust cybersecurity measures, user education, and incident response plans is critical. Collaboration between organizations and authorities can help prevent and effectively address double extortion threats.

Left B - Web Idea

newsletter image