{"id":44137,"date":"2022-08-10T17:52:15","date_gmt":"2022-08-10T14:52:15","guid":{"rendered":"http:\/\/datalabsua.com\/ua\/?p=44137"},"modified":"2024-05-23T11:50:49","modified_gmt":"2024-05-23T08:50:49","slug":"double-ransomware-extortion","status":"publish","type":"post","link":"https:\/\/datalabsua.com\/en\/double-ransomware-extortion\/","title":{"rendered":"Double Ransomware Extortion"},"content":{"rendered":"<p>In parallel with Internet and technology development, there is an increase in cyberattacks. Each time, cybercriminals develop new, more complex and dangerous ways to use networks and servers. Double extortion ransomware attacks first appeared in 2020. Now it\u2019s a serious threat to the largest companies and organizations. Its actions can lead to devastating consequences. Therefore, to ensure the safety of the company is a high priority.<\/p>\n<p><strong>Ransomware<\/strong> is malware that steals data, encrypts it, and then demands a ransom for it. The ransom amount can range from hundreds to millions of dollars. Basically, the payment of the ransom is required in cryptocurrency.<\/p>\n<p><em>Learn more about ransomware <strong><a href=\"https:\/\/datalabsua.com\/en\/how-to-avoid-becoming-a-ransomware-victim\/\">here<\/a><\/strong><\/em><\/p>\n<p><strong>Double ransomware<\/strong> <strong>extortion<\/strong> is a new level of \u00abtraditional\u00bb ransomware attack. In this case, the cybercriminal also uses the victim&#8217;s data, files, server, etc., encrypts them and demands a ransom for them. However, in the double extortion case, the cybercriminal threatens to publish\/sell the victim&#8217;s sensitive data on the dark web if the ransom is not paid within the specified time frame. Backups can help in the matter of data recovery, but the damage from getting confidential information to the dark web doesn\u2019t reduce.<\/p>\n<p>Typically, attackers target medical facilities, schools and other educational institutions, legal organizations, etc., where a large amount of confidential information is stored. The compromise of such data can completely destroy both organizations and people. This is what makes double extortion attacks so dangerous.<\/p>\n<p><strong>Ways to gain access to confidential data<\/strong>:<\/p>\n<ul>\n<li>Phishing attacks;<\/li>\n<li>Malicious software;<\/li>\n<li>Exploitation of vulnerabilities;<\/li>\n<li>Brute force attacks;<\/li>\n<li>Data leakage;<\/li>\n<li>Theft of credentials;<\/li>\n<\/ul>\n<p><strong>The most popular programs<\/strong> <strong>for double-ransomware extortion are:<\/strong><\/p>\n<ol>\n<li>Netwalker Ransomware \u2013 malware for the Windows operating system that encrypts and moves data and requires a ransom;<\/li>\n<li>Egregor Ransomware \u2013 the program breaks into confidential data, encrypts it and demands a ransom payment for it within 3 days. Also, some of the data is published on the darknet as evidence that criminals have data;<\/li>\n<li><a href=\"https:\/\/datalabsua.com\/en\/what-is-ransomware\/\">Ransomware as a service (RaaS)<\/a> is a subscription-based ransomware model for affiliates. Partners use a set of tools to carry out an attack, and if successful, receive a percentage of the ransom;<\/li>\n<li>Sodinokibi (Ransomware Evil) \u2013 ransomware that encrypts data and then deletes the ransom message;<\/li>\n<li>Conti \u2013 a rather dangerous type of attack due to the speed of encryption, it spreads very quickly and infects other systems.<\/li>\n<\/ol>\n<p><strong>The sequence for performing a double ransomware attack is:<\/strong><\/p>\n<ul>\n<li>Gaining access to the victim&#8217;s system;<\/li>\n<li>Investigation of the network by an attacker for confidential data;<\/li>\n<li>Data extraction;<\/li>\n<li>Deployment of ransomware on the victim&#8217;s system;<\/li>\n<li>Data encryption;<\/li>\n<li>Denial of access to data by the victim;<\/li>\n<li>Requirement and conditions of ransom;<\/li>\n<li>If a ransom is paid, the data must be returned to the owner and access granted;<\/li>\n<li>If the ransom is refused, the data is sold or destroyed.<\/li>\n<\/ul>\n<p>Cybercriminals don\u2019t follow ethical norms and rules. If the victim refuses to pay the ransom, there will definitely be consequences. But even if the ransom is paid on time, there is no guarantee that the data will be fully and safely returned to the legal owner. Attackers don&#8217;t care whose lives or companies they destroy. They have their own interest, which must be satisfied.<\/p>\n<p><strong>How to prevent this type of attack:<\/strong><\/p>\n<ul>\n<li>Implementation of a zero-trust architecture (applications, websites, emails, links must go through a strict authentication process);<\/li>\n<li>Application and compliance with security protocols and policies;<\/li>\n<li>Ensuring security and regular updating of software and protocols;<\/li>\n<li>Training of users to understand the essence of the attack, its devastating consequences and influence at the company and the individual employee, possible ways to prevent attacks, etc.;<\/li>\n<li>Implementation of comprehensive solutions to protect against ransomware attacks.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Double ransomware extortion is a new level of \u00abtraditional\u00bb ransomware attack. In this case, the cybercriminal also uses the victim&#8217;s data, files, server, etc., encrypts them and demands a ransom for them. However, in the double extortion case, the cybercriminal threatens to publish\/sell the victim&#8217;s sensitive data on the dark web if the ransom is not paid within the specified time frame. Backups can help in the matter of data recovery, but the damage from getting confidential information to the dark web doesn\u2019t reduce.<\/p>\n","protected":false},"author":2,"featured_media":44870,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[149,29],"class_list":["post-44137","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-ransomware","tag-cybersecurity"],"_links":{"self":[{"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/posts\/44137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/comments?post=44137"}],"version-history":[{"count":4,"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/posts\/44137\/revisions"}],"predecessor-version":[{"id":44142,"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/posts\/44137\/revisions\/44142"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/media\/44870"}],"wp:attachment":[{"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/media?parent=44137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/categories?post=44137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/datalabsua.com\/en\/wp-json\/wp\/v2\/tags?post=44137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}