{"id":17988,"date":"2021-08-16T04:05:48","date_gmt":"2021-08-16T04:05:48","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=17988"},"modified":"2021-08-16T04:05:48","modified_gmt":"2021-08-16T04:05:48","slug":"the-new-trend-of-ransomware-triple-extortion","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/the-new-trend-of-ransomware-triple-extortion\/","title":{"rendered":"The New Trend of Ransomware: Triple Extortion"},"content":{"rendered":"\n<p>Threat actors who specialize in ransomware are always using Double Extortion Tactics in which they not only encrypt the victim\u2019s data but also threaten to leak sensitive data publicly unless the ransom is paid. Double Extortion Tactics first started appearing in late 2019, becoming an increasingly common trend through 2020.<\/p>\n\n\n\n<p>The attack against Allied Universal (<em>American provider of security systems and services; janitorial services; and staffing<\/em>) by the Maze ransomware team in November 2019 is the first published example of a double extortion attack. The Maze ransomware team encrypted their files and system to make them inaccessible and threatened to leak sensitive data if their demands wouldn\u2019t be met. When the victims refused to pay a ransom of 300 Bitcoin (More than $11 million at today&#8217;s rates), the Maze ransomware team published a sample of the stolen files including contracts, medical records, and encryption certificates and retaliated by a new ransom demand that was 50% higher. Since then, Double Extortion Tactics are being copied by different cybercriminal groups all over the world.<\/p>\n\n\n\n<p>In 2021, cybercriminal groups are constantly working to innovate and make their cyberattacks more effective than ever before to ensure payment from their victims. The latest involves Triple Extortion Tactics, which can be seen as an expansion to the Double Extortion Tactics that integrating an additional threat to the process. Here\u2019s how it works:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<ul class=\"wp-block-list\"><li>File encryption: Cybercriminal groups breach a network and encrypt valuable files and systems to make them inaccessible to their victims. Common tactics include malicious attachments or links to malicious downloads and websites in emails and chat messages purporting to be from someone the recipient knows. Victims can be regaining access to their data by pay ransom in hopes of receiving decryption keys or self-recovery by the backup system.<\/li><li>Data theft: Cybercriminal groups extract large quantities of sensitive data before encrypting them. Then they will threaten to publish or sell the sensitive data unless ransom demands are paid. The leakage of sensitive commercial information will result in critical damage to their business reputation, share price, and suffer serious costs to clients and employees. That\u2019s why more and more victims are surrendering to criminal demands and pay the ransom.<\/li><li>Distributed denial-of-service (DDoS) attacks: The DDoS attack is a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. There is no doubt that DDoS attacks have already become a noticeable threat across industries, especially in finance, government, health care, and online gaming. DDoS attacks also target the mission-critical applications that organizations rely on for daily maintenance &nbsp;and operations, like email, database, and CRM, to name a few. As organizations have grown more dependent on Internet applications and services, business continuity and availability have become as essential as electricity. In this context, cybercriminal groups will be prone to launch DDoS attacks targeting the victims\u2019 network or even ripple through victims\u2019 users, clients, service providers, and more. That is designed to apply greater pressure on the victim to cough up the ransom.<\/li><\/ul>\n<\/div><\/div>\n\n\n\n<p>As a global network and cybersecurity leader, NSFOCUS delivers DDoS mitigation solutions including the visibility, scalability, automation, and orchestration required to eliminates all DDoS attacks targeting both customers and infrastructure. Leveraging the power of NSFOCUS DDoS mitigation solutions, we provide comprehensive, multi-layered DDoS protection across physical, virtual, container, cloud, fixed, and mobile infrastructures, helping our customers take proactive steps to protect against extortion.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat actors who specialize in ransomware are always using Double Extortion Tactics in which they not only encrypt the victim\u2019s data but also threaten to leak sensitive data publicly unless the ransom is paid. Double Extortion Tactics first started appearing in late 2019, becoming an increasingly common trend through 2020. The attack against Allied Universal [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":12292,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,15],"tags":[354,356,603,604],"class_list":["post-17988","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-research-reports","tag-cyber-criminal","tag-cybersecurity","tag-ransomware","tag-ransomware-attack"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The New Trend of Ransomware: Triple Extortion - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The New Trend of Ransomware: Triple Extortion - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Threat actors who specialize in ransomware are always using Double Extortion Tactics in which they not only encrypt the victim\u2019s data but also threaten to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/the-new-trend-of-ransomware-triple-extortion\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-16T04:05:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The New Trend of Ransomware: Triple Extortion - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Threat actors who specialize in ransomware are always using Double Extortion Tactics in which they not only encrypt the victim\u2019s data but also threaten to\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/the-new-trend-of-ransomware-triple-extortion\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/the-new-trend-of-ransomware-triple-extortion\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"The New Trend of Ransomware: Triple Extortion\",\"datePublished\":\"2021-08-16T04:05:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/the-new-trend-of-ransomware-triple-extortion\\\/\"},\"wordCount\":581,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/the-new-trend-of-ransomware-triple-extortion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/ransomware.jpg\",\"keywords\":[\"cyber criminal\",\"Cybersecurity\",\"Ransomware\",\"Ransomware attack\"],\"articleSection\":[\"Blog\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/the-new-trend-of-ransomware-triple-extortion\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/the-new-trend-of-ransomware-triple-extortion\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/the-new-trend-of-ransomware-triple-extortion\\\/\",\"name\":\"The New Trend of Ransomware: Triple Extortion - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/the-new-trend-of-ransomware-triple-extortion\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/the-new-trend-of-ransomware-triple-extortion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/ransomware.jpg\",\"datePublished\":\"2021-08-16T04:05:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/the-new-trend-of-ransomware-triple-extortion\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/the-new-trend-of-ransomware-triple-extortion\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/the-new-trend-of-ransomware-triple-extortion\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/ransomware.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/ransomware.jpg\",\"width\":562,\"height\":334,\"caption\":\"Ransomware concept with locked padlock and chains.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/the-new-trend-of-ransomware-triple-extortion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The New Trend of Ransomware: Triple Extortion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The New Trend of Ransomware: Triple Extortion - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"The New Trend of Ransomware: Triple Extortion - NSFOCUS","og_description":"Threat actors who specialize in ransomware are always using Double Extortion Tactics in which they not only encrypt the victim\u2019s data but also threaten to","og_url":"https:\/\/nsfocusglobal.com\/the-new-trend-of-ransomware-triple-extortion\/","og_site_name":"NSFOCUS","article_published_time":"2021-08-16T04:05:48+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"The New Trend of Ransomware: Triple Extortion - NSFOCUS","twitter_description":"Threat actors who specialize in ransomware are always using Double Extortion Tactics in which they not only encrypt the victim\u2019s data but also threaten to","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/the-new-trend-of-ransomware-triple-extortion\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/the-new-trend-of-ransomware-triple-extortion\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"The New Trend of Ransomware: Triple Extortion","datePublished":"2021-08-16T04:05:48+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/the-new-trend-of-ransomware-triple-extortion\/"},"wordCount":581,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/the-new-trend-of-ransomware-triple-extortion\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg","keywords":["cyber criminal","Cybersecurity","Ransomware","Ransomware attack"],"articleSection":["Blog","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/the-new-trend-of-ransomware-triple-extortion\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/the-new-trend-of-ransomware-triple-extortion\/","url":"https:\/\/nsfocusglobal.com\/the-new-trend-of-ransomware-triple-extortion\/","name":"The New Trend of Ransomware: Triple Extortion - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/the-new-trend-of-ransomware-triple-extortion\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/the-new-trend-of-ransomware-triple-extortion\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg","datePublished":"2021-08-16T04:05:48+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/the-new-trend-of-ransomware-triple-extortion\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/the-new-trend-of-ransomware-triple-extortion\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/the-new-trend-of-ransomware-triple-extortion\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/ransomware.jpg","width":562,"height":334,"caption":"Ransomware concept with locked padlock and chains."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/the-new-trend-of-ransomware-triple-extortion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"The New Trend of Ransomware: Triple Extortion"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/17988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=17988"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/17988\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/12292"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=17988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=17988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=17988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}