Double extortion is a type of ransomware attack. In this scenario, threat actors hold an organization’s data hostage and demand payment. The ransom amount can vary widely, and threat actors are more likely to demand very high sums—millions of dollars and up—if they believe their victim has no other choice but to comply.
Typically, a double extortion attack includes an encryption-based ransomware attack and an additional data exfiltration attack. Once they have access to sensitive data, threat actors can threaten to publish it, share it with other hackers, or harass users directly.
Making multiple threats helps attackers improve their chances of successfully obtaining a ransom sum. If the victim’s security controls neutralize one tactic, attackers simply move on to the next one.
In a traditional ransomware attack, cybercriminals hold mission-critical data hostage by encrypting it. Then they demand money in exchange for a decryptor that makes the data usable again. This kind of attack surged in frequency during the 2019-2023 COVID pandemic.
Enterprise security leaders responded by implementing secure backups that protected their data from ransomware threats. When attackers encrypted the data, security teams simply recovered it from their backups and continued business as usual.
Cybercriminals now take their ransomware attacks one step further. By exfiltrating the data and analyzing it, they can identify new ways to extort victims who use backups to neutralize ransomware damage. Publishing data or harassing victims puts pressure on companies to pay, even if they successfully block the ransomware attack itself.
Here is a step-by-step example of a typical double extortion attack:
Sometimes, double extortion attackers threaten to publish stolen user data to turn public opinion against the victim, claiming they did too little to protect their users. In other cases, they contact users directly and harass them, or use their sensitive data to steal their identities.
In either case, the initial ransomware threat is just the first phase of a more elaborate attack. This kind of attack is becoming increasingly popular as security leaders become better equipped at mitigating simple ransomware threats.
Since double extortion attacks involve ransomware, securing sensitive data with immutable backups should be an important part of your prevention strategy. However, this won’t prevent the data exfiltration element of the attack.
Data loss prevention (DLP) technology and well-configured next-generation firewalls can help prevent attackers from exfiltrating sensitive data from your network. Designing your network architecture around zero trust principles also makes it harder for attackers to conduct lateral movement and target sensitive data.
However, preventing data loss tends to be more difficult than detecting and responding to exfiltration attempts. Strict prevention-based policies can impact usability in unexpected ways and increase shadow IT risks.
Organizations that attain visibility into network traffic flows and security operations can catch double extortion attempts before threat actors have a chance to launch their attack.
Implementing the SOC Visibility Triad is one of the best ways to ensure rapid, accurate detection of data exfiltration attempts. Combine the following three technologies to reliably alert security teams when sensitive data leaves the network:
Facing a double extortion attack can be much more complex than a typical ransomware scenario. In most cases, cybercriminals will try to leverage your organization’s ethical responsibility to its users to force payment.
By threatening your organization’s users with identity theft and other criminal acts, cybercriminals hope to maximize the pressure to pay. However, there is no guarantee attackers will delete the data they stole upon payment.
In fact, threat actors have no reason to avoid attacking your users anyways. They’ve already stolen the data, after all. This is why the FBI strongly advises against paying.
Many of the strategies for recovering from ransomware attacks apply just as well to double extortion scenarios. Preparing ahead of time by taking out a cyber risk insurance plan can mean the difference between a positive security outcome and disastrous consequences.
Preparing for sophisticated double extortion attacks can be a daunting prospect. Attackers may gain access to your network in a variety of ways and then manipulate your users’ data against you.
Deploy a comprehensive set of best-of-breed security technologies to detect and respond to advanced cyberattacks with Lumifi’s help. Our specialists will provide you with on-demand product expertise with 24x7 monitoring and incident response services powered by Shieldvision, our proprietary SOC automation platform.
We’ve expanded our MDR capabilities with enhanced incident response and security services to better protect against evolving cyber threats.