Why Are Ransomware Gangs Shifting to Extortion Over Encryption?

default-cybersecurity-insiders-image

Ransomware attacks have evolved significantly over the years, with cybercriminals constantly refining their methods to extract the maximum financial gain from their victims. Traditionally, ransomware gangs would encrypt a victim’s files and demand a ransom in exchange for the decryption key. However, in recent times, there has been a noticeable shift: many ransomware groups are prioritizing extortion over encryption. But why is this happening? Let’s explore the factors driving this significant shift in tactics.

1. The Risk of Law Enforcement and Increased Pressure on Ransomware Gangs

As law enforcement agencies and cybersecurity companies ramp up their efforts to track and dismantle ransomware operations, many groups are realizing that encryption-based ransom demands are increasingly risky.

• Law enforcement pressure: Governments worldwide, including the U.S. and European nations, have been investing heavily in taking down ransomware gangs. Task forces like the FBI’s “Cyber Division” and international partnerships like Europol have made significant headway in arresting key figures in cybercrime groups. This has forced criminals to rethink their approach.

• Crypto-tracking technologies: Cryptocurrencies, traditionally the medium of payment for ransom, are under growing scrutiny. Blockchain analysis tools can now trace cryptocurrency transactions, allowing authorities to track payments and potentially identify perpetrators. The anonymity that ransomware groups once relied on has become less reliable.

2. Easier and Less Risky Extortion Tactics

The traditional encryption-based model requires technical expertise and effort—ransomware developers must create encryption algorithms, design ransom notes, and maintain command-and-control infrastructure. On the other hand, extortion-based methods are simpler and less risky.

• Data theft and threats: Instead of encrypting files, many ransomware gangs now focus on stealing sensitive data and threatening to release it publicly if the victim does not comply with their demands. This method has several benefits:

o Less technical effort: Stealing data is easier than encrypting it, as it often only requires a data breach rather than complex cryptographic work.

o Fewer traces: Extortion-based attacks leave fewer traces than encryption, as there’s no need for ransomware deployment or file encryption that might alert defenders or security systems.

• Multiple leverage points: Ransomware gangs no longer just threaten to encrypt data. They also threaten to expose confidential information, trade secrets, or personal data. This puts additional pressure on victims, especially in sectors where reputation or legal compliance is crucial, such as healthcare, finance, and legal services.

3. Ransomware-as-a-Service (RaaS) Models and Increased Profits

Ransomware gangs are increasingly operating under a Ransomware-as-a-Service (RaaS) model, where developers lease out their malware to other criminals. In this model, the ransomware creators get a cut of the profits, which means there are more people involved in the business.

• Low-risk, high-reward: Extortion is particularly appealing in a RaaS model because it doesn’t require the extensive setup of encryption infrastructure. This makes it easier for low-skilled criminals to carry out attacks, multiplying the number of potential attacks.

• flexible extortion methods: Gangs can target a wide range of victims, from small businesses to large enterprises, leveraging not just encryption but also threats like DDoS attacks, leaking personal information, and threatening to ruin a victim’s reputation.

4. A New Era of “Double Extortion”

The rise of double extortion has been a game-changer in the world of cybercrime. This approach combines encryption with extortion: the attackers encrypt the data and demand payment to unlock it, but they also steal a copy of the data and threaten to leak it unless an additional payment is made.

•Increased leverage: By combining both methods, ransomware gangs have more bargaining power. They now have two separate threats to hold over their victims: the possibility of losing access to critical data and the potential exposure of sensitive information.

• Diversified targets: Double extortion tactics are especially effective against organizations that value their reputation and the confidentiality of their data. In industries like healthcare, where patient privacy is paramount, the threat of data exposure can be even more damaging than the loss of access to data itself.

5. Victim Payment Tendencies and Greater Financial Incentives

One of the primary reasons extortion tactics are becoming more popular is that they often result in quicker payments and higher payouts.

• Psychological impact: The fear of having sensitive data released to the public can be a powerful motivator for businesses or individuals to pay up quickly. This is especially true when the data being threatened is highly sensitive, such as customer information or intellectual property.

• More lucrative for attackers: In some cases, victims may even pay for data they already have backups of, simply to prevent reputational damage or to avoid the potential fallout of a public breach. This has made extortion a more financially attractive option than traditional ransomware encryption.

6. Evolving Business Models of Cybercriminals

Ransomware gangs are increasingly behaving like businesses, with a clear focus on profitability, scalability, and sustainability. The shift toward extortion fits neatly with this business-like approach, as it allows for the extraction of more money in different ways.

• Data as a commodity: Stolen data is now a valuable commodity on the black market. For some ransomware gangs, especially those linked to larger criminal syndicates, selling stolen data (e.g., customer databases, intellectual property) can be just as profitable, if not more so, than demanding ransom.

• Reputation economy: For certain ransomware gangs, a well-known reputation for leaking sensitive data can act as a brand in and of itself, attracting more high-profile targets and bigger payouts.

7. Legal and Regulatory Implications

The growing legal landscape surrounding cybersecurity is pushing some criminals to adopt extortion tactics. New regulations like the General Data Protection Regulation (GDPR) in Europe and the California Consumer Privacy Act (CCPA) have made data breaches far more expensive for organizations, as they may be liable for fines if sensitive data is exposed.

• Pressure from regulations: Extorting data rather than encrypting it can have more immediate and longer-term consequences for victims, including large fines and legal battles. This increases the leverage for cybercriminals and makes their attacks even more effective.

Conclusion

The evolution of ransomware tactics from encryption to extortion reflects a larger trend in cybercrime, where attackers are adapting to the evolving digital landscape, law enforcement pressures, and the increasing profitability of stolen data. Extortion-based attacks, particularly those involving data theft and the threat of exposure, provide criminals with greater leverage, more opportunities to extract payments, and a more sustainable business model.

As the ransomware landscape continues to evolve, organizations must remain vigilant, continuously update their cybersecurity defenses, and prepare for the increasing sophistication of these malicious actors.

Join our LinkedIn group Information Security Community!

Naveen Goud
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display