
Introduction
You’ve heard of ransomware.
Often victims feel pressured to pay the fee…which is when the threat actor uses double extortion to demand an additional fee. Otherwise they threaten to publish all the data they found in the attack.
Now there’s a third layer being added to the mix, to increase pressure on the victim for more, or higher, payments.
In a triple extortion attack, ransomware actors up the ante.
What Is Triple Extortion?
There are three layers to the attack.
The first extortion is the ransomware itself. Pay a fee, or lose your data forever.
The second extortion is threatening to release your private information, either on the Dark Web or to the public, unless you give them even more money.
This new, third layer of extortion happens when the thief increases the pressure on you to comply with their demands. Oftentimes, they will threaten the victim with Distributed Denial of Service attacks, or by targeting third parties like customers and partners. By threatening to increase the scope of their attack, and to involve important business relationships, triple extortion is a powerful motivator to give the threat actor whatever they want.
Just remember, paying them is no guarantee that they’ll keep their word. Nothing but the word of a criminal promises to return your data or keep it secret. Many people do not fully recover all of their information or privacy. In fact, paying the ransom only emboldens threat actors to continue the crime!
Staying Safe from Ransomware and Extortion
Ransomware attacks affected millions of people all over the globe. So, how can you protect yourself from these cyber-threats?
- Store backups regularly in a secure, offline location.
- Use strong security measures such as firewalls, antivirus software, and intrusion detection systems.
- Keep software and systems up to date with the latest security patches.
- Stay up-to-date about safe online practices. Human error is often the cause of successful cyberattacks!
- Limit access to data based on the principle of least privilege. People should have access to the minimal amount of data necessary for their job.
- Memorize your workplace’s Incident Response Plan. If you’re unsure, ask where to report and what to do if you notice suspicious behavior.
- Segment your network to limit the spread and help contain the damage if an attack occurs.
- Assess and manage the security practices of third-party vendors to ensure they don’t become a weak link.
What Should You Do If Ransomware Threatens You?
When ransomware pops up on your device, it can be very scary and upsetting. That state of mind can cause you to act quickly, and without thinking.
Foremost, remember, never pay the ransom. Most of the time, hackers disappear with your money and data.
- Step 1: Isolate the affected device from the network, and other systems.
- Step 2: Call for help, from your I.T. provider and possibly the authorities.
- Step 3: Damage control to try and recover everything possible.
- Step 4: Clean up with antivirus programs and remove the threat.
If you have the proper backup and storage safeties in place, you shouldn’t have a problem getting your files back.
Conclusion
Ransomware is an increasingly complex, expensive and prolific threat. We must learn their tactics, how to avoid them, and how to recover in order to remain as cyber-safe as possible.
When it comes the evolving threat landscape, we have to stay on-alert and equally adaptive. Especially as threat actors develop new layers to their cyberattacks, preparedness and proactive defense goes a long way.
The post Is Triple Extortion The Next Big Ransomware? appeared first on .