Breaking
February 6, 2025

How to combat exfiltration-based extortion attacks | usagoldmines.com

The vast majority of cyberattacks are conducted solely to disrupt organizations, but one type of attack has more than just an organization-wide effect; it also has a personal impact.

Conducted primarily by ransomware threat groups, data exfiltration-based extortion is becoming far more prominent -in fact, a notorious Russian ransomware group known as BianLian has recently appeared to shift its approach entirely towards this new trend – and it’s easy to see why. These attacks provide a more lucrative financial outcome for criminals because it preys on the organization’s victims’ strongest fears: humiliation and harm to loved ones, and fear about their personal information being available for years to come on the dark web even if payment has been made for its safe return.

Organizations have become accustomed to encryption-based attacks and realize that paying the required ransom doesn’t guarantee they’ll get their files back. As a result of this, the number of organizations that pay a ransom has reduced and criminals are now bypassing this, choosing to steal sensitive data and threatening to hit organizations where it hurts the most—their reputation and also that of their individual employees.

The steps that attackers take when looking to conduct data exfiltration-based ransomware attacks are:

  • Gain access: The attacker gains access to the victim’s network. (Via vulnerable assets on the network)
  • Locate assets: The attacker locates and secures access to high-value assets
  • Exfiltrate data: The attacker exfiltrates the data to their storage network.
  • Encrypt data: The attacker encrypts data.
  • Demand ransom: The attacker demands a ransom to unlock the data.
  • Threaten to release data: If the ransom isn’t paid, the attacker threatens to publicly or sell the data.

Now that organizations have realized that they don’t get their files back after paying, the number of organizations that pay has reduced, and criminals are responding by changing tactics, going for exfiltration and hitting a company or employee reputation.

Data exfiltration: it’s personal

By stealing sensitive data—like scandalous emails, private emails, photos, or embarrassing secrets—and threatening to make it public, attackers are no longer conducting attacks with the aim of specifically targeting the organization. They are now targeting the individual. And it should not come as a surprise that 80% of ransomware attacks now include data exfiltration.

Most employees will go to great lengths to protect themselves and their families from shame, whether in the C-suite or working at the managerial, executive, or junior levels. Picture a CEO desperate to keep a personal secret out of the headlines. It’s powerful leverage, and while an organization might hold firm and refuse to pay, an individual under intense pressure often will cave.

New attacks require new entry points

So, how do attackers manage to pull this off so frequently? The answer lies in the many unknown and unmanaged assets that lie within an organization. Previously, attackers would look to conduct any breach via the front door, but this is no longer the case. Increasingly, attackers are infiltrating company defenses via the side door of unmanaged and unknown assets. These forgotten devices, rogue endpoints, or unpatched systems often fly under the radar of security teams and are increasingly acting as open doors that give attackers an easy way to enter, steal data, and turn their threats into big paydays.

It is paramount for organizations to lock down their environment by uncovering all hidden devices and unseen vulnerabilities.

Preventing the attack before it takes place

This increase in data exfiltration-based extortion is happening in tandem with the changing cybersecurity landscape. The aid of technological developments such as AI is supercharging attacks on IoT and OT systems simply because they tend to be the weakest link. With the increase in system convergence, unmanaged and unknown devices serve as the ideal jumping-off points to other parts of the network. Once there, attackers stay undetected, biding their time until the opportunity to steal sensitive data or demand ransomware payments presents itself.

Even with organizations stepping up their IT defenses, about 60% of assets remain hidden from security teams, creating massive blind spots. To compound matters, the speed at which attackers conduct attacks is only increasing. Studies indicate that 72% of attackers can locate and exploit an organizations vulnerability in a single day. Furthermore, last year, it was seen that unmanaged, internet-facing assets were the cause of 7 out of 10 beaches.

Organizations worldwide must focus on visibility now more than ever. They must have full visibility and understanding of their entire attack surface. This means identifying and cataloguing every IT, IoT and OT device, whether managed or unmanaged, regardless of its function. Only when the light has been shone on all devices and systems can organizations understand their attack surface and lock down weak points, especially those connected to sensitive data. In doing this, security teams can stay ahead of threat groups looking to infiltrate defenses.

Solid discovery of all devices and systems is critical in preventing breaches that lead to data exfiltration-based extortion. This includes spotting all connected assets, uncovering vulnerabilities, and monitoring new assets or changed network environments. Mapping and monitoring the environment, security teams must act precisely once they identify potential issues.

It can’t be understated how important it is to take action once you’ve encountered a potential weakness in your defenses. Whether mapping how attackers might laterally move across the network or highlighting areas where the network needs strengthening, security teams must be proactive to protect against network vulnerabilities and, in turn, minimize the chances of a data exfiltration-based ransom taking place.

We’ve featured the best identity theft protection.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

​ 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

Laptop makers, I’m begging you for this one simple feature | usagoldmines.com

Super Bowl LIX streaming and viewing options, ranked | usagoldmines.com

I built a maxed-out Raspberry 5 mini PC with an SSD for under $200. You can too | usagoldmines.com

Today’s best laptop deals: Save big on work, school, home use, and gaming | usagoldmines.com

More Windows 11 patch woes, this time with mouse pointers acting up | usagoldmines.com

These tiny security updates make Google Chrome so much better | usagoldmines.com

This uber mini PC packs a Ryzen 9 and 32GB RAM for just $500 | usagoldmines.com

Most HP printer models have these critical security flaws. Update now! | usagoldmines.com

This slim 10K power bank is only $10 today | usagoldmines.com

Corsair’s new pegboard shelf adds workshop chic to your desk | usagoldmines.com

You can now use AI in Teams to improve poor quality video calls | usagoldmines.com

Update now! This 7-Zip exploit bypasses crucial Windows protections | usagoldmines.com

Need a portable laptop monitor? Get this one for just $60 right now | usagoldmines.com

Bill Gates: ‘Intel lost its way’ | usagoldmines.com

Best Chromebooks 2025: Best overall, best battery life, and more | usagoldmines.com

Chrome’s Incognito mode no longer saves copied stuff to clipboard history | usagoldmines.com

OnePlus 13’s Free Double Storage Promo Reaches Final Hours, $500 Cheaper Than Galaxy S25 Ultra Kelle...

Google Photos Adds Digital Watermark for Your Fake, AI-Generated Images Kellen | usagoldmines.com

Threads Now Lets You Share Custom Feeds, Just like Bluesky Khamosh Pathak | usagoldmines.com

How to Clean Your Mac's Keyboard Pranay Parab | usagoldmines.com

Former iPhone 7 Owners Begin Receiving Up to $349 Following Lawsuit Joe Rossignol | usagoldmines.com

Let’s Encrypt halts expiration alerts - but it's for a good reason | usagoldmines.com

2025 Genesis Electrified GV70 review: Wait for the next model year Jonathan M. Gitlin | usagoldmines...

Don’t panic, but an asteroid has a 1.9% chance of hitting Earth in 2032 Stephen Clark | usagoldmines...

US lawmakers push to quickly ban DeepSeek on government devices Ashley Belanger | usagoldmines.com

These tiny security updates make Google Chrome so much better | usagoldmines.com

‘Table for Two’ Encourages You to Pause to Enjoy the Romance of Food Allie Chanthorn Reinmann | usag...

Google Just Launched Gemini 2.0 Flash and Pro for Users and Developers David Nield | usagoldmines.co...

This Ring Doorbell Is Down to Its Lowest Price Ever Pradershika Sharma | usagoldmines.com

All the Gardening Tasks You Should Complete in February Amanda Blum | usagoldmines.com

iOS 18.3.1 Update Coming Soon for iPhones Joe Rossignol | usagoldmines.com

Anker Valentine's Day Sale Offering Big Discounts on Charging Accessories Mitchel Broussard | usagol...

I've seen most of 2025’s flagship robot vacuums and let me tell you, things are about to get weird j...

Invincible season 3 changes Oliver Grayson's shocking and violent coming-of-age moment for the bette...

Veeam backup software has a serious security flaw - here's how to stay safe | usagoldmines.com

Apple's Base 128GB iPhone Storage Tier Needs to Go Tim Hardwick | usagoldmines.com

Leica Announces $329 'LUX Grip' Camera Accessory for iPhone Hartley Charlton | usagoldmines.com

New iPhone Feature for Tracking Lost Baggage Expands to More Airlines Joe Rossignol | usagoldmines.c...

Netflix is getting 2 huge thrillers that I can’t wait for, with Robert De Niro, Gillian Anderson and...

Hurry! It's your last chance to save serious money on the Samsung Galaxy S25 Ultra with these pre-or...

Metal Gear Solid Delta: Snake Eater could launch in August, per new leak dash.wood@futurenet.com (Da...

KitchenAid reveals its color of the year for 2025 – and I want to eat it out of a tub with a spoon ...

Cisco patches critical security issues, so update now | usagoldmines.com

Should you buy Nikon’s new Coolpix P1100? Here are 5 things you need to know about the updated 125x ...

Amazon drops unsubtle hints that Alexa AI is landing soon – 3 things to expect from the new voice as...

Humans not needed: AI-powered autonomous drones fused with RFID technology set to revolutionize ware...

Microsoft authentication system spoofed via phishing attack | usagoldmines.com

ChatGPT Search is now free for everyone, no OpenAI account required – is it time to ditch Google? jo...

Spotify will 'double down' on music in 2025, but does that mean Hi-Fi or AI? | usagoldmines.com

New Nvidia GeForce RTX 5060 Ti and RTX 5060 rumor suggests they could end up being great budget buys...

Does Monster Hunter Wilds have crossplay? | usagoldmines.com

Samsung’s Google Messages rival isn’t dead after all – in fact, it’s just been upgraded jamie.richar...

Zyxel says it won’t patch security flaws in its old routers | usagoldmines.com

Apple's M5 chip is rumored to be in mass production - but we're still waiting for M4 MacBook Airs |...

Garmin users, have your say: will you switch smartwatches after last week's massive outage? matt.eva...

AI-powered cyber threats demand enhanced security awareness for SMEs and supply chains | usagoldmin...

NASA will swap Dragon spacecraft on the ground to return Butch and Suni sooner Eric Berger | usagold...

Netflix is getting 2 huge thrillers that I can’t wait for, with Robert De Niro, Gillian Anderson and...

Ransomware payments declined in 2024 despite well-known, massive hacks Lily Hay Newman, wired.com | ...

BenQ GW2786TC review: A great budget USB-C monitor for your home office | usagoldmines.com

Snapdragon claims 10 percent of the PC market | usagoldmines.com

The Nine Best Audiobook Services in 2025 Emily Long | usagoldmines.com

Get Rid of Contact Photos in iPhone's Mail App Tim Hardwick | usagoldmines.com

Black Ops 6 is my favorite Call of Duty in years, and now you can sample the latest multiplayer maps...

GenAI development is pushing along cloud adoption at a record pace | usagoldmines.com

The Samsung Galaxy Z Fold 7 could be as slim as the Special Edition and still support the S Pen | u...

Microsoft partners with stores in the US and UK to offer an official Xbox Series X and Series S repa...

New OnePlus Mini 13 leak suggests its camera setup won't be as impressive as we thought | usagoldmi...

Even entrepreneurs want to get using AI - here's what they need to know | usagoldmines.com

Invincible season 3 is already laying the groundwork for one of the graphic novel series' bloodiest ...

The Nvidia Shield lives! A new update adds a Dolby Atmos competitor, and a load of other fixes | us...

Five Eyes shares fresh guidance for network edge device security | usagoldmines.com

Meta could launch 6 new AI wearables in 2025, according to leaked memo – here’s what I think they co...

Apple’s foldable iPhone specs hinted at in fresh leak – here are 5 things to expect alexblake.techra...

Android 16 tipped to get big health monitoring upgrade –and your Fitbit could be the first to take a...

Do your Philips Hue lights keep forgetting your last settings? There's now a fix | usagoldmines.com

New Marvel Rivals update adds a stunning Luna Snow skin that I can't wait to buy dash.wood@futurenet...

Monster Hunter Wilds requirements for PC | usagoldmines.com

Paragon spyware cancels contract with Italian government after targeting journalists and citizens ac...

Best video doorbells 2025: Reviews and buying advice | usagoldmines.com

You Can Now Use ChatGPT Search Without Signing In Tim Hardwick | usagoldmines.com

IoT’s botnet problem is up 500% – three things admins must do now | usagoldmines.com

Get ready for even more AI at work - business spending set to double this year | usagoldmines.com

Multimodal AI, the next evolution in customer experience | usagoldmines.com

Beginner developers will want to take advantage of this deal while it lasts | usagoldmines.com

OM System’s new OM-3 is the stunning retro Pen-F reboot and Fujifilm rival we needed | usagoldmines...

NVIDIA SHIELD TV Gets Upgrade 9.2 and There’s Actually New Stuff, Bug Fixes Kellen | usagoldmines.co...

TikTok owner ByteDance has a new AI video creator you have to see to believe erichs211@gmail.com (Er...

Google Gemini's new model is the brainstorming AI partner you've been looking for erichs211@gmail.co...

SUPERb: Chinese researchers just designed and built a flying robot that looks like a precursor to Ma...

Want to rent a $300,000 AMD MI300A supercomputer for free for seven days? Gigabyte wants to hear fro...

Comcast's Super Bowl broadcast won't just look great in Dolby Vision, but it will have Dolby Atmos s...

Disney+ Loses 700,000 Subscribers Following Price Increase Juli Clover | usagoldmines.com

'Stealers' Are an Increasingly Common Mac Malware Juli Clover | usagoldmines.com

The Best Deals on TVs That Will Arrive Before the Super Bowl Amanda Blum | usagoldmines.com

Sonos Lays Off 200 Employees After App Failure Juli Clover | usagoldmines.com

Judge suggests temporary order blocking DOGE from Treasury records Ashley Belanger | usagoldmines.co...

H5N1 bird flu spills over again; Nevada cows hit with different, deadly strain Beth Mole | usagoldmi...

Windows 11’s app store has a solution for gigantic PC game downloads | usagoldmines.com

Researchers Just Found Photo-Scanning Malware on Apple's App Store for the First Time Jake Peterson ...

Leave a Reply