In 2019, the Maze ransomware group changed the game forever. Instead of simply encrypting files and demanding payment, they began stealing sensitive data before deploying encryption, then threatening to publish it on a public leak site. This "double extortion" tactic has since become the standard operating procedure for the majority of ransomware gangs.
Double extortion fundamentally changes the ransomware calculus. Having reliable backups is no longer sufficient. Even if you can restore every encrypted file, the threat of sensitive data being published on the internet creates a second, independent pressure to pay. This guide explains how it works and what you can do about it.
How Double Extortion Works
The Attack Timeline
Phase 1: Initial Access
Day 0Attackers gain entry through phishing, exploited vulnerabilities, or compromised credentials. This phase is identical to traditional ransomware.
Phase 2: Reconnaissance
Days 1-3Attackers map the network, identify high-value targets, locate sensitive data repositories, and escalate privileges. They also identify and target backup systems.
Phase 3: Data Exfiltration
Days 3-7Before encrypting anything, attackers quietly exfiltrate sensitive data to external servers. This may include customer records, financial data, intellectual property, employee information, and trade secrets.
Phase 4: Encryption
Day 7+Only after the data is safely exfiltrated do attackers deploy the ransomware payload to encrypt files across the network.
Phase 5: Double Extortion
Day 7+The ransom note includes proof of data theft (file listings or samples) and threatens to publish the stolen data on a dedicated leak site if the ransom is not paid within the deadline.
Why Double Extortion Is More Dangerous
Backups alone are not enough
Even with perfect immutable backups, the threat of data exposure creates independent pressure to pay. Your data is already in the attackers' hands.
Regulatory consequences multiply
Data exfiltration triggers breach notification laws (HIPAA, GDPR, state privacy laws). The regulatory fines and legal costs from a data breach often exceed the ransom itself.
Reputational damage is permanent
Once sensitive data is published on a leak site, it is indexed, archived, and impossible to fully remove from the internet. The reputational damage can persist for years.
Third-party liability expands
When customer, patient, or partner data is exposed, the victim organization faces lawsuits from affected parties. Class action suits after data breaches regularly result in multi-million dollar settlements.
Leverage is maximized
Attackers use samples of stolen data to prove they have it, then escalate pressure by releasing data in stages. Some groups directly contact customers or partners to apply additional pressure.
The Leak Site Ecosystem
Major ransomware groups operate dedicated leak sites on the dark web (and sometimes the open web) where they publish stolen data from victims who refuse to pay. These sites serve as both a punishment mechanism and a marketing tool to pressure future victims.
Groups like LockBit, BlackCat (ALPHV), Clop, and Play maintain professional-looking portals with countdown timers, searchable archives of leaked data, and even press releases announcing new victims. The data published typically includes:
Defending Against Double Extortion
Because double extortion combines encryption with data theft, your defense strategy must address both threats. This requires a more comprehensive approach than traditional ransomware defense.
Data Loss Prevention (DLP)
Monitor and control the flow of sensitive data. Alert on unusual data transfers, large file movements, and connections to suspicious external destinations.
Network Segmentation
Limit what data attackers can access by segmenting your network. Even if one segment is compromised, others remain protected.
Encryption at Rest
Encrypt sensitive data at rest so that even if exfiltrated, the data is useless to attackers without the encryption keys.
Outbound Traffic Monitoring
Monitor and alert on unusual outbound data transfers. Exfiltration of large datasets creates detectable network anomalies.
Additional Defense Measures
Key Takeaways
- Double extortion is now the standard — over 70% of ransomware attacks include data theft
- Backups protect against encryption but not against data exposure threats
- Data exfiltration triggers regulatory obligations and third-party liability
- Defense must address both encryption prevention and data loss prevention
- Detecting exfiltration during the dwell time is your best chance to prevent the worst outcomes
- Network segmentation, DLP, and outbound monitoring are essential for double extortion defense
Related Articles
Ransomware vs Malware: Understanding the Differences
Understand the taxonomy of cyber threats and why ransomware demands specialized defense strategies.
Read ArticleShould You Pay the Ransom? Pros, Cons, and Legal Implications
An in-depth analysis of the ransom payment decision, including legal risks and recovery statistics.
Read Article