Thursday, May 15, 2025
HomeRansomwareRansomware Gangs Using a new Method to Collect Ransom Payments from Victims

Ransomware Gangs Using a new Method to Collect Ransom Payments from Victims

Published on

SIEM as a Service

Follow Us on Google News

There are many ransomware gangs in the wild, and among them, the top ones are implementing new methods to pressure more victim organizations to ransom demanded by the gangs.

According to the report, Clop ransomware operators are the ones who has started these tactics, and the operators of the Clop are continuously forcing their victims to pay the more demanded ransom.

Here, the ransomware operators send emails to the customer and demand more ransom payment to protect their privacy. And the Clop ransomware group was being linked with very high profile hacks.

- Advertisement - Google News

However, the ransomware operators were using a prevalent tactic, that is, to steal unencrypted data before encrypting a victim’s network.

Once the operators steal the data, later they use the data as a double-extortion tactic and threaten the organization to publish the data if a demanded ransom is not paid. 

The methods are pretty dangerous, as it harms an organization’s privacy because the stolen data include all the delicate data of the customers like:-

  • Credit card information
  • Social security numbers
  • Government-issued IDs

Clop Warns Victims

After hacking the organization, the Clop operators send emails to the customer, and the emails say that the company has been hacked and all the data has been stolen and will soon be published in case the company declines to guard its peoples’ data by not paying the demanded ransom.

The clop operators also mention that if the company doesn’t pay the demanded ransom, then they will publish all the stolen data on the Darkweb forums. 

The email tactic was first initiated with the customer of Flagstar Bank and later with the people that were exposed in the University of Colorado’s Accellion hack.

But, as we said above, the ransomware gangs are using these new tactics; so, the Clop ransomware is not the only ransomware operators that are pressuring the victims by using these new tactics.

All these ransomware gangs are apparently using these similar methods on customers and saying that all their personal data may have been disclosed in a cyberattack.

By doing this, will definitely generate further pressure on the company and will force the impacted company to pay the demanded ransom.

Moreover, all the ransomware operators are continuing to emerge with several new tactics to evade and loot their victims. 

Recently, the REvil ransomware gang has published a report by asserting that they are practising DDoS attacks and voice calls to the victim’s business partners by forcing the customer/victims for paying the demanded money.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect...

New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution

Adobe has released critical security updates addressing three high-severity vulnerabilities (CVE-2025-30324, CVE-2025-30325, CVE-2025-30326) in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...

New Mamona Ransomware Targets Windows Systems Using Abused Ping Command

Cybersecurity researchers are raising the alarm about a newly discovered commodity ransomware strain dubbed Mamona,...