Wednesday, March 19, 2025
HomeRansomwareNew Ransomware Attacks Demand Cash From The Customers of Victims Too

New Ransomware Attacks Demand Cash From The Customers of Victims Too

Published on

SIEM as a Service

Follow Us on Google News

Nowadays ransomware attacks are increasing rapidly, and the threat actors are demanding huge ransom in return. As cybercriminals are making their moves advanced by specializing in ransomware attacks and the newly uncovered attacks are demand ransom from the victim’s customers.

The ransomware attackers are using double extorsion methods to deploy the victim’s data that is being stolen. new attacks are using triple extortion methods with the motive of making more money from the victims through their all malicious activities.

Recently, cybersecurity experts have found an average of 1,000 entities that were attacked by ransomware attacks every week. 

After investigation, the experts pronounced that the attack rate has increased by 21% in the first trimester of 2021 and a 7% increase in April.

The FBI has recently asserted that they have found that the DarkSide hacker group is using the triplet extortion method for ransomware attack on the Colonial Pipeline network.

Apart from this, the Check Point research team has confirmed that DarkSide is using advanced methods in their ransomware attacks.

Top Ransomware Targets

As we said above that the attacks are increasing rapidly in a short period of time, as compared to the earlier report of 2020. And the Check Point research team has noted that nearly 1000 organizations were affected every week.

Among all the sectors, health cares sectors were attacked most among the sectors, as per the volume rate nearly 109 attacks occurred per organization every week.

However, in the ransomware attack on the Colonial Pipeline network, the utility sector has encountered nearly 59 attacks per organization per week. 

On the other side, the legal and insurance sectors have witnessed 34 attacks, and the North American organizations have encountered 29 attacks.

While Europe and Latin America have each encountered 14 attacks each week, but among them all, the Asia Pacific organizations have experienced the highest number of ransomware attacks with 51 per week.

Triple extortion

The triple extortion is recently being used by the attackers, and it started at the end of 2020. However, in this triple extortion method, the attackers send ransom demands also to the customer or any other third party who is lined with the stolen data apart from the attacked organization. 

The very first case of triple extortion is the Vastaamo clinic which is being attacked in October 2020. And here the threat actors have demanded a lump sum amount of ransomware from the clinic.

Moreover, the attackers have also emailed the patients directly and demanded a smaller sum of money from them and if they don’t cooperate with attackers then attackers would leak their therapist session details. 

Recommendations

The analysts of Check Point have affirmed some basic recommendation that is to be followed by the organizations to bypass such unwanted ransomware attacks and here they are mentioned below:-

Have a strict regular checkup on holidays as well as on weekends:-

  • Remember to update your patches timely.
  • Always prefer using anti-ransomware tools.
  • Give a full guide regarding the ransomware attacks to the users.
  • Try to scan your networks so that you can stop ransomware attacks before it starts.

Apart from these things, the Check Point research team is trying their best to overcome such attacks, with advanced methods to stop or mitigate these unwanted ransomware attacks.

So, until then the researchers have strongly recommended all the organizations to follow the recommendations that they have suggested.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Windows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC Released

A critical vulnerability in Windows File Explorer has been discovered, allowing attackers to capture...

CISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit

The Cybersecurity and Infrastructure Security Agency (CISA) issued a critical security warning regarding a...

Fake Coinbase Migration Messages Target Users to Steal Wallet Credentials

A sophisticated phishing campaign is currently targeting cryptocurrency investors with fraudulent emails claiming to...

Electromagnetic Side-Channel Analysis of Cryptographically Secured Devices

Electromagnetic (EM) side-channel analysis has emerged as a significant threat to cryptographically secured devices,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SocGholish Exploits Compromised Websites to Deliver RansomHub Ransomware

SocGholish, a sophisticated malware-as-a-service (MaaS) framework, has been identified as a key enabler in...

BlackLock Ransomware Strikes Over 40 Organizations in Just Two Months

In a concerning escalation of cyber threats, the BlackLock ransomware group has executed a...

Jaguar Land Rover Hit by HELLCAT Ransomware Using Stolen Jira Credentials

The HELLCAT ransomware group has claimed responsibility for a significant data breach at Jaguar...