Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Waymo halts freeway routes after robotaxi race in construction zones

How VCs and Founders Use Inflated ‘ARR’ to Crown AI Startups

Google prefers glitter with disco ball icons: “Are you sure you still want this?”

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    How VCs and Founders Use Inflated ‘ARR’ to Crown AI Startups

    23 May 2026

    Hark Raises $700M Series A for Secret ‘Universal’ AI Interface

    22 May 2026

    Six search engines worth trying now that Google isn’t Google anymore

    22 May 2026

    Spotify adds AI-powered question-and-answer capabilities to podcasts

    21 May 2026

    Jensen Huang Says He’s Found a ‘Brand New’ $200B Market for Nvidia

    21 May 2026
  • Apps

    Google prefers glitter with disco ball icons: “Are you sure you still want this?”

    23 May 2026

    Meta is quietly launching a new Reddit-like app called Forum

    22 May 2026

    Spotify and Universal Music strike deal allowing AI covers and remixes by fans

    22 May 2026

    Spotify takes on Google’s NotebookLM with its new app

    21 May 2026

    Airbnb enters hotels, extends AI to host integration and customer support

    21 May 2026
  • Crypto

    As crypto cools, a16z crypto raises $2.2 billion in capital

    6 May 2026

    Coinbase to lay off 14% of staff as part of broader restructuring

    5 May 2026

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025
  • Fintech

    General Catalyst just led a $63 million bet in India’s travel payments market

    21 May 2026

    Startup Battlefield 200 applications close on May 27

    21 May 2026

    Venmo’s biggest makeover in years comes at a very interesting time

    11 May 2026

    Fintech startup Parker files for bankruptcy

    10 May 2026

    Robinhood’s venture fund IPO attracted 150,000+ private investors, CEO says

    7 May 2026
  • Hardware

    We tested Google’s AI glasses and they’re almost there

    23 May 2026

    Finnish phone maker HMD ropes Indian AI chatbot into new smartphone to reach local market

    22 May 2026

    Flipper unveils a Linux-powered networking gadget designed for hackers and tinkerers

    22 May 2026

    Minimalist Light Phone teams up with Andrew Yang’s Noble Mobile, which pays you to stop doomscrolling

    20 May 2026

    Mach Industries just spent $50 million to solve a major defense technology problem

    20 May 2026
  • Media & Entertainment

    Spotify launches an audiobook creation tool powered by ElevenLabs

    22 May 2026

    New York City Mayor Zohran Mamdani Takes To Twitch To Chat With New Yorkers

    21 May 2026

    Clouted wants to take the guesswork out of making short videos go viral

    21 May 2026

    ‘Ask YouTube’ Brings AI Chat Search to Video, Adds Gemini Omni to Shorts

    20 May 2026

    Google’s Gemini Omni turns images, audio and text into video — and that’s just the beginning

    19 May 2026
  • Security

    Scammers abuse an internal Microsoft account to send spam links

    22 May 2026

    Law enforcement shuts down VPN service used by two dozen ransomware gangs

    21 May 2026

    GitHub says hackers stole data from thousands of internal repositories

    21 May 2026

    Customers say Trump Mobile is leaking their personal information

    20 May 2026

    US cyber agency CISA has exposed bundles of passwords and cloud keys to the open web

    19 May 2026
  • Startups

    This startup raised $43 million to create a hive mind for ships

    22 May 2026

    Maka Kids redefines kids’ screen time with a streaming app optimized for wellness, not engagement

    22 May 2026

    This new startup is taking on a fragrance industry that hasn’t changed in nearly half a century

    21 May 2026

    Imperagen raises £5m to use quantum physics, AI to engineer enzymes

    21 May 2026

    NanoClaw creator rejects $20M takeover offer, raises $12M instead

    20 May 2026
  • Transportation

    Waymo halts freeway routes after robotaxi race in construction zones

    23 May 2026

    Who will benefit most from SpaceX’s IPO? Mainly Elon — and a few of his inner circle

    22 May 2026

    Waymo extends layoff to four cities as robotaxis continue to drive flooding

    22 May 2026

    Waymo halts service in Atlanta as its robotic car continues to drive into floods

    21 May 2026

    SpaceX’s IPO filing is filled with AI bets, Starship dreams and Elon Musk at the center

    21 May 2026
  • Venture

    Convective Capital Raises $85M Fund to Build Disaster Resilience

    22 May 2026

    Sam Altman does a ‘mic drop’ pitch to every Y Combinator startup

    21 May 2026

    Startup Battlefield 200 applications close on May 27

    20 May 2026

    Stilta raises $10.5M from a16z and YC to help companies rediscover patents they forgot they had

    20 May 2026

    Forget Streaming: Status AI Raises $17 Million To Turn Social Media Into Interactive Entertainment

    19 May 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Why extortion is the new ransomware threat
Security

Why extortion is the new ransomware threat

techtost.comBy techtost.com19 December 202305 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Why Extortion Is The New Ransomware Threat
Share
Facebook Twitter LinkedIn Pinterest Email

Cyber ​​criminals are happening more aggressive in their efforts to maximize disruption and force payment of ransom demands, and now there is a new extortion tactic in play.

In early November, the notorious ALPHV ransomware gang, also known as BlackCat, attempted a first-of-its-kind blackmail tactic: weaponizing the US government’s new data breach disclosure rules against one of the gang’s victims. ALPHV filed a complaint with the US Securities and Exchange Commission (SEC), alleging that digital lending provider MeridianLink failed to disclose what the gang called a “significant breach that compromised customer data and operational information,” for which the gang took the credit.

“We would like to bring to your attention an issue of concern regarding MeridianLink’s compliance with the recently adopted cybersecurity incident disclosure rules,” ALPHV wrote. “It has come to our attention that MeridianLink has failed to file the required disclosure pursuant to Item 1.05 of Form 8-K within the prescribed four business days as required by the new SEC rules.”

ALPHV’s latest extortion attempt is the first example of what is expected to be a trend in the coming months now that the rules are in place. Although innovative, this is not the only aggressive tactic used by ransomware and extortion gangs.

Hackers typically known for developing ransomware have increasingly turned to “double extortion” tactics, where in addition to encrypting a victim’s data, the gangs threaten to publish the stolen files unless a ransom is paid. Some go further with “triple extortion attacks’, which – as the name suggests – hackers use a three-pronged approach to extort money from their victims by extending threats and ransom demands to the original victim’s customers, suppliers and partners. These tactics were used by the hackers behind the wide-ranging mass breaches of MOVEit, which is a key event in the trend towards non-encryption extortion attempts.

While ambiguous definitions may not seem like the biggest cybersecurity issue facing organizations today, the distinction between ransomware and extortion is important, not least because defenses against these two types of cyberattacks can differ greatly. The distinction also helps policymakers know what the ransomware trend is and whether anti-ransomware policies are working.

What is the difference between ransomware and extortion?

The Ransomware Task Force describes ransomware as “an evolving form of cybercrime, through which criminals remotely compromise computer systems and demand a ransom in exchange for restoring and/or not exposing data.”

In fact, ransomware attacks can fall on a spectrum of impact. Ransomware experts Allan Liska, threat intelligence analyst at Recorded Future, and Brett Callow, threat analyst at Emsisoft, shared in an analysis with TechCrunch that this broad definition of ransomware can apply to both “scammy” downloaded content of your insecure Elasticsearch presence and want $50 attacks” to prevent “life-threatening encryption attacks in hospitals”.

“Clearly, though, they’re very different animals,” Liska and Callow said. “One is an opportunistic porch pirate who steals delivery to the Amazon, while the other is a group of violent criminals who break into your home and terrorize your family before making off with all your possessions.”

Researchers say there are similarities between “encryption and extortion” attacks and “extortion-only attacks,” such as their reliance on brokers who sell access to compromised networks. However, there are also important distinctions between the two, particularly when it comes to a victim’s customers, vendors, and customers, whose sensitive data can be captured in extortion-only attacks.

“We see this play out over and over again, where a threat actor will sort through the stolen data to find the largest or most recognized organization they can find and claim to have successfully attacked that organization. This is not a new tactic,” Liska and Callow said, citing an example of how a ransomware gang claimed to have hacked a major tech giant, when in fact it had stolen data from one of the lesser-known technology vendors.

“It’s one thing to prevent an attacker from encrypting the files on your network, but how do you protect the entire data supply chain?” Liska and Callow said. “In reality, many organizations don’t think about their supply chain … but every point in that supply chain is vulnerable to a data theft and extortion attack.”

A better definition of ransomware is needed

While authorities have long discouraged compromised organizations from paying ransom demands, it’s not always an easy decision for businesses hit by hackers.

In encryption and extortion attacks, companies have the option of paying a ransom demand to receive a key that decrypts their files. But when you pay hackers who use aggressive blackmail tactics to delete their stolen files, there’s no guarantee that the hackers will actually do it.

This was demonstrated in the recent ransomware attack against Caesars Entertainment, which the hackers attributed to an attempt to prevent the disclosure of stolen data. By its own admission, Caesars told regulators that, “We have taken steps to ensure that the stolen data is deleted by the unauthorized party, although we cannot guarantee that outcome.”

“Actually, you’d have to assume they wouldn’t,” Liska and Callow said, referring to claims that hackers delete stolen data.

“A better definition of ransomware, which explains the distinction between different types of attacks, will allow organizations to better plan and respond to each type of ransomware attack, whether it occurs within their own network or a third-party network. Liska and Callow said.

blackmail cybercrime electronic attack extortion hacker ransomware threat
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFirst look at TechCrunch Early Stage 2024 agenda: Engine Accelerator, Y Combinator, Glasswing Ventures and more will join us in Boston
Next Article Apple Watch Series 9 sales to stop due to patent dispute
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Scammers abuse an internal Microsoft account to send spam links

22 May 2026

Law enforcement shuts down VPN service used by two dozen ransomware gangs

21 May 2026

GitHub says hackers stole data from thousands of internal repositories

21 May 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Waymo halts freeway routes after robotaxi race in construction zones

23 May 2026

How VCs and Founders Use Inflated ‘ARR’ to Crown AI Startups

23 May 2026

Google prefers glitter with disco ball icons: “Are you sure you still want this?”

23 May 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

General Catalyst just led a $63 million bet in India’s travel payments market

21 May 2026

Startup Battlefield 200 applications close on May 27

21 May 2026

Venmo’s biggest makeover in years comes at a very interesting time

11 May 2026
Startups

This startup raised $43 million to create a hive mind for ships

Maka Kids redefines kids’ screen time with a streaming app optimized for wellness, not engagement

This new startup is taking on a fragrance industry that hasn’t changed in nearly half a century

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.