Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Pentagon inks deals with Nvidia, Microsoft and AWS to deploy artificial intelligence in scalable networks

The best AI dictation apps, tested and ranked

Netflix delays Greta Gerwig’s ‘Narnia’ for big theatrical push to 2027

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Pentagon inks deals with Nvidia, Microsoft and AWS to deploy artificial intelligence in scalable networks

    3 May 2026

    Meta buys robotics startup to boost humanoid AI ambitions

    2 May 2026

    Replit’s Amjad Masad on the Cursor deal, fighting Apple and why he’d rather not sell

    2 May 2026

    After rejecting Anthropic for restricting Mythos, OpenAI is also restricting access to Cyber

    1 May 2026

    Sources: Anthropic Potential $900B+ Valuation Round Could Happen Within 2 Weeks

    1 May 2026
  • Apps

    The best AI dictation apps, tested and ranked

    3 May 2026

    Instagram is cracking down on content aggregators

    2 May 2026

    X announces a reengineered AI-powered ad platform

    2 May 2026

    TikTok’s new ‘Campus Hub’ features group chats and college streams

    1 May 2026

    ChatGPT Images 2.0 is a hit in India, but not a big winner elsewhere, yet

    1 May 2026
  • Crypto

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025
  • Fintech

    Stripe introduces Link, a digital wallet that autonomous AI agents can also use

    1 May 2026

    Y Combinator alum Skio sells for $105 million in cash, raised only $8 million, founder says

    1 May 2026

    Amazon, Meta join the fight to end Google Pay and PhonePe’s dominance in India

    30 April 2026

    Steve Ballmer slams founder he backed, who pleaded guilty to fraud: ‘I was cheated and I feel stupid’

    25 April 2026

    Salmon raises $100 million in equity and debt to bring digital credit to unbanked Filipinos

    24 April 2026
  • Hardware

    Apple surprised by AI-driven demand for Macs

    1 May 2026

    As Tim Cook departs, Apple hits record sales — but chip shortage looms

    1 May 2026

    More Gemini features are coming to Google TV

    30 April 2026

    OpenAI could be building a phone with AI agents that replace apps

    28 April 2026

    SpeakOn’s dictation device is a good idea marred by platform limitations

    27 April 2026
  • Media & Entertainment

    Netflix delays Greta Gerwig’s ‘Narnia’ for big theatrical push to 2027

    2 May 2026

    Roku’s $3 streaming service Howdy hits 1 million subscribers, per recent report

    29 April 2026

    Australia forces Big Tech companies to pay for news or face 2.25% tax.

    28 April 2026

    India’s app market is booming — but global platforms are raking in most of the profits

    23 April 2026

    YouTube extends its AI similarity detection technology to celebrities

    21 April 2026
  • Security

    Ubuntu services were affected by outages after the DDoS attack

    1 May 2026

    Dental software maker fixes bug that exposed patients’ medical records

    1 May 2026

    Hackers are actively exploiting a bug in cPanel, which is used by millions of websites

    30 April 2026

    Sri Lanka reveals another missing payment, days after hackers stole $2.5 million from its finance ministry

    29 April 2026

    The US Supreme Court appears divided on the controversial use of ‘geofence’ search warrants.

    29 April 2026
  • Startups

    FDA Approval, Fundraising and the Reality of Building Healthcare According to BioticsAI Founder

    1 May 2026

    Legal AI startup Legora hits $5.6 billion valuation, and its battle with Harvey just got hotter

    1 May 2026

    Bill Gurley, Jack Altman back startup Pursuit, which helps companies sell to the government

    30 April 2026

    BCI startup Neurable wants to license ‘mind reading’ technology to wearable consumer devices

    29 April 2026

    Founder of Shark Tank-backed startup Sholly sues buyer Sallie Mae

    29 April 2026
  • Transportation

    Uber wants to turn its millions of drivers into a sensor network for self-driving companies

    2 May 2026

    Google’s Gemini AI assistant hits the road in millions of vehicles

    2 May 2026

    EV startup Faraday Future paid $7.5 million to company linked to founder Jia Yueting

    1 May 2026

    Rivian cuts DOE loan to $4.5 billion for Georgia plant

    1 May 2026

    Uber is now in the hospitality industry, thanks in part to artificial intelligence

    29 April 2026
  • Venture

    Musely secures $360 million from General Catalyst without giving up equity

    2 May 2026

    The climate tech IPO window could finally open

    30 April 2026

    Sources: Anthropic Could Raise New $50B Round at $900B Valuation

    30 April 2026

    BMW i Ventures Has a New $300M Fund and AI Rides Shotgun

    29 April 2026

    How a venture firm invests in an increasingly fragmented world

    29 April 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Why extortion is the new ransomware threat
Security

Why extortion is the new ransomware threat

techtost.comBy techtost.com19 December 202305 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Why Extortion Is The New Ransomware Threat
Share
Facebook Twitter LinkedIn Pinterest Email

Cyber ​​criminals are happening more aggressive in their efforts to maximize disruption and force payment of ransom demands, and now there is a new extortion tactic in play.

In early November, the notorious ALPHV ransomware gang, also known as BlackCat, attempted a first-of-its-kind blackmail tactic: weaponizing the US government’s new data breach disclosure rules against one of the gang’s victims. ALPHV filed a complaint with the US Securities and Exchange Commission (SEC), alleging that digital lending provider MeridianLink failed to disclose what the gang called a “significant breach that compromised customer data and operational information,” for which the gang took the credit.

“We would like to bring to your attention an issue of concern regarding MeridianLink’s compliance with the recently adopted cybersecurity incident disclosure rules,” ALPHV wrote. “It has come to our attention that MeridianLink has failed to file the required disclosure pursuant to Item 1.05 of Form 8-K within the prescribed four business days as required by the new SEC rules.”

ALPHV’s latest extortion attempt is the first example of what is expected to be a trend in the coming months now that the rules are in place. Although innovative, this is not the only aggressive tactic used by ransomware and extortion gangs.

Hackers typically known for developing ransomware have increasingly turned to “double extortion” tactics, where in addition to encrypting a victim’s data, the gangs threaten to publish the stolen files unless a ransom is paid. Some go further with “triple extortion attacks’, which – as the name suggests – hackers use a three-pronged approach to extort money from their victims by extending threats and ransom demands to the original victim’s customers, suppliers and partners. These tactics were used by the hackers behind the wide-ranging mass breaches of MOVEit, which is a key event in the trend towards non-encryption extortion attempts.

While ambiguous definitions may not seem like the biggest cybersecurity issue facing organizations today, the distinction between ransomware and extortion is important, not least because defenses against these two types of cyberattacks can differ greatly. The distinction also helps policymakers know what the ransomware trend is and whether anti-ransomware policies are working.

What is the difference between ransomware and extortion?

The Ransomware Task Force describes ransomware as “an evolving form of cybercrime, through which criminals remotely compromise computer systems and demand a ransom in exchange for restoring and/or not exposing data.”

In fact, ransomware attacks can fall on a spectrum of impact. Ransomware experts Allan Liska, threat intelligence analyst at Recorded Future, and Brett Callow, threat analyst at Emsisoft, shared in an analysis with TechCrunch that this broad definition of ransomware can apply to both “scammy” downloaded content of your insecure Elasticsearch presence and want $50 attacks” to prevent “life-threatening encryption attacks in hospitals”.

“Clearly, though, they’re very different animals,” Liska and Callow said. “One is an opportunistic porch pirate who steals delivery to the Amazon, while the other is a group of violent criminals who break into your home and terrorize your family before making off with all your possessions.”

Researchers say there are similarities between “encryption and extortion” attacks and “extortion-only attacks,” such as their reliance on brokers who sell access to compromised networks. However, there are also important distinctions between the two, particularly when it comes to a victim’s customers, vendors, and customers, whose sensitive data can be captured in extortion-only attacks.

“We see this play out over and over again, where a threat actor will sort through the stolen data to find the largest or most recognized organization they can find and claim to have successfully attacked that organization. This is not a new tactic,” Liska and Callow said, citing an example of how a ransomware gang claimed to have hacked a major tech giant, when in fact it had stolen data from one of the lesser-known technology vendors.

“It’s one thing to prevent an attacker from encrypting the files on your network, but how do you protect the entire data supply chain?” Liska and Callow said. “In reality, many organizations don’t think about their supply chain … but every point in that supply chain is vulnerable to a data theft and extortion attack.”

A better definition of ransomware is needed

While authorities have long discouraged compromised organizations from paying ransom demands, it’s not always an easy decision for businesses hit by hackers.

In encryption and extortion attacks, companies have the option of paying a ransom demand to receive a key that decrypts their files. But when you pay hackers who use aggressive blackmail tactics to delete their stolen files, there’s no guarantee that the hackers will actually do it.

This was demonstrated in the recent ransomware attack against Caesars Entertainment, which the hackers attributed to an attempt to prevent the disclosure of stolen data. By its own admission, Caesars told regulators that, “We have taken steps to ensure that the stolen data is deleted by the unauthorized party, although we cannot guarantee that outcome.”

“Actually, you’d have to assume they wouldn’t,” Liska and Callow said, referring to claims that hackers delete stolen data.

“A better definition of ransomware, which explains the distinction between different types of attacks, will allow organizations to better plan and respond to each type of ransomware attack, whether it occurs within their own network or a third-party network. Liska and Callow said.

blackmail cybercrime electronic attack extortion hacker ransomware threat
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFirst look at TechCrunch Early Stage 2024 agenda: Engine Accelerator, Y Combinator, Glasswing Ventures and more will join us in Boston
Next Article Apple Watch Series 9 sales to stop due to patent dispute
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Ubuntu services were affected by outages after the DDoS attack

1 May 2026

Dental software maker fixes bug that exposed patients’ medical records

1 May 2026

Hackers are actively exploiting a bug in cPanel, which is used by millions of websites

30 April 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Pentagon inks deals with Nvidia, Microsoft and AWS to deploy artificial intelligence in scalable networks

3 May 2026

The best AI dictation apps, tested and ranked

3 May 2026

Netflix delays Greta Gerwig’s ‘Narnia’ for big theatrical push to 2027

2 May 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Stripe introduces Link, a digital wallet that autonomous AI agents can also use

1 May 2026

Y Combinator alum Skio sells for $105 million in cash, raised only $8 million, founder says

1 May 2026

Amazon, Meta join the fight to end Google Pay and PhonePe’s dominance in India

30 April 2026
Startups

FDA Approval, Fundraising and the Reality of Building Healthcare According to BioticsAI Founder

Legal AI startup Legora hits $5.6 billion valuation, and its battle with Harvey just got hotter

Bill Gurley, Jack Altman back startup Pursuit, which helps companies sell to the government

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.