triple extortion ransomware (original) (raw)

Triple extortion ransomware is a type of ransomware attack where a cybercriminal extorts their victim multiple times, namely by encrypting data, exfiltrating data to expose and threatening a third attack vector.

In a traditional ransomware attack, an attacker encrypts and locks the victim from accessing their data. In a double extortion ransomware attack, a second attack vector -- exfiltrating data to expose -- is added. Victim organizations can often recover from a traditional ransomware attack using backups. By exfiltrating data in a double extortion attack, the attacker has another chance to extort the victim -- or demand two ransoms. Attackers can threaten to publish, leak or sell the stolen data on the dark web if a second ransom isn't paid.

A triple extortion ransomware attack adds a third attack vector and the potential for a second -- or third -- ransom. This third attack vector could be a distributed denial-of-service (DDoS) attack or intimidation of the victim's customers, employees and stakeholders into paying a ransom.

With the triple extortion approach, attackers aim to compel victims into paying multiple ransoms by introducing extra threats and risks beyond just blocking access to data.

Double and triple extortion ransomware attacks are on the rise. Cybersecurity firm Venafi reported in 2022 that 83% of ransomware attacks included multiple ransom demands.

Graphic showing the traditional ransomware sequence

See the steps malicious actors take when conducting a traditional ransomware attack.

How does a triple extortion ransomware attack work?

At the initial stages, a triple extortion ransomware attack follows the same basic attack sequence as a common ransomware attack but adds the second and third attack vectors. A typical triple extortion ransomware attack has the following steps:

  1. Initial access. Attackers gain entry into their victim's network, often through phishing, malware, vulnerabilities or stolen credentials.
  2. Lateral movement and asset discovery. Once they have access to the network, attackers probe deeper into an environment to elevate privileges and find potentially valuable data.
  3. Data exfiltration. Once identified, high-value assets are stolen to use in a double extortion attack.
  4. Encryption of files. Attackers encrypt the data to prevent the victim from accessing it.
  5. Ransom demand. With the data encrypted and exfiltrated, attackers send a ransom note to the victim demanding payment, typically in a cryptocurrency, to receive the decryption key and regain access.
  6. Double extortion ransom demand. If the victim organization is able to restore its data from backups -- or even if it paid the first ransom -- the malicious actors return for a second attack and demand a second ransom payment to prevent them from publishing or leaking the victim's sensitive data.
  7. Triple extortion ransom demand. In the third attack, attackers threaten additional exploitation, such as a DDoS attack or even approaching the victim organization's customers, employees and third parties to demand a payment.

Beware:Malicious actors often demand increasingly higher payments with each additional ransom. Law enforcement agencies discourage organizations from paying the ransom, but many organizations still opt to pay. Consult with ransomware negotiation services to get the best outcome.

Graphic showing the additional steps that malicious actors take during double extortion ransomware

Double extortion ransomware takes traditional ransomware attacks further.

Double extortion ransomware vs. triple extortion ransomware

Double extortion ransomware and triple extortion ransomware are similar in many respects. The main difference between double extortion and triple extortion ransomware is that triple extortion adds a third threat vector. The goal for double and triple extortion ransomware is to put additional pressure on victims to pay even more money to prevent further attacks.

Traditional ransomware Double extortion ransomware Triple extortion ransomware
Encrypts files on the victim's system. Encrypts files on the victim's system. Encrypts files on the victim's system.
Exfiltrates data and threatens to publish or leak it if the ransom isn't paid. Exfiltrates data and threatens to publish or leak it if the ransom isn't paid.
Threatens to disrupt the victim organization's operations through attacks, such as a DDoS, if the ransom isn't paid. Attackers sometimes opt to seek a ransom payment by threatening the victim's customers, employees and stakeholders.

Notable examples of triple extortion ransomware

Since 2020, several ransomware groups have expanded on ransomware attacks through triple extortion ransomware. Some examples are the following:

Graphic showing the sequence of a triple extortion ransomware attack

Triple extortion ransomware attacks take traditional ransomware attacks two steps further.

How to prevent triple extortion ransomware

To prevent and limit the risk of triple extortion ransomware attacks, follow these best practices:

This was last updated in September 2023

Continue Reading About triple extortion ransomware

Dig Deeper on Threats and vulnerabilities