Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
New Ransomware strategy: pay ransom or publish data!
Offensive Security

New Ransomware strategy: pay ransom or publish data!

A new ransomware strategy downloads data before it is encrypted. If no payment is made, the data is published. Now we're seeing the first cases.

Vincent Heinen Vincent Heinen Abteilungsleiter Offensive Services
Updated: October 9, 2024 2 Min. read
OSCP+ OSCP OSWP OSWA
Table of Contents (2 sections)

The new Ransomware strategy can result in a rattail of costs for those affected. The affected data will now be published if no ransom is paid. Depending on the criticality of the data, this publication may entail further costs. A DSGVO offence could then be the coffin nail.

REvil Ransomware wants to publish data if not paid.

Criminals also constantly come up with something new. And there are hardly any limits to creativity. That shows the current trend of Ransomware. Before the data is encrypted, the cyber criminals steal it. The victim does not want to pay the demanded ransom payment Then the data is either publicly released or sent to a competitor. From the point of view of the Ransomware developers, this is more promising than simply decrypting the data again. This trend leads to Ransomware attacks becoming data leaks. In hospitals, practices and other medical facilities, which are rarely as well positioned in the IT security sector as companies in the high security sector, one incident can be the last. Personal and particularly sensitive data, such as membership of a religion or the degree of disability, should not be made accessible to third parties. A recent fine imposed on a hospital in Rhineland-Palatinate shows that incorrect handling of information can quickly become expensive. 105,000 EUR expensive.

The new Ransomware strategy has the same vulnerability as any malware: the human!

For years technical systems have been developed to keep malware out. However, they never promised 100% security. Increasing digitalization makes it increasingly difficult to maintain a 360° overview of the infrastructure, devices and network. Since most cyber attacks use email as a gateway, solutions are popular - but the one or other phishing email or mail with malware still gets through. This residual risk can only be reduced by informed and trained employees.

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Vincent Heinen
Vincent Heinen

Abteilungsleiter Offensive Services

E-Mail

M.Sc. IT-Sicherheit mit über 5 Jahren Erfahrung in offensiver Sicherheitsanalyse. Leitet die Durchführung von Penetrationstests mit Spezialisierung auf Web-Applikationen, Netzwerk-Infrastruktur, Reverse Engineering und Hardware-Sicherheit. Verantwortlich für mehrere Responsible Disclosures.

OSCP+ OSCP OSWP OSWA
Certified ISO 27001ISO 9001AZAVBSI

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung