A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly ingest data from on-prem, cloud or hybrid environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Identity Security
    • Singularity Identity
      Identity Threat Detection and Response
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-class Expertise and Threat Intelligence.
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive solutions for seamless security operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your go-to source for our top partners in your region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
Background image for What is Double Extortion Ransomware?
Cybersecurity 101/Threat Intelligence/Double Extortion

What is Double Extortion Ransomware?

Double extortion tactics increase pressure on victims. Understand how this method works and strategies to mitigate its impact.

CS-101_Threat_Intel.svg
Table of Contents

Related Articles

  • What Is Predictive Threat Intelligence? How AI Helps Anticipate Cyber Threats
  • Cyber Threat Intelligence Lifecycle
  • What Is Behavioral Threat Detection & How Has AI Improved It?
  • What is Fileless Malware? How to Detect and Prevent Them?
Author: SentinelOne
Updated: August 11, 2025

Double extortion is a tactic used by ransomware attackers where they not only encrypt data but also threaten to leak it. This guide explores how double extortion works, its implications for victims, and strategies for prevention.

Learn about the importance of data backups and incident response planning. Understanding double extortion is crucial for organizations to protect their sensitive information.

Double extortion underscores the evolving sophistication of cyber threats, highlighting the need for a holistic approach to cybersecurity that encompasses robust defenses against ransomware, vigilant data protection, and incident response strategies.

Double Extortion - Featured Image | SentinelOne

A Brief Overview of Double Extortion

Double extortion is a sophisticated cyber threat tactic that has reshaped the landscape of ransomware attacks in recent years. This malicious strategy involves cybercriminals not only encrypting a victim’s data but also stealing sensitive information prior to encryption, effectively holding it hostage. If the victim refuses to pay the ransom for decrypting their data, the attackers threaten to publicly release or sell the stolen information, amplifying the stakes and consequences of the attack.

Double extortion first emerged as a noticeable trend in the ransomware landscape around 2019, with the emergence of notable strains like Maze and REvil. These cybercriminal groups recognized the immense value of the data they were compromising and began demanding additional ransoms, typically in cryptocurrency, under the threat of exposing this data. This innovative approach significantly increased the financial pressure on victims and made it more likely that they would comply with the extortion demands.

Today, double extortion attacks have become alarmingly prevalent. Cybercriminals use it to target a wide range of organizations, from small businesses to large enterprises and even government institutions. The stolen data often includes sensitive customer information, proprietary intellectual property, and confidential internal documents, making the potential consequences of exposure even more severe.

To defend against double extortion attacks, organizations must adopt a comprehensive cybersecurity strategy that includes robust threat detection and prevention, regular data backups, employee training on recognizing phishing attempts, and a well-defined incident response plan (IRP).

Understanding How Double Extortion Works

Double extortion is a complex and insidious cyberattack technique that combines data theft with traditional ransomware tactics. From a technical standpoint, the process involves several distinct stages:

Initial Access and Reconnaissance

Attackers use various methods like phishing emails, exploiting software vulnerabilities, or credential theft to gain initial access to the victim’s network. Once inside, they conduct reconnaissance to identify high-value targets and locate sensitive data repositories.

Data Exfiltration Techniques

Attackers employ advanced techniques, such as SQL injection, remote file inclusion, or the abuse of legitimate tools, to exfiltrate sensitive data from the victim’s network. They may employ data compression, encryption, or obfuscation to evade detection.

Data Classification and Extraction

Using automated scripts or manual processes, attackers classify and extract sensitive information. This data can include personally identifiable information (PII), financial records, intellectual property, or confidential documents. Attackers may employ data parsing and indexing techniques to efficiently locate valuable data.

Data Staging and Stealth

The exfiltrated data is staged in hidden or less-monitored areas of the network to avoid detection. Attackers may use encryption or steganography to obscure the presence of the stolen data and maintain a low profile.

Data Encryption with Strong Algorithms

After exfiltration, attackers initiate the ransomware component. They employ robust encryption algorithms, such as AES-256, to encrypt critical files and systems within the victim’s network. This encryption is typically asymmetric, with a public key for encryption and a private key held by the attacker for decryption.

Ransom Note and Cryptocurrency Demand

Attackers deliver a ransom note, often in the form of a text file or image, to the victim’s systems. This note contains details about the ransom demand, payment instructions, and a deadline. Attackers commonly demand payment in cryptocurrencies like Bitcoin or Monero to maintain anonymity.

Double Extortion Notification

In a double extortion attack, alongside the traditional ransom note, attackers inform the victim that they have exfiltrated sensitive data. This notification emphasizes the consequences of non-compliance. Attackers may provide evidence of data theft, such as file listings or snippets, to validate their claims.

Threats of Data Exposure

Attackers threaten to publicly release the stolen data on the internet or underground forums if the ransom is not paid within the specified timeframe. This threat adds significant pressure on the victim to meet the ransom demands, as data exposure can lead to legal consequences, regulatory fines, and reputational damage.

Payment Verification and Communication

To facilitate payment tracking and decryption, attackers provide a unique Bitcoin wallet address for the victim to send the ransom. After receiving the payment, they verify it on the blockchain and communicate with the victim through encrypted channels.

Decryption Key Delivery

Upon successful payment verification, attackers deliver the decryption key to the victim. This key is required to decrypt the files and systems that were encrypted during the ransomware phase. Attackers may provide decryption tools or instructions on how to use the key.

Post-Attack Cleanup

After receiving the ransom, attackers may remove their presence from the victim’s network, deleting any tools, backdoors, or traces of the attack. However, there’s no guarantee that they will not return for further extortion or attacks.

Response and Mitigation

Organizations facing a double extortion attack must make critical decisions regarding whether to pay the ransom or seek alternatives. They must also report the incident to law enforcement and initiate incident response procedures, including system restoration and strengthening security measures to prevent future attacks.

Enhance Your Threat Intelligence

See how the SentinelOne threat-hunting service WatchTower can surface greater insights and help you outpace attacks.

Learn More

Exploring the Use Cases of Double Extortion

Double extortion attacks have become a menacing threat in the cybersecurity landscape, prompting businesses to bolster their defenses to mitigate the risks associated with this insidious tactic. Here are some real-world use cases of double extortion, their significance, and the measures businesses are taking to secure against these risks:

The Maze Ransomware Attack

Maze ransomware operators were pioneers of the double extortion technique. They targeted businesses, encrypted their data, and then threatened to publish sensitive information online unless a ransom was paid.

  • Significance – This attack garnered significant attention and put double extortion on the map, highlighting the potential consequences of non-compliance.
  • Security Measures – Businesses have since increased their focus on cybersecurity, adopting comprehensive backup strategies, monitoring for data leaks, and enhancing incident response capabilities to counter Maze-like threats.

The REvil Ransomware Group

REvil is known for its aggressive double extortion tactics. In one instance, they attacked a prominent law firm, stealing sensitive client data and threatening to release it.

  • Significance – This attack demonstrated that even sectors not typically associated with high cybersecurity risks, like legal services, are vulnerable to double extortion. It emphasized the need for comprehensive cybersecurity measures across all industries.
  • Security Measures – Law firms and similar businesses are increasingly investing in cybersecurity awareness training for employees, adopting multi-factor authentication (MFA), and enhancing endpoint security to protect against REvil-style attacks.

The Ragnar Locker Ransomware Campaign

Ragnar Locker targeted large organizations, particularly in the healthcare sector. They encrypted files and stole patient data, demanding a hefty ransom.

  • Significance – The healthcare industry was already under pressure due to the COVID-19 pandemic, and these attacks further strained resources, raising concerns about patient privacy and the security of critical healthcare infrastructure.
  • Security Measures – Healthcare organizations have strengthened their cybersecurity posture by improving network segmentation, implementing robust access controls, and conducting regular cybersecurity assessments to thwart double extortion attempts.

The DarkTequila Attack

DarkTequila was a banking trojan that evolved to include ransomware and data theft components. Attackers targeted financial institutions and corporate networks, encrypting files and exfiltrating sensitive data.

  • Significance – This attack demonstrated the adaptability of cybercriminals who evolve their tactics over time. Financial institutions, in particular, had to address the growing threat of double extortion.
  • Security Measures – Financial institutions are implementing threat intelligence sharing platforms, enhancing employee training programs, and conducting tabletop exercises to prepare for potential double extortion attacks.

Cl0p Ransomware Group

The Cl0p group targeted various organizations, including universities. They encrypted files and threatened to leak sensitive academic research data online.

  • Significance – Attacks on educational institutions highlight the broad scope of double extortion targets. In this case, the potential loss of valuable research data was a significant concern.
  • Security Measures – Universities and research institutions are reinforcing their cybersecurity defenses with enhanced email filtering, data encryption, and incident response planning to safeguard their intellectual property from Cl0p-like attacks.

To secure against the risks of double extortion, businesses are taking several proactive steps:

  • Comprehensive Backup Strategies – Regular data backups that are isolated from the network are crucial. They ensure organizations can recover their data without paying a ransom.
  • Employee Training – Cybersecurity awareness training helps employees recognize phishing attempts and other social engineering tactics used in double extortion attacks.
  • Endpoint Security – Robust endpoint security solutions are essential for detecting and preventing malware infections.
  • Access Controls – Implementing the principle of least privilege (PoLP) ensures that users have the minimum level of access required for their roles.
  • Incident Response Plans – Having well-defined incident response plans in place enables businesses to respond effectively to double extortion attacks, minimizing their impact.
  • Threat Intelligence Sharing – Collaborating with industry peers and sharing threat intelligence can help businesses stay informed about emerging threats and attack techniques.

Conclusion

Double extortion attacks, where cybercriminals not only encrypt data but also threaten to leak sensitive information unless a ransom is paid, have increased the stakes within the current threat landscape. These attacks exploit organizations’ fears of data breaches and tarnished reputations, compelling many to pay ransoms even when they have backups in place.

Real-world use cases of double extortion underscore the critical importance of cybersecurity for businesses across industries. As attackers continually refine their tactics, organizations must remain vigilant, adapt their security measures, and adopt a proactive stance to protect their data, reputation, and bottom line.

Double Extortion FAQs

Double extortion ransomware is when attackers both encrypt your data and steal copies of it before encryption. They will threaten to release your sensitive information publicly if you don’t pay the ransom. This gives them extra leverage because even if you have backups to restore encrypted files, they can still expose your stolen data. It’s much more dangerous than traditional ransomware attacks.

First, attackers gain access to your network through phishing emails or vulnerabilities. They will spend time moving through your systems to find valuable data. Before encrypting anything, they exfiltrate sensitive files to their own servers.

Then they deploy ransomware to encrypt your files and leave a ransom note. If you don’t pay, they publish your stolen data on the dark web.

The attack follows seven main stages. Stage one is victim identification and reconnaissance. Stage two is gaining access to your infrastructure through RDP or phishing. Stage three involves establishing remote access tools like CobaltStrike.

Stage four is network scanning to map your systems. Stage five is lateral movement through your network. Stage six is data exfiltration, and stage seven is encryption and ransom demands.

No, backups alone cannot defend against double extortion attacks. While backups help you restore encrypted files, they don’t protect against data theft. Attackers have adapted to counter backup strategies by stealing data first.

Even if you restore from backups, they can still leak your sensitive information publicly. You need multiple layers of protection beyond just backups to prevent these attacks.

You need a multi-layered security approach. Use firewalls, email security, and endpoint detection tools to stop initial access. Implement network segmentation to limit attacker movement. Deploy anti-data exfiltration tools that monitor outbound traffic. Train employees to identify phishing attempts.

Use multi-factor authentication and access controls. Regular security audits and vulnerability assessments are also crucial. Monitor network traffic continuously for suspicious activity.

Healthcare, manufacturing, and financial services are primary targets. Attackers target organizations with valuable data like hospitals, because they have low tolerance for downtime. They steal personally identifiable information, medical records, Social Security numbers, and financial data.

Customer databases, proprietary source code, and internal communications are also targeted. Attackers prefer organizations that can afford to pay large ransoms.

Use data encryption to protect sensitive information even if stolen. Implement data loss prevention tools to detect unauthorized transfers. Deploy endpoint detection and response solutions. Create incident response plans for quick containment. Use network segmentation to limit damage.

Regular backup testing and secure offsite storage are essential. Monitor for indicators of compromise continuously. Don’t pay ransoms – there’s no guarantee attackers will keep their word

Discover More About Threat Intelligence

What is an Advanced Persistent Threat (APT)?Threat Intelligence

What is an Advanced Persistent Threat (APT)?

Advanced Persistent Threats (APTs) pose long-term risks. Understand the tactics used by APTs and how to defend against them effectively.

Read More
What is Spear Phishing? Types & ExamplesThreat Intelligence

What is Spear Phishing? Types & Examples

Spear phishing is a targeted form of phishing. Learn how to recognize and defend against these personalized attacks on your organization.

Read More
What is Cyber Threat Intelligence?Threat Intelligence

What is Cyber Threat Intelligence?

Cyber threat intelligence (CTI) helps organizations predict, understand, and defend against cyber threats, enabling proactive protection and reducing the impact of attacks. Learn how CTI enhances cybersecurity.

Read More
What is a Botnet in Cybersecurity?Threat Intelligence

What is a Botnet in Cybersecurity?

Botnets are networks of compromised devices used for malicious purposes. Learn how they operate and explore strategies to defend against them.

Read More
Ready to Revolutionize Your Security Operations?

Ready to Revolutionize Your Security Operations?

Discover how SentinelOne AI SIEM can transform your SOC into an autonomous powerhouse. Contact us today for a personalized demo and see the future of security in action.

Request a Demo
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2025 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use