Riding the Cybersecurity Wave: Supply Chain Networks
Welcome to the intricate world of supply chain management and networks, where a multitude of organizations come together in a symphony of operations...
Double extortion is an advanced ransomware tactic where attackers not only encrypt a victim's data to demand a ransom for decryption but also steal the data and threaten to release or sell it publicly if the ransom isn’t paid. Talk about salt in a wound, this one is the worst.
This technique significantly raises the stakes for victims, putting their sensitive information, reputation, and even regulatory compliance at risk.
FunkSec Ransomware Group (2025): An AI-driven ransomware group named FunkSec emerged in late 2024, targeting over 85 victims globally. They employ double extortion tactics, combining elements of hacktivism and cybercrime, and demand relatively low ransoms.
Play Ransomware Attacks (2025): The Play ransomware group has been actively launching attacks, posing significant threats to various organizations. Their operations involve double extortion strategies, where they encrypt data and threaten to leak it unless the ransom is paid.
BlackSuit Ransomware Attack on CDK Global (2024): The BlackSuit hacker group targeted CDK Global, a software provider for car dealerships across the U.S. This attack disrupted operations, forcing many dealerships to process transactions manually. BlackSuit employs double extortion methods, encrypting data and threatening to publish sensitive information if ransoms are not met.
Garmin (2020): Attackers encrypted systems and threatened to leak stolen data, reportedly securing a multimillion-dollar ransom.
Colonial Pipeline (2021): While ransomware disrupted operations, attackers also stole data as part of their extortion strategy.
Double extortion highlights the evolving sophistication of ransomware threats, underscoring the need for both technical defenses and human-centered strategies to mitigate risk.
For more information on how ransomware affects your people and how to help them stay safe read on here: Ransomware and the Human Element
Welcome to the intricate world of supply chain management and networks, where a multitude of organizations come together in a symphony of operations...
4 min read
Automated phishing tools certainly make personal email safer by catching spam and phishing attempts more quickly. But the truth is that no system is...
3 min read
BEC Attacks on the Rise: Unveiling the Landscape The digital realm is witnessing a surge in BEC attacks, with threat actors perfecting the art of...
4 min read