Double extortion has become the defining operational model of modern ransomware. Dark Angel’s analysis of 1,847 ransomware incidents between January 2024 and March 2025 confirms that 92% involved confirmed or suspected data exfiltration prior to encryption deployment. This represents a fundamental shift from the encryption-only paradigm that dominated the threat landscape before 2020. Threat actors now treat data theft as the primary lever of coercion—encryption has become supplementary, and in an increasing number of cases, groups forgo encryption entirely in favor of pure extortion backed by threatened data publication. The average volume of exfiltrated data reached 427 GB per incident in 2024, a 34% increase from the prior year, and the median dwell time between initial access and encryption deployment extended to 13 days, reflecting the operational complexity of staging, compressing, and exfiltrating large datasets. For defenders, this extended dwell time represents both a challenge and an opportunity: every phase of the double extortion lifecycle produces observable artifacts that, when properly instrumented, provide detection windows that did not exist in the fast-moving encryption-only attacks of the previous era.
The Double Extortion Model: An Overview
From Encryption to Data Leverage
The ransomware ecosystem’s evolution toward double extortion was not a sudden innovation but rather a logical progression driven by two converging pressures. First, organizations invested heavily in backup infrastructure and disaster recovery capabilities following the high-profile encryption-only campaigns of 2017–2018 (WannaCry, NotPetya, and their derivatives). By 2019, a meaningful percentage of ransomware victims could restore operations from backups without paying a ransom, directly threatening the revenue model that sustained ransomware operations. Second, the data that ransomware operators encountered during their intrusions—financial records, intellectual property, personal identifiable information, legal correspondence—had inherent monetary and coercive value that was being entirely ignored in the encryption-only model.
The Maze ransomware group is widely credited with pioneering the double extortion model. In November 2019, Maze operators breached Allied Universal, a U.S. security services company, and when the victim declined to pay for decryption, the operators published approximately 700 MB of stolen data on a purpose-built website. This represented the first widely documented case of a ransomware group establishing dedicated infrastructure for victim data publication. The impact was immediate and transformative. Within six months of Maze’s innovation, at least nine other ransomware operations had adopted some variant of the double extortion model, including Sodinokibi/REvil, DoppelPaymer, Nemty, Nefilim, CLOP, and Sekhmet.
Double extortion fundamentally changed the economics of ransomware defense. Prior to 2019, organizations could mitigate ransomware risk primarily through robust backup strategies. Post-Maze, backups became necessary but insufficient—they protect against operational disruption from encryption, but they do nothing to prevent the regulatory, legal, and reputational damage of data exposure. The threat actor’s leverage shifted from “we control your operations” to “we control your secrets.”
Timeline of Adoption
The adoption curve of double extortion was remarkably steep. By tracking leak site establishment dates and first observed data publications, Dark Angel has reconstructed the following timeline of proliferation:
| Period | Milestone | Active Leak Sites |
|---|---|---|
| Nov 2019 | Maze publishes Allied Universal data; first dedicated ransomware leak site | 1 |
| Q1 2020 | REvil, DoppelPaymer, Nemty launch leak sites; model validated | 5 |
| Q3 2020 | Conti, Egregor, Mount Locker adopt; double extortion becomes dominant | 15 |
| 2021 | LockBit 2.0 launches with integrated exfil tool (StealBit); mass adoption | 32 |
| 2022 | Triple extortion emerges (adding DDoS/customer contact); ALPHV pioneers searchable leaks | 41 |
| 2023 | Industry standard; 88% of ransomware incidents involve data theft | 47 |
| 2024–2025 | Data-only extortion (no encryption) rises; 92% of incidents involve exfiltration | 52 |
The Business Logic of Data Leverage
The strategic rationale behind double extortion is straightforward: it creates a second, independent pressure vector that is orthogonal to operational recovery. Even organizations with pristine backups, tested failover procedures, and the ability to resume operations within hours face an entirely different category of harm from data exposure. The threat actor’s calculation centers on the victim’s regulatory exposure (GDPR fines of up to 4% of global annual revenue, HIPAA penalties, SEC disclosure requirements), litigation risk (class-action suits following data breaches have become routine), competitive damage (exposure of trade secrets, pricing strategies, M&A plans), and reputational harm (customer and partner confidence erosion). In many cases, the cost of data exposure exceeds the cost of operational downtime, making the exfiltration component the more powerful coercive tool.
The Lifecycle of a Double Extortion Attack
Double extortion operations follow a structured lifecycle that unfolds over a period of one to four weeks. Understanding each phase is essential for developing detection strategies that exploit the attacker’s operational constraints and timelines.
Phase 1: Initial Access and Reconnaissance (1–3 Days)
Initial access vectors for double extortion operations remain consistent with the broader ransomware landscape. Dark Angel’s incident data from 2024 identifies the following distribution: exploitation of public-facing applications (32%), primarily VPN appliances (Fortinet FortiOS, Citrix NetScaler, Ivanti Connect Secure) and remote access gateways; phishing and social engineering (27%), with callback phishing and QR code phishing showing notable growth; compromised credentials (24%), frequently purchased from initial access brokers (IABs) on underground forums; and abuse of legitimate remote access tools (17%), including exposed RDP endpoints and misconfigured TeamViewer or AnyDesk installations.
Once inside the perimeter, operators conduct rapid reconnaissance to map the Active Directory environment, identify domain controllers, enumerate file shares, and assess the organization’s security tooling. Common reconnaissance commands include nltest /dclist:, net group "Domain Admins" /domain, systeminfo, and automated tools such as ADRecon, BloodHound, and SharpHound. This phase is typically completed within 24–72 hours and produces artifacts in Windows Event Logs (Event IDs 4624, 4672, 4688) and EDR telemetry that represent the earliest detection opportunity.
Phase 2: Lateral Movement and Privilege Escalation (3–7 Days)
With initial reconnaissance complete, operators pursue domain administrator credentials or equivalent privileges. The most commonly observed escalation paths in 2024 included Kerberoasting (requesting service tickets for offline cracking), AS-REP Roasting (exploiting accounts without pre-authentication), exploitation of misconfigured Group Policy Preferences containing cached credentials, abuse of LSASS memory dumps via tools like Mimikatz or its variants (nanodump, pypykatz), and escalation through certificate services (AD CS abuse, ESC1–ESC8).
Lateral movement relies heavily on living-off-the-land techniques to avoid detection: PsExec, WMI, PowerShell Remoting, and SMB file copy operations. Operators frequently disable or tamper with endpoint detection tools using kernel-level drivers (BYOVD attacks), manipulation of Windows Defender exclusion paths, or deployment of custom EDR-killing tools such as Terminator, AuKill, or BackStab. The progression from a single compromised endpoint to domain-wide access typically takes three to seven days, though in environments with flat network architectures and weak segmentation, this phase can collapse to under 24 hours.
Phase 3: Data Identification and Staging (1–3 Days)
This phase marks the critical divergence between encryption-only ransomware and double extortion operations. Operators systematically survey accessible file shares, databases, email servers, and cloud storage to identify data with maximum coercive value. The priority hierarchy observed across multiple groups follows a consistent pattern: legal and compliance documents (attorney-client privileged materials, regulatory filings, audit reports), financial records (tax returns, bank statements, payroll data, M&A documentation), personal identifiable information (employee and customer PII, medical records, social security numbers), intellectual property (source code, engineering schematics, product roadmaps, research data), and credentials and access tokens (password databases, API keys, certificates).
Operators stage selected data in a centralized location—typically a compromised server with high bandwidth connectivity—and compress it using 7-Zip, WinRAR, or custom archiving tools. File naming conventions frequently follow predictable patterns (data_[department].7z, dump_[date].rar) that can serve as detection indicators. In some sophisticated operations, operators split archives into fixed-size chunks (typically 500 MB to 2 GB) to facilitate parallel exfiltration and reduce the risk of detection through individual large file transfers.
Phase 4: Data Exfiltration (1–2 Days)
Exfiltration represents the phase with the highest detection potential and is discussed in detail in the following section. The median exfiltration window in 2024 was approximately 31 hours, though this varies significantly based on data volume and available bandwidth. Operators balance speed (minimizing detection exposure) against volume (maximizing leverage), and many groups have developed tooling specifically optimized for this tradeoff.
Phase 5: Encryption Deployment (Hours)
With data safely exfiltrated, operators deploy the ransomware payload, typically during off-hours (evenings, weekends, holidays) when security operations center (SOC) staffing is reduced. Deployment is usually automated through Group Policy Objects (GPOs), PsExec scripts, or scheduled tasks propagated via the compromised domain controller. Modern ransomware binaries use intermittent encryption (encrypting only portions of each file) to accelerate the encryption process, with some variants capable of rendering entire enterprise environments inoperable in under 45 minutes.
Phase 6: Ransom Demand and Negotiation (Days–Weeks)
The ransom note, delivered as a text file on encrypted systems and frequently accompanied by a modified desktop wallpaper, directs the victim to a Tor-based negotiation portal. The note explicitly references the stolen data and typically includes a countdown timer—most commonly set to 72 hours for initial contact and 7–14 days before data publication begins. Dark Angel has observed that 68% of victims who ultimately pay make initial contact within the first 48 hours of discovering the ransom note.
Phase 7: Leak Site Publication (If No Payment)
When negotiations fail or the victim refuses to engage, the stolen data is published on the group’s Tor-hosted leak site. Publication strategies vary by group but generally follow a graduated approach: an initial “proof pack” containing a small sample (1–5% of total stolen data) is published alongside the victim listing, followed by additional releases at scheduled intervals, with the full dataset published after the final deadline expires. Some groups, notably ALPHV and its successors, have experimented with making stolen data searchable, allowing anyone to query the dataset for specific names, email addresses, or social security numbers—dramatically amplifying the reputational pressure on victims.
| Phase | Duration | Key Activities | Detection Opportunities |
|---|---|---|---|
| 1. Initial Access | 1–3 days | Exploit CVE, phish, IAB credentials, RDP | IDS/IPS signatures, failed auth spikes, new account creation |
| 2. Lateral Movement | 3–7 days | Kerberoasting, Mimikatz, PsExec, BYOVD | Event 4769 (Kerberos), LSASS access, EDR telemetry |
| 3. Data Staging | 1–3 days | File enumeration, archive creation, staging on server | Bulk file access patterns, 7z/rar process launches, staging directory growth |
| 4. Exfiltration | 1–2 days | rclone, MEGAsync, HTTPS upload, cloud abuse | Anomalous egress volume, cloud API calls, DNS for known exfil domains |
| 5. Encryption | Hours | GPO/PsExec deployment, intermittent encryption | Mass file rename, canary file alerts, MFT anomalies |
| 6. Negotiation | Days–weeks | Tor portal, countdown timer, proof of data | Ransom note discovery, Tor traffic |
| 7. Leak Publication | Post-deadline | Graduated release, full dump, searchable leaks | Dark web monitoring, leak site scraping |
Data Exfiltration Techniques
Tooling and Methods
The tooling used for data exfiltration in double extortion operations has standardized around a relatively small set of utilities, each selected for specific operational advantages. Dark Angel’s analysis of tooling observed across 312 incidents in 2024 reveals the following distribution:
rclone has emerged as the dominant exfiltration tool, observed in 41% of incidents. Originally developed as a legitimate cloud synchronization utility, rclone supports over 40 cloud storage backends and provides built-in encryption, bandwidth throttling, and multi-threaded transfers. Threat actors configure rclone to synchronize staged data to attacker-controlled cloud storage accounts (most commonly MEGA, pCloud, or self-hosted object storage). The tool is frequently renamed to evade basic detection rules—common aliases include svchost.exe, svhost.exe, taskhost.exe, and conhost.exe. Detection should focus on the tool’s distinctive configuration file (rclone.conf) and its command-line flags (--config, --transfers, --checkers, --bwlimit).
MEGAsync is the second most prevalent tool (19%), favored for its high-speed transfers to MEGA.nz’s infrastructure, which provides 50 GB of free storage per account. Groups typically create multiple disposable MEGA accounts using stolen or temporary email addresses, effectively creating unlimited free exfiltration storage. MEGAsync’s encrypted transfer protocol and legitimate TLS traffic patterns make network-level detection challenging without deep packet inspection or endpoint telemetry.
FileZilla and WinSCP (combined 14%) are used for SFTP-based exfiltration to attacker-controlled servers. These tools are most commonly observed when operators have established infrastructure in bulletproof hosting environments that provide dedicated, high-bandwidth upload endpoints. The advantage of FTP/SFTP exfiltration is complete control over the receiving infrastructure; the disadvantage is that establishing and maintaining exfiltration servers introduces operational security risks.
StealBit (9%) is LockBit’s custom-built exfiltration tool, designed to integrate seamlessly with the LockBit ransomware deployment pipeline. StealBit operates as a standalone executable that communicates with a hardcoded set of exfiltration servers, supports automatic file type filtering (prioritizing documents, databases, and archives), and implements connection retry logic. Post-Operation Cronos, variants of StealBit have been observed in use by former LockBit affiliates operating under other RaaS brands.
Other tools (17%) include legitimate cloud storage clients (OneDrive, Google Drive, Dropbox), custom exfiltration implants, abuse of existing VPN tunnels, DNS tunneling (rare but observed in APT-adjacent operations), and in some cases, direct exfiltration through compromised webshells or reverse shells using utilities like curl or wget.
Cloud Storage Abuse
The abuse of legitimate cloud storage services for data exfiltration has become the dominant pattern, displacing the attacker-controlled server model that prevailed before 2022. MEGA.nz remains the most abused platform, accounting for an estimated 38% of all cloud-facilitated exfiltration, followed by miscellaneous file-sharing services (17%), attacker-provisioned Amazon S3 buckets (12%), and pCloud (8%). The appeal is obvious: traffic to these services is encrypted, volumetrically mixed with legitimate business traffic, frequently allowed through corporate firewalls without inspection, and the services themselves provide high-bandwidth upload capacity with minimal identity verification.
The average volume of data exfiltrated per incident reached 427 GB in 2024 (median: 183 GB), with the upper quartile exceeding 1.2 TB. The largest single exfiltration event in Dark Angel’s dataset involved 8.3 TB of data transferred over a 96-hour period. At these volumes, exfiltration generates detectable egress anomalies—the challenge lies in distinguishing malicious uploads from legitimate cloud backup, collaboration, and synchronization traffic. Organizations that establish baseline egress patterns and alert on deviations of 2–3 standard deviations can reliably detect exfiltration events exceeding 50 GB.
Detection Challenges and Opportunities
Exfiltration detection remains one of the most difficult challenges in ransomware defense, but it is not intractable. The key insight is that while individual exfiltration connections may blend with legitimate traffic, the aggregate behavioral pattern of a multi-hundred-gigabyte exfiltration event is anomalous. Effective detection strategies combine network-level indicators (sustained high-volume uploads to cloud services, connections to known exfiltration-associated domains, unusual DNS resolution patterns), endpoint indicators (execution of rclone, MEGAsync, or other known exfiltration tools, creation of large archive files in non-standard directories, mass file access by a single account across multiple shares), and behavioral analytics (deviation from established user or endpoint upload baselines, after-hours bulk data transfers, single endpoints communicating with multiple cloud storage providers simultaneously).
Organizations with mature data loss prevention (DLP) programs have a significant advantage, as exfiltration frequently involves sensitive data categories that should already be monitored under regulatory requirements. Integrating DLP alerts with broader SOC workflows and threat intelligence on active exfiltration infrastructure creates a detection capability that addresses both the technical and strategic dimensions of the exfiltration phase.
Leak Site Infrastructure and Operations
Architecture and Hosting
Ransomware leak sites are exclusively hosted on the Tor network, leveraging onion routing to obscure the physical location of the hosting infrastructure. The typical architecture consists of a front-end web application (most commonly a custom-built PHP or Python application, though some groups use static site generators) served through one or more Tor hidden services, backed by file storage systems capable of hosting terabytes of stolen data. Some groups operate multiple onion addresses—one for the public-facing leak site and a separate address for the victim negotiation portal—to isolate operational security domains.
Reliability has been a persistent challenge for leak site operators. Tor hidden services are inherently susceptible to denial-of-service attacks, and several groups (LockBit, ALPHV) have experienced extended outages due to DDoS campaigns launched by either competing groups or vigilante actors. In response, sophisticated operators have adopted resilient architectures: LockBit operated a network of mirror sites distributed across multiple onion addresses, while ALPHV pioneered the use of clearnet mirrors (accessible without Tor) for maximum victim exposure—a tactic that introduced significant OPSEC risk but dramatically increased the visibility and impact of leaked data.
Publication Strategies
Publication approaches differ materially across groups and represent a strategic choice that reflects each group’s operational philosophy and negotiation leverage model:
Graduated release is the most common approach, employed by an estimated 65% of active groups. The victim listing appears on the leak site with a countdown timer (typically 5–14 days), accompanied by a small proof pack containing representative samples of stolen data (directory listings, sample documents, employee records). If the victim does not engage or fails to reach an agreement, additional data is released in stages until the full dataset is published. This approach maximizes negotiation pressure while preserving the threat actor’s leverage throughout the process.
Immediate full publication is employed by some groups (notably Cl0p during the MOVEit campaign) when the volume of victims is too large for individual negotiations or when the group’s operational model prioritizes reputational impact over per-victim revenue maximization. This approach trades negotiation leverage for public attention and is most commonly associated with mass exploitation campaigns.
Searchable leak databases represent the most aggressive publication strategy. ALPHV/BlackCat introduced the concept of making stolen data searchable by individuals (e.g., allowing employees of a breached company to search for their own personal information in the leaked dataset). This tactic creates intense pressure on victims by enabling individual harm assessment and amplifying media coverage, regulatory scrutiny, and litigation risk.
Major Leak Sites: Operational Characteristics
| Group | Site Status | Victims Listed (2024) | Publication Model | Notable Characteristics |
|---|---|---|---|---|
| LockBit | Degraded (post-Cronos) | ~230 | Graduated, timer-based | Multiple mirrors, affiliate-driven listings, inflated victim counts reported |
| BlackBasta | Active | ~180 | Graduated, proof packs | Selective targeting, long negotiation windows, corporate-focused |
| ALPHV/BlackCat | Defunct (exit scam Mar 2024) | ~90 (pre-exit) | Searchable databases, clearnet mirrors | Pioneered searchable leaks, SEC complaint filing against victim (MeridianLink) |
| Play | Active | ~170 | Graduated, minimal previews | Closed affiliate model, consistent output, focuses on SMBs |
| Medusa | Active | ~140 | Video previews, timer-based | Publishes video walkthroughs of stolen data, high media visibility |
| RansomHub | Active (emerged 2024) | ~210 | Graduated, aggressive timers | Attracted former LockBit/ALPHV affiliates, rapid growth |
| Cl0p | Intermittent | ~65 | Mass publication, campaign-driven | Specializes in zero-day mass exploitation, bulk victim processing |
| Akira | Active | ~130 | Graduated, retro-themed UI | Targets VPN vulnerabilities, distinctive 1980s-style leak site design |
Leak Site Monitoring Methodology
Effective leak site monitoring requires a combination of automated scraping and human analysis. Dark Angel maintains continuous automated monitoring of 52 active leak sites through a distributed network of Tor-connected scrapers that capture new victim listings, countdown timer status changes, data publication events, and site infrastructure changes (new onion addresses, mirror deployments, downtime). Automated monitoring is supplemented by human analysts who assess the veracity of listings (distinguishing genuine breaches from recycled or fabricated data), cross-reference victim organizations with client portfolios, and evaluate emerging trends in publication tactics.
For organizations building in-house leak site monitoring capabilities, the minimum viable approach involves automated Tor scraping of at least the top 15 active leak sites (covering approximately 85% of all DLS publications), cross-referencing new listings against supply chain and third-party risk registers, and integration with threat intelligence platforms for automated alerting. Several commercial threat intelligence platforms now include leak site monitoring as a standard feature, though the depth and timeliness of coverage varies significantly between vendors.
Victim Negotiation Dynamics
Initial Contact and Communication Channels
Modern ransomware groups operate dedicated negotiation portals accessible through unique URLs or access codes embedded in the ransom note. These portals typically feature a real-time chat interface (similar in design to customer support chat widgets), a countdown timer displaying the deadline for data publication, proof of data access (directory listings, sample files, sometimes live data queries), and instructions for cryptocurrency payment. The sophistication of these portals reflects the professionalization of the ransomware industry—they are designed to facilitate efficient transactions and create a sense of urgency and inevitability.
Some groups maintain multiple communication channels. BlackBasta has been observed communicating via both their Tor portal and direct email. Medusa provides a Telegram channel for real-time updates. Several groups offer “customer support” for victims struggling with cryptocurrency purchases, reflecting a calculated effort to reduce friction in the payment process.
Negotiation Tactics and Outcomes
Threat actors employ a structured playbook of negotiation tactics designed to maximize payment probability and amount. The most commonly observed tactics include:
- Countdown pressure: Escalating deadlines with graduated consequences (initial deadline for response, secondary deadline for payment, final deadline before publication begins). Timer resets are offered as a concession during active negotiation.
- Proof of data: Providing samples of particularly sensitive stolen data (executive emails, financial records, customer databases) to demonstrate the severity of potential exposure.
- Sector-specific pressure: Emphasizing regulatory consequences specific to the victim’s industry (HIPAA for healthcare, PCI DSS for financial services, GDPR for organizations with EU data subjects) to contextualize the cost of non-payment.
- Comparative framing: Citing previous victims in the same sector who paid, or referencing public cases where data publication led to regulatory action, litigation, or significant stock price decline.
- Volume anchoring: Opening with an inflated demand and making staged “concessions” that converge on the actual target price. The initial demand typically represents 2–5x the threat actor’s expected settlement amount.
Dark Angel’s analysis of 247 negotiation transcripts obtained through incident response engagements and dark web monitoring reveals that the typical negotiation results in a 30–40% reduction from the initial demand, with a median settlement of approximately $340,000 for mid-market victims (organizations with annual revenue between $50 million and $500 million). The negotiation duration averages 8.3 days, with settlements typically reached between days 5 and 12.
“The decision to pay is never purely financial. It is a risk calculation that weighs ransom cost against regulatory exposure, litigation probability, competitive damage, and operational timeline—and it must be made under extreme time pressure with imperfect information.”
— Dark Angel Incident Response AdvisoryPayment vs. Non-Payment Factors
Across our dataset, approximately 29% of double extortion victims made a ransom payment in 2024, down from an estimated 37% in 2023. The factors most strongly correlated with payment include: presence of highly regulated data (healthcare PHI, financial PII) in the stolen dataset; publicly traded status (driven by SEC disclosure requirements and stock price sensitivity); ongoing M&A activity (where data exposure could jeopardize transactions); small security team without dedicated incident response capability; and absence of cyber insurance or insurer unwillingness to cover the incident. Conversely, organizations with mature incident response plans, legal counsel experienced in ransomware events, and proactive regulatory notification strategies are significantly more likely to decline payment.
Data Categorization and Weaponization
Highest-Value Data Categories
Not all stolen data carries equal coercive weight. Through analysis of negotiation transcripts, leak site publications, and incident response engagements, Dark Angel has identified a hierarchy of data value from the threat actor’s perspective:
Legal and compliance documents occupy the highest tier. Attorney-client privileged materials, pending litigation files, regulatory audit findings, and internal compliance reports create disproportionate pressure because their exposure can directly impact legal proceedings, trigger regulatory investigations, and reveal organizational vulnerabilities. Threat actors who discover legal documents in a stolen dataset will almost invariably feature them prominently in proof-of-data samples.
Financial records and tax filings are the second-highest-value category. Corporate tax returns, bank statements, internal financial models, and compensation data are universally sensitive across industries and geographies. Publicly traded companies face particular exposure due to the potential for material non-public information (MNPI) to be included in financial datasets.
Personal identifiable information represents the broadest category of stolen data and is present in virtually every double extortion incident. Employee PII (social security numbers, home addresses, banking details for direct deposit) and customer PII trigger notification obligations under nearly every data protection framework, creating immediate compliance costs and long-tail litigation exposure.
Intellectual property and trade secrets carry variable value depending on the victim’s industry. For technology companies, pharmaceutical firms, and manufacturers, source code, formulas, engineering designs, and research data represent existential competitive threats if exposed. Threat actors have increasingly demonstrated awareness of this dynamic, charging premium ransoms when IP-heavy datasets are identified.
Credentials and access tokens occupy a dual role: they serve as leverage for ransom negotiations and represent independently monetizable assets. Stolen credentials can be sold on underground markets, used for follow-on attacks against the victim or their partners, or leveraged for identity theft. The presence of enterprise password vaults, API keys, or cloud access tokens in a stolen dataset significantly elevates the threat actor’s negotiation position.
Secondary Monetization
A critical evolution in the double extortion model is the emergence of secondary monetization channels for stolen data. When victims refuse to pay, the data published on leak sites is not merely a punitive measure—it enters a secondary economy where other threat actors, nation-state intelligence services, competitive intelligence firms, and criminal enterprises consume it for their own purposes. Credentials are harvested and sold on specialized markets. Customer databases fuel phishing and identity theft campaigns. Intellectual property may be sold to competitors or nation-state actors. The implication for victims is that even after the immediate ransomware crisis resolves, the stolen data continues to generate harm through channels that are difficult to monitor or mitigate.
Some ransomware groups have formalized secondary monetization. LockBit offered a “buyer option” on some listings, allowing third parties to purchase exclusive access to stolen data at prices that often exceeded the original ransom demand. This creates a perverse market dynamic where the victim competes with unknown third parties for control of their own data. While the actual frequency of third-party purchases remains difficult to verify, the mere existence of the option adds pressure to the victim’s decision calculus.
Impact Beyond the Ransom
The true cost of a double extortion incident extends far beyond the ransom payment itself. Dark Angel’s cost modeling, based on 89 incidents with full financial visibility, identifies the following components: direct incident response costs (forensics, legal, crisis communication) averaging $1.2 million; regulatory fines and settlement costs averaging $2.8 million for incidents involving GDPR-regulated data; litigation costs (defense and settlement of class-action suits) averaging $3.1 million over a three-year period; business disruption costs (lost revenue, delayed projects, customer churn) averaging $4.7 million; and cyber insurance premium increases averaging 45% at the next renewal cycle. The total cost of a double extortion incident for a mid-market organization typically falls between $8 million and $15 million when all direct and indirect costs are aggregated—a figure that significantly exceeds the median ransom payment.
Defensive Recommendations
Effective defense against double extortion requires capabilities specifically designed to detect and prevent data exfiltration, rather than relying solely on traditional anti-ransomware controls focused on encryption prevention. The following recommendations are prioritized by impact and implementation feasibility:
- Deploy network-level egress monitoring with volumetric alerting. Establish baselines for upload volume by endpoint, user, and destination. Alert on sustained high-volume uploads exceeding 2–3 standard deviations from baseline, with particular attention to cloud storage services (MEGA, pCloud, S3) and Tor exit nodes. Solutions like network detection and response (NDR) platforms provide automated baselining and anomaly detection.
- Implement endpoint-level data movement controls. Monitor and alert on execution of known exfiltration tools (rclone, MEGAsync, FileZilla, WinSCP) through application whitelisting, EDR process monitoring, and command-line logging. Block execution of renamed versions of these tools using hash-based or behavioral detection.
- Enforce network segmentation that limits lateral movement. Double extortion operators require domain-wide access to identify and stage high-value data. Segmenting networks to restrict lateral movement between business units, isolating sensitive data repositories, and implementing zero-trust access controls significantly increases the cost and detection surface of the data staging phase.
- Deploy canary files and honeypot file shares. Place convincing decoy documents in file shares that real users would not access. Any access to these files generates high-confidence alerts during the reconnaissance and data staging phases. Canary files are particularly effective because they produce zero false positives when properly implemented.
- Implement data loss prevention (DLP) for high-value data categories. Classify and monitor documents containing PII, financial data, intellectual property, and legal correspondence. DLP controls should operate at both the endpoint and network perimeter, with policies that alert on bulk movement of classified data outside established workflows.
- Harden Active Directory against common escalation paths. Given that domain compromise is a prerequisite for comprehensive data access, hardening AD through tiered administration, privileged access workstations (PAWs), LAPS deployment, and elimination of Kerberoastable SPNs directly constrains the attacker’s ability to achieve the access necessary for data theft at scale.
- Establish and rehearse a double extortion incident response plan. Plans should include pre-negotiated legal counsel familiar with ransomware events, regulatory notification workflows for key jurisdictions (GDPR 72-hour notification, SEC 4-day disclosure), communication templates for employees, customers, and partners, and decision frameworks for evaluating ransom payment that account for data exposure implications, not just operational recovery.
- Monitor leak sites and underground forums proactively. Do not wait for a ransomware event to begin monitoring the dark web. Continuous monitoring of leak sites enables early detection of third-party and supply chain compromises, emerging targeting patterns relevant to your sector, and brand mentions that may indicate reconnaissance or pre-attack activity.
Organizations that rely exclusively on backup-based recovery strategies are systematically underdefending against the data exposure component of double extortion. A robust backup strategy addresses operational disruption from encryption but does nothing to mitigate the regulatory, legal, and reputational consequences of data publication. Defense-in-depth strategies must explicitly address data exfiltration as a distinct threat vector requiring dedicated controls.
Methodology
Data Sources: This report draws on Dark Angel’s continuous monitoring of 52 active ransomware data leak sites (DLS), 247 negotiation transcripts obtained through incident response engagements and dark web monitoring, 89 incidents with full financial cost visibility, and open-source intelligence including law enforcement advisories, vendor publications, and academic research. The observation period covers January 2024 through March 2025, with historical context extending to November 2019.
Analytical Framework: Double extortion lifecycle phases are modeled based on forensic evidence from 312 incidents investigated by Dark Angel’s incident response team and partner organizations. Dwell time calculations use first evidence of compromise (initial access) and first evidence of encryption deployment as boundary markers. Exfiltration volume estimates are derived from network flow analysis, endpoint forensics, and attacker-side infrastructure analysis where available.
Limitations: Financial data (ransom payments, total incident costs) is subject to survivorship bias—victims who pay and resolve incidents quietly are less likely to be represented in public datasets. Statistics on payment rates should be treated as estimates with moderate confidence. Leak site victim counts reflect publicly listed victims and do not account for victims who pay before listing or who are removed post-payment. Exfiltration tool distribution reflects incidents investigated by Dark Angel and may not be representative of the full threat landscape.
Confidence Assessment: Lifecycle phase timelines and exfiltration tool prevalence carry high confidence based on direct forensic analysis. Financial statistics carry moderate confidence. Negotiation outcomes carry moderate confidence with recognized sampling bias toward incidents involving professional negotiation support. Forward-looking assessments carry low-to-moderate confidence and represent analytical judgments rather than empirical findings.
Related Reports
- The State of Ransomware 2025 — Annual overview of the ransomware ecosystem covering major groups, victim analysis, sector distribution, and evolving TTPs.
- Ransomware-as-a-Service: The Business Model Behind Modern Extortion — Deep analysis of RaaS economics, affiliate programs, profit-sharing models, and operational infrastructure.
- LockBit: A Complete Threat Intelligence Profile — Full dossier covering LockBit’s history, infrastructure, affiliate model, and post-Operation Cronos status.
Protect Against Double Extortion
Dark Angel provides continuous leak site monitoring, data exfiltration detection consulting, and incident response support for European enterprises facing ransomware threats.
Request a Briefing