Double extortion: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
(Create page - source - The Treasurer - In case you missed it - 9 December 2021)
 
(Add link.)
 
Line 14: Line 14:
*[[Cyber security]]
*[[Cyber security]]
*[[Cyberthreat]]
*[[Cyberthreat]]
*[[Dark web]]
*[[Initial access broker]]
*[[Initial access broker]]
*[[Malware]]
*[[Malware]]
Line 21: Line 22:
*[[Whaling]]
*[[Whaling]]


[[Category:The_business_context]]
[[Category:Identify_and_assess_risks]]
[[Category:Identify_and_assess_risks]]
[[Category:Manage_risks]]
[[Category:Manage_risks]]
[[Category:Risk_reporting]]
[[Category:Risk_frameworks]]
[[Category:Risk_frameworks]]
[[Category:Risk_reporting]]
[[Category:The_business_context]]
[[Category:Technology]]

Latest revision as of 01:53, 5 February 2024

Cyberthreat - ransomware.

Double extortion is a form of ransomware attack in which the attacker not only corrupts the victim's data, but also threatens to leak its sensitive information online.


Why double extortion is surging
"... the dramatic surge in this practice stems from an 'unholy alliance' between ransomware makers and initial access brokers – the latter of whom are operating on the dark web and presenting themselves as malicious twins of legitimate software providers."
The Treasurer online, 9 December 2021.


See also