// TEMPLARSEC //
[ 2025-11-08 ] -- /posts/Not_Just_Locked_But_Leaked_Ransomwares_Double_Extortion

Not Just Locked, But Leaked:Ransomware's "Double Extortion".

It used to be that a ransomware attack was a (horrible) but straightforward negotiation. Your files were encrypted, and you paid for the key. If you had good backups, you could often restore your systems. Those days are over.

The new standard, used by gangs like "Interlock" in their recent attack on the Kettering Health network, is "double extortion." Before they encrypt a single file, hackers now spend weeks quietly moving through your network, exfiltrating (stealing) your most sensitive data: patient records, financial reports, and employee files. Now, the ransom demand comes with a new, terrifying threat: "Pay us, and we'll give you the key. Don't pay us, and we'll leak all your sensitive data to the dark web." This changes the entire game. Suddenly, your backups don't matter. This is no longer a business continuity problem; it's a massive, public data breach. The Takeaway: Prevention is everything.

You can't just rely on backups.

Your defense strategy must focus on detection and containment. You have to be able to spot an intruder before they steal your data. This is where 24/7 monitoring, network segmentation, and endpoint detection (EDR) become non-negotiable.

  • Ransomware Has Evolved
  • Backups Are Not Enough
  • Defense Must Shift to Detection

Source: HIPAA Journal: "Kettering Health Confirmed Patient Data Compromised in May 2025 Ransomware Attack" www.hipaajournal.com/kettering-health-ransomware-attack/