* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Palo Alto Networks](https://origin-researchcenter.paloaltonetworks.com/blog/corporate/) * [Announcement](https://origin-researchcenter.paloaltonetworks.com/blog/category/announcement/) * Multi-Extortion Technique... # Multi-Extortion Techniques: Data Theft and Harassment on the Rise [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2023%2F03%2Fmulti-extortion-techniques%2F) [](https://twitter.com/share?text=Multi-Extortion+Techniques%3A+Data+Theft+and+Harassment+on+the+Rise&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2023%2F03%2Fmulti-extortion-techniques%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2023%2F03%2Fmulti-extortion-techniques%2F&title=Multi-Extortion+Techniques%3A+Data+Theft+and+Harassment+on+the+Rise&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://origin-researchcenter.paloaltonetworks.com/blog/2023/03/multi-extortion-techniques/&ts=markdown) \[\](mailto:?subject=Multi-Extortion Techniques: Data Theft and Harassment on the Rise) Link copied By [Michael Sikorski](https://www.paloaltonetworks.com/blog/author/michael-sikorski/?ts=markdown "Posts by Michael Sikorski") Mar 23, 2023 6 minutes [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown) [ransomware](https://www.paloaltonetworks.com/blog/tag/ransomware/?ts=markdown) [ransomware and extortion report](https://www.paloaltonetworks.com/blog/tag/ransomware-and-extortion-report/?ts=markdown) Today's ransomware gangs are constantly evolving their tactics to pressure organizations to pay ransoms. These tactics often use multi-extortion techniques. Based on extensive research from the Unit 42 threat intelligence and response teams, the [2023 Unit 42 Ransomware and Extortion Report](https://start.paloaltonetworks.com/2023-unit42-ransomware-extortion-report) exposes how active ransomware groups are increasing the pressure on targeted organizations. ![Ransomware and extortion report](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/03/slackheader1.png) Our findings highlight that ransomware now involves more than encrypting files. This means that the traditional advice of maintaining backups is no longer sufficient. Organizations need to be prepared for the added extortion techniques and pressure used by modern-day ransomware gangs, which requires a more in-depth incident response plan to achieve resilience. ## The State of Ransomware and Extortion ![Encryption, data theft, DDoS and harassment extortion techniques.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/03/word-image-181704-1.jpeg) Figure 1: Multi-Extortion Techniques In late 2022, threat actors engaged in data theft in 70% of Unit 42 ransomware incidents on average, compared to about 40% in mid-2021. Ransomware incidents extend beyond just stealing data. Unit 42 has also observed an increase in harassment as an extortion technique. During a period of 18 months, from May 2021 through October 2022, harassment as an extortion tactic grew from an average of less than 1% of Unit 42's monthly ransomware cases to a monthly average of approximately 20%. ## Key Takeaways from The 2023 Unit 42 Ransomware and Extortion Report Among the extensive research and analysis in the report, there are three takeaways that stand out. These takeaways are related to the way the ransomware landscape is changing, how organizations are responding, and what the future might hold as security and attack tactics evolve. ### Willingness to Pay the Ransom Is Going Down Ransomware has been around for over 15 years and has grown in popularity over the last few years. This growth in ransomware attacks has caused organizations to pay attention and take actions to protect themselves. Organizations have improved their ability to create and recover from backups, especially given redundancy capabilities in the cloud. The cyber insurance industry has also increased the level of scrutiny on organizations in order to qualify for insurance coverage. In general, the cyber insurance industry will only insure an organization that shows evidence of data backups. ### Multi-Extortion Is Increasing --- Companies Are Harassed for Ransom Victims' willingness to pay for incidents that just involve encryption has decreased. In response, attackers have adapted and are changing tactics. They have realized that encryption alone might not be compelling enough to force an organization to pay a ransom. So, attackers will steal data first and then encrypt files. They then threaten to sell stolen data or make it public if an organization does not pay the ransom. If victims refuse to pay, attackers escalate to harassment, where they often target employees and customers. #### Harassment Tactics * Calling or emailing employees, customers, and even the executives' family members constantly * Thwarting business deals and product launches * Telling customers to leave * Crashing websites ![Threat actors' use of additional extortion techniques.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/03/word-image-181704-2.jpeg) Preparation is key. Organizations that take additional steps to prepare for multi-extortion attacks will set themselves up for being a less tempting target. ### Gangs Willing to Ransom Schools and Hospitals [Vice Society](https://unit42.paloaltonetworks.com/vice-society-targets-education-sector/) is the gang behind a recent attack at a LA school District. They have targeted at least 137 school systems and local governments since 2021. This group has demonstrated that no organization is off limits for their attacks, and they're willing to hit victims wherever valuable data is held. In the Los Angeles school district attacks, threat actors published student mental health records. In this situation, the gang aimed to make people's lives difficult. Schools are tasked with protecting a treasure trove of sensitive data, without the resources to keep it safe from attackers. (For more on Vice Society, watch our [discussion with Nasdaq TradeTalks](https://www.nasdaq.com/videos/how-companies-can-transform-their-security-strategy-with-a-threat-informed-approach).) ## Our Advice to Leaders: Take a More Proactive Approach to Your Security Strategy As threat actors continue to use various extortion methods to coerce organizations into paying, it is imperative to evolve your defenses. Your incident response plan needs to safeguard your organization's reputation and to protect your employees or customers who may become targets. ### Prepare a Playbook for Multi-Extortion In an extortion incident, quick support from an [Incident Response team](https://www.paloaltonetworks.com/unit42/respond/incident-response) and legal counsel is crucial. A comprehensive incident response plan with crisis communication protocols can help reduce uncertainty and clarify decision-making. The plan should also address how to handle employee and client harassment, and staff should receive ransomware awareness training. After an incident, you should conduct a post-mortem assessment to ensure any remaining backdoors or indicators of compromise are removed to prevent follow-up attacks. ### Help Ensure Complete Visibility via XDR Technology To protect your organization from threats, it's important to increase visibility in your environments. Endpoint Detection and Response (EDR) tools provide effective protection against endpoint attacks, but an Extended Detection and Response ([XDR](https://www.paloaltonetworks.com/cortex/detection-and-response)) solution, offers a proactive approach to threat detection and response. With XDR, cybersecurity teams can prevent threats in multiple ways: * Identify hidden, stealthy and sophisticated threats proactively and quickly. * Track threats across any source or location within the organization. * Increase the productivity of the people operating the technology. * Get more out of their security investments. * Conclude investigations more efficiently. ### Implement a Threat Intelligence Program With a chartered, funded and staffed [threat intelligence program](https://www.paloaltonetworks.com/unit42/transform/security-program-design) in place, you can learn about the tactics, techniques and procedures (TTPs) that attackers use. This program can provide your defenders with specific indicators to monitor for the latest TTPs to quickly detect and mitigate a ransomware attack. Unit 42 consultants can help design or enhance a threat-informed security program based on lessons learned from our incident response investigations. ### Proactively Manage and Reduce Your Attack Surface Inventory At least 75% of ransomware attacks and breaches fielded by Unit 42's Incident Response teams result from attack surface exposures. The key is to continuously identify, monitor and manage all internet-connected assets, both internal and external, for potential attack vectors, exposures and risks. [Cortex Xpanse's](https://www.paloaltonetworks.com/cortex/cortex-xpanse) Active Attack Surface Management can discover unknown exposures and provide contextualized results to prioritize findings and align security concerns with your organization's critical assets. ### Implement Enterprise-Wide Zero Trust Architecture You can reduce the impact of cyberattacks by rapidly containing your attack surface and implementing an effective Zero Trust Network Architecture (ZTNA). A refined version called [ZTNA 2.0](https://www.paloaltonetworks.com/sase/ztna) creates layers of security, slowing down attackers and providing more time for detection and response. This makes an attacker's job harder and increases the chance of proper threat containment and remediation. ### Pressure Test Your Incident Response Plans and Programs Regularly reviewing, testing and updating your incident response plans improves your ability to respond to attacks quickly. Conducting [incident simulation and testing exercises](https://www.paloaltonetworks.com/resources/datasheets/unit-42-incident-simulation-and-testing-services), as well as partnering with Unit 42 security consultants, can strengthen your organization's preparedness and communication cadence. This will also improve the likelihood of early detection and containment, as well as identify opportunities for improving your overall security posture. ## Get the Ransomware and Extortion Report Get the full [2023 Unit 42 Ransomware and Extortion Report](https://start.paloaltonetworks.com/2023-unit42-ransomware-extortion-report) for the latest insights on multi-extortion techniques, including those that ransomware gangs are using to increase pressure on their victims. For an in-depth set of recommendations by Unit 42 incident responders, read our special publication, [Mitigating Cyber Risks with MITRE ATT\&CK](https://start.paloaltonetworks.com/2023-unit42-mitre-attack-recommendations). It includes both strategy and practitioner-focused recommendations, so you can put these insights into action. *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown) [#### A Leader in the 2025 Gartner Magic Quadrant for EPP --- 3 Years Running](https://origin-researchcenter.paloaltonetworks.com/blog/2025/07/named-a-leader-gartner-magic-quadrant/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown) [#### Palo Alto Networks Recognized as a Leader in Omdia Market Radar](https://origin-researchcenter.paloaltonetworks.com/blog/2025/02/leader-omdia-market-radar/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown) [#### MITRE ATT\&CK Evaluations --- Cortex XDR Among Elite in Endpoint Security](https://origin-researchcenter.paloaltonetworks.com/blog/2025/02/mitre-attck-evaluations-cortex-xdr-among-elite-endpoint-security/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Today's Cyberthreats: Ransomware, BEC Continue to Disrupt](https://origin-researchcenter.paloaltonetworks.com/blog/2022/07/cyberthreats-incident-response-report/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/cloud-security/category/partners/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Palo Alto Networks a Preferred Cybersecurity Service Provider for AHA](https://origin-researchcenter.paloaltonetworks.com/blog/2021/06/aha-preferred-cybersecurity-service-provider/) ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Securing the Agentic Endpoint](https://origin-researchcenter.paloaltonetworks.com/blog/2026/02/securing-the-agentic-endpoint/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language