Tech

The Evolution of Ransomware: Multi-Extortion Ransomware Attacks

The Real-World Impact of Ransomware on Every Industry

In February 2026, the University of Mississippi Medical Center (UMMC) was the victim of a ransomware attack. The incident knocked the Epic electronic health record system offline at 35 clinics and more than 200 telehealth sites, forcing the cancellation of chemotherapy appointments and the postponement of non-emergency surgeries. Medical staff had to go back to a paper-based way of working, leaving a large number of patients to bear the consequences.

MMC is far from an isolated case. According to recent data, 93% of US healthcare organizations have experienced at least one cyberattack by 2025, and 72% of respondents reported that at least one incident directly affected patient care.

The manufacturing and financial sectors are equally represented. In February 2026, payment processing network BridgePay was attacked by ransomware that took its APIs, virtual terminals, and payment pages completely offline. Across all industries, publicly disclosed ransomware attacks increased by 49% year-on-year by 2025, reaching 1,174 confirmed incidents.

As hospitals halt treatment, financial institutions halt transactions, and manufacturers shut down production lines, ransomware has firmly established itself as a direct business risk with tangible operational consequences.

The Evolution of Ransomware: Double Extortion

Early ransomware works in a straightforward manner: enter the system, encrypt files, and demand payment in exchange for the decryption key. As organizations began to combat this tactic by returning copies of it instead of paying ransoms, the threat actors responded by developing a more profitable model – double fraud.

In a double phishing attack, adversaries first extract sensitive files — such as patient records and billing data — before encrypting the target system. Victims are then pressured in two ways: pay to get the decryption key, or face public exposure of the stolen data.

Backups alone are not enough against this model. Since the attackers already have the data, refusing to pay the ransom can lead to the public release of sensitive files, exposing organizations to significant business losses and regulatory consequences.

The threat landscape continued to escalate, as cases of triple fraud increased – a tactic in which attackers communicate directly with the victim’s organization’s customers or partners to apply additional pressure.

As of 2025, 124 active ransomware groups have been identified, 73 of which are newly emerging.

The proliferation of AI-enabled tools has lowered the barrier to entry for cybercriminals, making ransomware capabilities more accessible to professional players.

ID.AMO makes stolen data unreadable.

See how D.AMO protects against all stages of ransomware attacks.

Read more

Defense Architecture for Multi-Theft Threats

The rise of multi-extortion ransomware is fundamentally changing the basic assumptions of traditional security strategies. Perimeter-based deterrence alone is no longer sufficient.

Organizations need a security posture that protects data from weaponization after a breach – it provides data that is filtered out of readability, prevents ransomware from accessing files in the first place, and enables rapid recovery even when an attack is successful.

Flow diagram of a muti-extortion ransomware attack

ID.AMO: Blocks All Stages of Ransomware Attacks

ID.AMO, developed by Penta Security, is an encryption-based data protection platform designed to address each stage of a ransomware attack. It delivers unified encryption, access control, and backup across all on-premises and cloud environments.

Using file encryption and process-based access control technology, D.AMO protects valuable data stored on servers and PCs – protecting sensitive information from malicious programs by enforcing strict access. The key competencies of D.AMO are as follows:

Folder Level File Encryption

ID.AMO KE encrypts all files within the folders designated by the administrator at the OS level. Installable with no source code modification, it works using kernel-level encryption technology, enabling fast and secure encryption on existing systems without disrupting the user experience.

Encryption policies are applied at the folder level, ensuring consistent security with minimal performance overhead. Importantly, even if an attacker extracts sensitive data, the files remain encrypted – making it easy to expose the basic data exposure threat of a double heist.

Access Control

ID.AMO KE enforces strict access control on OS processes and users, allowing only explicitly authorized access. Ransomware and other malicious applications are automatically blocked from accessing encrypted folders, preventing unauthorized manipulation of files.

All blocked activity is recorded in the activity log file and can be reviewed centrally through the D.AMO Control Center.

Backup and Restore

Even in the event of a successful attack, organizations can resume operations with an independently managed recovery plan. With D.AMO in place, the ability to restore from a backup greatly reduces dependence on decryption key negotiations with malicious actors.

As phishing tactics become more common, disabling data attackers has become an important strategy. Organizations need the ability to make encrypted data unreadable, prevent ransomware from accessing files, and recover quickly in the event of incidents.

ID.AMO addresses each phase of a ransomware attack within one integrated platform – integrating encryption, process-based access control, and backup into a unified line of defense.

Want to learn more? Download the D.AMO Data Sheet.

Sponsored and written by Penta Security.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button