By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Ransomware rises and attackers adopt threats in four phases
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > Ransomware rises and attackers adopt threats in four phases
Mobile

Ransomware rises and attackers adopt threats in four phases

News Room
Last updated: 2025/08/27 at 4:58 PM
News Room Published 27 August 2025
Share
SHARE

Akamai Technologies He has published his 2025 ransomware reportin which it emphasizes that The attackers are implementing a new extortion tactic in four phases In ransomware campaigns. However, the double extortion remains the most used by cybercriminals.

The emerging quadruple extortion trend includes distributed attacks on service denial (DDOD), to interrupt company operations and harass third parties, such as clients, partners or media. In this way, they try to increase the pressure on the victim.

This technique is based on double extortion ransomware, in which the attackers are limited to encrypting the data of a victim and threatening to filter them if it does not pay a rescue. But according to Steve Winter field, Ciso the Akamai«Current ransomware threats go beyond data encryption. The attackers press their victims through data theft and their public exhibition, as well as with service interruptions. With the application of these methods, cyber attacks cause great magnitude business crises, which is forcing companies to rethink their preparation and response strategy«.

According to the report, the generative AI and the LLM are key in increasing the frequency and scale of ransomware attacks, since they allow attackers with little experience to perform sophisticated campaigns. In addition, the LLMs help write ransomware code since groups improve their social engineering tactics.

Hybrid ransomware and hacktivism groups, driven by political, ideological and financial causes more and more ransomware platforms as a service to increase their impact. As for cryptohed programs, they have their own dangers, but their objectives and strategies are similar to those of ransomware groups.

According to Akamai researchers, almost half of the cryptoking attacks they analyzed were aimed at educational organizations and NGOs, probably due to lack of resources in their sectors. The report also includes an analysis of the current legal and regulations related to the response of organizations to ransomware.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Nintendo's Latest Updated Switch 2 Game Has Me Hungering for More
Next Article I will never buy a Google Pixel for these 4 reasons
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Today's NYT Strands Hints, Answer and Help for Aug. 28 #543 – CNET
News
Learn to take incredible photos with Phone Photography School – Save 80% today!
News
Bristol’s EnsiliTech raises £4.5m for vaccine transport system – UKTN
News
Your Posts on X Are Being Used to Train Grok AI. Here’s How to Stop it
News

You Might also Like

Mobile

Get Free Rewards Without Spending Diamonds and Here’s the Full Guide Inside

3 Min Read
Mobile

Maximum risk for Intel by the entry of the US Government

3 Min Read
Mobile

Browsers prepare for the most radical transformation in their history. One in which the IA will be

5 Min Read
Mobile

Companies have security and efficiency deficiencies that hinder the IA escalation

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?