Why pure extortion is replacing traditional ransomware


Why pure extortion is replacing traditional ransomware

Pierluigi Paganini
May 23, 2026

Ransomware gangs are shifting from encryption to pure extortion, focusing on stolen data, reputational pressure, and stealthier attacks.

Ransomware groups are quietly changing strategy in 2026. Instead of encrypting systems and causing immediate disruption, many attackers are now focusing on pure extortion: stealing sensitive data and threatening to leak it publicly if victims refuse to pay.

This shift is happening for a simple reason. Encryption is noisy, risky, and easier for defenders to detect. Data theft is often faster, quieter, and in many cases more profitable.

Several recent reports suggest attackers are increasingly prioritizing credential theft, long-term access, and exfiltration over traditional ransomware deployment. The pressure point is changing too. Companies are no longer paying just to restore operations, they are paying to avoid reputational damage, regulatory fallout, and exposure of sensitive internal documents.

The biggest incidents of the past months show the same pattern again and again: attackers are causing enormous damage without encrypting systems at all.

The shift is now visible at scale.

According to Kaspersky’s State of Ransomware 2026, ransom payment rates have collapsed from roughly 76% in 2019 to just 28% in 2026. In practice, fewer than one in three victims now pays.

“The new model is pure data extortion: steal it, threaten to publish it, monetise either through victim payment or, increasingly, direct resale on the data leak site. In May 2026 this isn’t an exotic experiment.” reads the report published by the Ransomnews Research Team. “It’s the default playbook.” continues the report.

Attackers adapted because the old model became less effective. Better backups, stricter cyber-insurance rules, regulatory pressure, and improved incident response reduced the profitability of large-scale encryption campaigns.

Encryption also creates operational problems for attackers. It generates forensic evidence, triggers EDR alerts, and gives defenders time to react.

“The shift is rational. Encryption is operationally expensive for the attacker, it leaves loud forensic artifacts, triggers EDR alerts on file-rewrite patterns, requires per-victim key management, and exposes the operator to law-enforcement decryption assistance.” continues the report.”Extortion-only attacks are faster, quieter, and far harder for backup-and-restore strategies to neutralise. The data is already out the door before the victim notices.”

The numbers behind recent attacks explain why this model is becoming dominant.

In May 2026, ShinyHunters claimed to have stolen around 3.65 TB of data from Instructure, the company behind Canvas LMS. The leak allegedly affected roughly 275 million students, teachers, and staff across approximately 9,000 educational institutions.

Around the same period, the Nitrogen gang targeted Foxconn’s North American operations, reportedly exfiltrating:

  • 11 million files
  • nearly 8 TB of internal data
  • technical drawings
  • project documentation
  • confidential manufacturing information

In both cases, encryption was either absent or secondary. The pressure came entirely from data exposure.

That changes the defensive equation significantly.

Traditional ransomware response plans focused heavily on:

  • restoring systems,
  • recovering encrypted files,
  • rebuilding infrastructure,
  • and negotiating decryption keys.

But when attackers skip encryption entirely, those controls lose much of their value. Organizations can restore systems quickly and still suffer a catastrophic breach because the stolen data already exists outside their control.

The economics have changed too:

“When the leak site itself is the product, the victim’s negotiation position weakens dramatically.” states the report. “The most important strategic shift is the one with the least technical content. In the 2020 model, the data leak site was a coercion device: pay or we publish. In the 2026 model, the data leak site is the product. Operators have built downstream relationships with carders, identity-fraud rings, and (in some confirmed cases) sanctioned intelligence services that purchase exfiltrated datasets directly. Victim payment is no longer the only, or even the primary, revenue channel for some operators.”

Leak sites are no longer just pressure tools. They became marketplaces. Stolen datasets are increasingly monetized through resale to fraud groups, identity theft operations, and other criminal buyers even if victims refuse to pay.

Another major trend in 2026 is the widespread adoption of EDR-killer utilities.

Attackers now routinely disable endpoint detection systems before beginning reconnaissance or exfiltration. The most common method remains BYOVD (Bring Your Own Vulnerable Driver), where attackers load signed but vulnerable Windows drivers to terminate security tools at kernel level.

What used to be considered advanced tradecraft in 2024 is now becoming standard even among mid-tier ransomware affiliates.

Operational timelines are also shrinking:

  • Initial access to reconnaissance: often 2–7 days
  • Data exfiltration: sometimes completed in 1–4 days
  • Public leak-site listing: often within hours after exfiltration

By removing the encryption phase entirely, attackers cut several days from the attack lifecycle while also eliminating the loudest detection stage.

For defenders, this means the old ransomware playbook is no longer enough.

The priority is shifting toward:

  • exfiltration detection,
  • outbound traffic monitoring,
  • cloud-storage abuse detection,
  • off-host logging,
  • DLP controls,
  • and rapid disclosure readiness.

Backups still matter. But backups alone do not protect against a public data leak involving millions of records or years of intellectual property.

The uncomfortable reality is that ransomware did not become weaker. It became quieter, faster, and more focused on long-term data exposure instead of immediate operational disruption.

“It would be easy to read the encryption-less shift as good news. After all, encryption was the part of ransomware that did the most operational damage to victims, locked systems, broken supply chains, halted hospitals. If operators stop encrypting, isn’t that a defensive win?” concludes the report. “Not exactly. The reduction in encryption is balanced by an increase in the scope and persistence of the data exposure. A 275-million-record dataset on a public leak site is a 30-year liability for the victims of that data. A 10-million-file Foxconn dump rewrites the threat models of every downstream brand whose IP it touches. The visible operational damage is smaller. The invisible long-tail damage is much larger.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, ransomware)







Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Whoop MG on arm

The Whoop is one of the devices that Google’s rumored screenless health tracker would compete with.

Nina Raemont/ZDNET

Follow ZDNET: Add us as a preferred source on Google.


ZDNET’s key takeaways 

  • Google is poised to unveil a Whoop dupe soon. 
  • Steph Curry teased a screenless health band on his Instagram. 
  • Here’s what I’d like to see from a Google fitness band. 

Could Google’s latest fitness tracker return to its original, screenless Fitbit form? All signs say yes. Google has teased a screenless, Whoop-adjacent health tracker with the help of basketball star Steph Curry. A recent Instagram post from Curry shows him wearing a screenless, fabric band around his wrist, and the accompanying caption promotes “a new relationship with your health.” 

There are scant confirmed details on this next device, but rumors suggest the band will be called “Fitbit Air.” 

Also: I replaced my Whoop with a rival fitness band that has no monthly fees – and it’s nearly as good

Why a screenless fitness band? And why now? Google’s new device could be taking interest away from popular fitness brand Whoop. Whoop’s fitness band is on the more luxurious end of the health wearables spectrum. The company offers three subscription tiers, starting at $199, $239, and $359 annually. Google’s device, on the other hand, is rumored to be more affordable with the option to upgrade to Fitbit Premium. 

Google has the opportunity to make an accessibly priced fitness band with the rumored Fitbit Air and breathe new life into its older Fitbit product lineup, which hasn’t been updated in years. 

What I’m expecting 

Here’s what I expect to see and what I hope Google prioritizes in this new health tracker.

Given Fitbit’s bare-bones approach to fitness tracking, I assume Google will emphasize an affordable, accessible fitness band with the Fitbit Air. Most Fitbit products cost between $130 and $230, so I’m expecting this band to be on the lower end of that price range. I’d also expect Fitbit to give users a free trial of Fitbit Premium. 

Also: T-Mobile is practically giving away the Apple Watch Series 11 – here’s how to get one

A long, long, long battery life 

A smartwatch with a bright screen and integrations with an accompanying smartphone consumes a lot of power. That’s why some of the best smartwatches on the market have a middling battery life of one to two days, tops. 

A fitness band, on the other hand, is screenless. That makes the battery potential on this Fitbit Air double — or even triple — that of Google’s smartwatches.

Also: I use this 30-second routine to fix sluggish Samsung smartwatches – and it works every time

The Fitbit Inspire 3 has around 10 days of battery life — with a watch display. I hope the screenless Fitbit Air has at least 10 days of battery life, plus some change. Two weeks of battery life would be splendid. 

In addition to usage time, I also hope that a screenless fitness tracker addresses some of the issues Fitbit Inspire users have complained about. Many Inspire users report that the device’s screen died after a year of use. They could still access data through the app, but the screen was dysfunctional. Despite being a more affordable Google health tracker, the Fitbit Air should last users for a few years without any hardware issues — or at least I hope it does. 

Fitbit’s classically accurate heart rate measurements 

As Google’s Performance Advisor and the athlete teasing Google’s next device, Steph Curry is sending the message that this new device, one that offers wearers “a new relationship with your health,” will be built for athletes and exercise enthusiasts. I hope this device homes in on accurate heart rate measurements and advanced sensing, as other Fitbit devices do. 

Also: I walked 3,000 steps with my Apple Watch, Google Pixel, and Oura Ring – this tracker was most accurate

Like Whoop, I hope the insights the Fitbit Air provides are performance- and recovery-driven. Whoop grew in popularity for exactly this reason. Not only do Whoop users get their sleep and recovery score, but they also see, through graphs and health data illustrations, how their daily exercise exertion, strain, and sleep interact with and inform each other. 

I’m assuming that Fitbit Premium, with its AI-powered health coach and revamped app design, may do a lot of the heavy lifting for sleep and recovery insights with this new product. 

Also: Are AI health coach subscriptions a scam? My verdict after testing Fitbit’s for a month

But I also hope Google adds a few features on the app’s home screen that specifically target athletic strain and recovery, beyond the steps, sleep, readiness, and weekly exercise percentage already available on the Fitbit app’s main screen. 

Lots of customizable, distinct bands 

I hope the Fitbit Air is cheap — and the accompanying bands are even cheaper. If the rumors of affordability are true, then I’d hope Fitbit sells bands that can be worn with the device that match users’ styles and color preferences at a similarly affordable and accessible price point. Curry wears a gray-orange band in his teaser. I hope the colorways for this device are bold, patterned, and easily distinguishable from rival fitness bands. 





Source link