{"id":20877,"date":"2023-07-20T14:30:00","date_gmt":"2023-07-20T12:30:00","guid":{"rendered":"https:\/\/www.defencetech.it\/?p=20877"},"modified":"2025-06-10T10:05:45","modified_gmt":"2025-06-10T08:05:45","slug":"malware-analysis-report-multi-extortion-ransomware-and-encryption-attacks-less","status":"publish","type":"post","link":"https:\/\/tinextadefence.it\/en\/malware-analysis-report-multi-extortion-ransomware-and-encryption-attacks-less\/","title":{"rendered":"Malware Analysis Report - Multi-extortion Ransomware and encryption-less attacks"},"content":{"rendered":"<p>For today's report, we looked at the evolution of ransomware attacks, which have become increasingly unpredictable and sophisticated over the years.\u00a0<\/p>\r\n\r\n\r\n\r\n<p>In this case, we focused on two particular strategies: the <strong>multiple extortion tactics<\/strong> and the<strong>attack<\/strong> <strong>without encryption<\/strong>.\u00a0<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>The first involves the perpetrators of threats not only exfiltrating the victim's data (by encrypting it), but resorting to further coercive measures, such as launching DDoS (Distributed Denial of Service) attacks and direct contact with the victim's customers or business partners.\u00a0<br \/>\u00a0<\/li>\r\n\r\n\r\n\r\n<li>Unencrypted attacks, on the other hand, consist of the exfiltration of files without encryption. The focus of extortion shifts to the importance of information\u00a0<br \/>contained in the exfiltrated files.\u00a0<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>The purpose of the report is to raise awareness of the issue and to warn of the development of these attacks. I <em>threat actors<\/em> are making their attack strategies more efficient, as they have realised that stealing sensitive data, information or projects increases the pressure on victims and the possibility of ransom.\u00a0<\/p>\r\n\r\n\r\n\r\n<p>Organisations must be aware of these threats and take appropriate measures to protect their valuable data and systems with preventive measures.\u00a0<\/p>\r\n\r\n\r\n\r\n<p>If you wish to learn more, here is the link to our <strong><a href=\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Report-Multi-extortion-Ransomware.pdf\">full report<\/a><\/strong>.\u00a0\u00a0\u00a0<\/p>\r\n\r\n\r\n\r\n<p><span data-contrast=\"none\">In addition, you can subscribe to the specific mailing list <b>Cyber Studios by Tinexta Defence<\/b>, to receive updates on upcoming research: <\/span><a href=\"https:\/\/tinextadefence.it\/en\/cyber-studios-mailing-list\/\"><span data-contrast=\"none\">https:\/\/tinextadefence.it\/mailing-list-cyber-studios\/<\/span><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Per il report odierno, abbiamo osservato l\u2019evoluzione degli attacchi ransomware, che, negli anni, sono diventati sempre pi\u00f9 imprevedibili e sofisticati.\u00a0 Nella fattispecie, ci siamo concentrati su due strategie particolari: la tattica di estorsione multipla e l\u2019attacco senza crittografia.\u00a0 La finalit\u00e0 del report mira alla sensibilizzazione sul tema e a mettere in guardia sull&#8217;evoluzione di questi [&hellip;]<\/p>","protected":false},"author":2,"featured_media":26257,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[102],"tags":[110],"class_list":["post-20877","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tinextadefencebusiness","tag-articoli"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware Analysis Report\u00a0-\u00a0Multi-extortion Ransomware e attacchi encryption-less - Tinexta Defence<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tinextadefence.it\/en\/malware-analysis-report-multi-extortion-ransomware-and-encryption-attacks-less\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware Analysis Report\u00a0-\u00a0Multi-extortion Ransomware e attacchi encryption-less - Tinexta Defence\" \/>\n<meta property=\"og:description\" content=\"Per il report odierno, abbiamo osservato l\u2019evoluzione degli attacchi ransomware, che, negli anni, sono diventati sempre pi\u00f9 imprevedibili e sofisticati.\u00a0 Nella fattispecie, ci siamo concentrati su due strategie particolari: la tattica di estorsione multipla e l\u2019attacco senza crittografia.\u00a0 La finalit\u00e0 del report mira alla sensibilizzazione sul tema e a mettere in guardia sull&#8217;evoluzione di questi [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tinextadefence.it\/en\/malware-analysis-report-multi-extortion-ransomware-and-encryption-attacks-less\/\" \/>\n<meta property=\"og:site_name\" content=\"Tinexta Defence\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-20T12:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-10T08:05:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simone Sorte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simone Sorte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/\"},\"author\":{\"name\":\"Simone Sorte\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/person\/1f5092d13bbba815b7d8508dc4a0a941\"},\"headline\":\"Malware Analysis Report\u00a0&#8211;\u00a0Multi-extortion Ransomware e attacchi encryption-less\",\"datePublished\":\"2023-07-20T12:30:00+00:00\",\"dateModified\":\"2025-06-10T08:05:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/\"},\"wordCount\":234,\"publisher\":{\"@id\":\"https:\/\/tinextadefence.it\/#organization\"},\"image\":{\"@id\":\"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg\",\"keywords\":[\"Articoli\"],\"articleSection\":[\"#TDefenceBusiness\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/\",\"url\":\"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/\",\"name\":\"Malware Analysis Report\u00a0-\u00a0Multi-extortion Ransomware e attacchi encryption-less - Tinexta Defence\",\"isPartOf\":{\"@id\":\"https:\/\/tinextadefence.it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg\",\"datePublished\":\"2023-07-20T12:30:00+00:00\",\"dateModified\":\"2025-06-10T08:05:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/#primaryimage\",\"url\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg\",\"contentUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg\",\"width\":1200,\"height\":640,\"caption\":\"Immagine in evidenza astratta per gli articoli di Tinexta Defence\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tinextadefence.it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis Report\u00a0&#8211;\u00a0Multi-extortion Ransomware e attacchi encryption-less\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tinextadefence.it\/#website\",\"url\":\"https:\/\/tinextadefence.it\/\",\"name\":\"Tinexta Defence\",\"description\":\"think next, protect now\",\"publisher\":{\"@id\":\"https:\/\/tinextadefence.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tinextadefence.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tinextadefence.it\/#organization\",\"name\":\"Tinexta Defence\",\"url\":\"https:\/\/tinextadefence.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png\",\"contentUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png\",\"width\":2000,\"height\":990,\"caption\":\"Tinexta Defence\"},\"image\":{\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/person\/1f5092d13bbba815b7d8508dc4a0a941\",\"name\":\"Simone Sorte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/32dedea25589c73ac8f3d6a24a91a3de89a9dbecfeb8badd55816a91df1c8a31?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/32dedea25589c73ac8f3d6a24a91a3de89a9dbecfeb8badd55816a91df1c8a31?s=96&d=mm&r=g\",\"caption\":\"Simone Sorte\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Analysis Report - Multi-extortion Ransomware and encryption-less attacks - Tinexta Defence","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tinextadefence.it\/en\/malware-analysis-report-multi-extortion-ransomware-and-encryption-attacks-less\/","og_locale":"en_GB","og_type":"article","og_title":"Malware Analysis Report\u00a0-\u00a0Multi-extortion Ransomware e attacchi encryption-less - Tinexta Defence","og_description":"Per il report odierno, abbiamo osservato l\u2019evoluzione degli attacchi ransomware, che, negli anni, sono diventati sempre pi\u00f9 imprevedibili e sofisticati.\u00a0 Nella fattispecie, ci siamo concentrati su due strategie particolari: la tattica di estorsione multipla e l\u2019attacco senza crittografia.\u00a0 La finalit\u00e0 del report mira alla sensibilizzazione sul tema e a mettere in guardia sull&#8217;evoluzione di questi [&hellip;]","og_url":"https:\/\/tinextadefence.it\/en\/malware-analysis-report-multi-extortion-ransomware-and-encryption-attacks-less\/","og_site_name":"Tinexta Defence","article_published_time":"2023-07-20T12:30:00+00:00","article_modified_time":"2025-06-10T08:05:45+00:00","og_image":[{"width":1200,"height":640,"url":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg","type":"image\/jpeg"}],"author":"Simone Sorte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Simone Sorte","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/#article","isPartOf":{"@id":"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/"},"author":{"name":"Simone Sorte","@id":"https:\/\/tinextadefence.it\/#\/schema\/person\/1f5092d13bbba815b7d8508dc4a0a941"},"headline":"Malware Analysis Report\u00a0&#8211;\u00a0Multi-extortion Ransomware e attacchi encryption-less","datePublished":"2023-07-20T12:30:00+00:00","dateModified":"2025-06-10T08:05:45+00:00","mainEntityOfPage":{"@id":"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/"},"wordCount":234,"publisher":{"@id":"https:\/\/tinextadefence.it\/#organization"},"image":{"@id":"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/#primaryimage"},"thumbnailUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg","keywords":["Articoli"],"articleSection":["#TDefenceBusiness"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/","url":"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/","name":"Malware Analysis Report - Multi-extortion Ransomware and encryption-less attacks - Tinexta Defence","isPartOf":{"@id":"https:\/\/tinextadefence.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/#primaryimage"},"image":{"@id":"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/#primaryimage"},"thumbnailUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg","datePublished":"2023-07-20T12:30:00+00:00","dateModified":"2025-06-10T08:05:45+00:00","breadcrumb":{"@id":"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/#primaryimage","url":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg","contentUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg","width":1200,"height":640,"caption":"Immagine in evidenza astratta per gli articoli di Tinexta Defence"},{"@type":"BreadcrumbList","@id":"https:\/\/tinextadefence.it\/malware-analysis-report-multi-extortion-ransomware-e-attacchi-encryption-less\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tinextadefence.it\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis Report\u00a0&#8211;\u00a0Multi-extortion Ransomware e attacchi encryption-less"}]},{"@type":"WebSite","@id":"https:\/\/tinextadefence.it\/#website","url":"https:\/\/tinextadefence.it\/","name":"Tinexta Defence","description":"think next, protect now","publisher":{"@id":"https:\/\/tinextadefence.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tinextadefence.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/tinextadefence.it\/#organization","name":"Tinexta Defence","url":"https:\/\/tinextadefence.it\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/","url":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png","contentUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png","width":2000,"height":990,"caption":"Tinexta Defence"},"image":{"@id":"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tinextadefence.it\/#\/schema\/person\/1f5092d13bbba815b7d8508dc4a0a941","name":"Simone Sorte","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/tinextadefence.it\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/32dedea25589c73ac8f3d6a24a91a3de89a9dbecfeb8badd55816a91df1c8a31?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/32dedea25589c73ac8f3d6a24a91a3de89a9dbecfeb8badd55816a91df1c8a31?s=96&d=mm&r=g","caption":"Simone Sorte"}}]}},"_links":{"self":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/posts\/20877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/comments?post=20877"}],"version-history":[{"count":0,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/posts\/20877\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/media\/26257"}],"wp:attachment":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/media?parent=20877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/categories?post=20877"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/tags?post=20877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}