Multi-Extortion Ransomware - Understanding Its Evolution

Basically, multi-extortion ransomware steals data and threatens to leak it unless a ransom is paid.
Multi-extortion ransomware is on the rise, pressuring victims with data leaks. Healthcare and finance sectors are particularly affected. Organizations must adapt their defenses to protect sensitive data effectively.
What Happened
In February 2026, the University of Mississippi Medical Center (UMMC) suffered a significant ransomware attack. This incident took down the Epic electronic health record system across 35 clinics and over 200 telehealth sites. As a result, numerous chemotherapy appointments were canceled, and non-emergency surgeries were postponed. Medical staff had to revert to paper-based workflows, impacting patient care severely.
UMMC's case is not unique. Recent data indicates that 93% of U.S. healthcare organizations experienced at least one cyberattack in 2025. Alarmingly, 72% of these incidents disrupted patient care directly. Other sectors, like manufacturing and finance, are also vulnerable. For instance, in February 2026, payment processing network BridgePay was attacked, rendering its APIs and payment pages inoperable. Publicly disclosed ransomware attacks surged by 49% year-over-year in 2025, totaling 1,174 confirmed incidents.
The Evolution of Ransomware
Early ransomware attacks followed a simple model: infiltrate a system, encrypt files, and demand payment for the decryption key. However, as organizations began restoring data from backups instead of paying ransoms, attackers adapted. They developed double extortion tactics, where they exfiltrate sensitive files before encrypting the system. Victims are thus pressured to pay to avoid public exposure of their data.
This model has evolved further into triple extortion attacks, where attackers contact victims' customers or partners, applying additional pressure. As of 2025, 124 active ransomware groups were identified, with 73 newly emerged. The rise of AI tools has made these capabilities more accessible, lowering the barrier for entry into cybercrime.
A Defense Architecture for Multi-Extortion Threats
The rise of multi-extortion ransomware necessitates a shift in traditional defense strategies. Perimeter-based prevention is no longer enough. Organizations must adopt a security posture that protects data from being weaponized after a breach. This includes rendering exfiltrated data unreadable, preventing ransomware from accessing files, and enabling rapid recovery.
D.AMO: Blocking Every Stage of a Ransomware Attack
Penta Security's D.AMO platform is designed to address all phases of a multi-extortion ransomware attack. It combines encryption, access control, and backup recovery across both on-premises and cloud environments. Here are some key features:
- Folder-Level File Encryption: D.AMO KE encrypts files within designated folders at the OS level, ensuring that even if attackers exfiltrate data, it remains unreadable.
- Access Control: Strict access controls prevent unauthorized applications from accessing encrypted folders, blocking ransomware effectively.
- Backup and Recovery: In the event of a successful attack, D.AMO allows organizations to restore operations quickly, reducing reliance on ransom negotiations.
As multi-extortion tactics become commonplace, neutralizing the data attackers seek to exploit is crucial. D.AMO addresses each stage of a ransomware attack, providing a unified defense against evolving threats.