Multi-Extortion Ransomware: The New Attack Evolution

▼ Summary
– A ransomware attack on the University of Mississippi Medical Center in February 2026 disrupted its electronic health record system, forcing appointment cancellations and a return to paper records.
– Publicly disclosed ransomware attacks across all industries surged 49% in 2025, with 93% of U.S. healthcare organizations reporting at least one cyberattack that year.
– Modern ransomware often uses a double extortion model, where attackers steal data before encrypting systems to pressure victims with both data exposure and loss of access.
– The article promotes D.AMO, a security platform that uses file encryption and access control to render stolen data useless and block ransomware processes.
– D.AMO’s approach aims to neutralize multi-extortion threats by protecting data even after a breach and enabling recovery from backups without negotiating with attackers.
The operational disruption caused by ransomware is no longer a theoretical risk but a daily reality for organizations worldwide. This was starkly illustrated earlier this year when the University of Mississippi Medical Center was hit by an attack that crippled its electronic health record system. The incident forced 35 clinics and over 200 telehealth sites to cancel critical appointments, including chemotherapy sessions, and revert to paper records, directly impacting patient care. This healthcare breach is part of a broader, alarming trend. Data from last year shows that 93% of healthcare organizations in the U.S. experienced at least one cyberattack, with 72% of those incidents causing direct disruptions to patient services.
The threat extends far beyond hospitals. The financial and manufacturing sectors face similar pressures. Also in February, the payment processor BridgePay saw its APIs and payment portals taken offline by a ransomware incident. Across all sectors, publicly reported attacks jumped by 49% in 2025, confirming that these events are a pervasive business risk with severe operational and financial consequences.
This escalation is driven by a fundamental shift in attacker methodology. The early days of simple file encryption and a ransom demand have given way to a more aggressive model known as double extortion. In this approach, adversaries first steal sensitive data before encrypting systems. Victims then face two pressures: pay for the decryption key, or see their stolen intellectual property, patient records, or financial data leaked publicly. This tactic makes traditional reliance on backups inadequate, as the threat of data exposure remains. The landscape is evolving further, with triple extortion now emerging, where attackers directly contact a victim’s clients or partners to increase pressure. The tools for these attacks are also becoming more accessible; the proliferation of AI-powered cybercrime tools has lowered the barrier to entry, contributing to the 124 active ransomware groups identified last year.
This evolution demands a corresponding shift in defense strategy. Relying solely on perimeter security to prevent breaches is an outdated concept. Modern protection must assume that determined attackers will get in and must therefore focus on rendering stolen data useless and maintaining business continuity. A comprehensive defense architecture must accomplish three goals: make exfiltrated data unreadable to attackers, block ransomware processes from accessing files, and enable rapid recovery without negotiating with criminals.
The D. AMO platform from Penta Security is built specifically for this multi-extortion environment. It integrates encryption, access control, and backup recovery into a single solution designed to counter each stage of an attack. Its core technology applies folder-level file encryption at the operating system kernel level. All files within designated folders are automatically encrypted, meaning that even if data is stolen, it remains inaccessible to the attackers, nullifying the leverage of double extortion. This deployment requires no source code changes and operates without disrupting user workflows.
Crucially, D. AMO enforces strict process-based access control. It allows only authorized applications and users to interact with encrypted data, automatically blocking ransomware and other malicious software from reading or manipulating files. All blocked access attempts are logged and visible through a central management console for auditing and investigation.
Finally, the platform ensures rapid recovery through an independently managed backup system. Should an attack succeed in encrypting data locally, organizations can restore operations from a secure backup, drastically reducing downtime and eliminating the need to consider paying a ransom for a decryption key. In an era where multi-extortion is the norm, the ability to neutralize the value of stolen data is a critical strategic advantage.
(Source: BleepingComputer)




