{"id":27205,"date":"2021-11-08T16:39:00","date_gmt":"2021-11-08T15:39:00","guid":{"rendered":"https:\/\/perseus.de\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/"},"modified":"2026-03-30T15:31:48","modified_gmt":"2026-03-30T13:31:48","slug":"double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/","title":{"rendered":"Double Extortion Ransomware \u2013 what is it and how do I protect my business from it?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27205\" class=\"elementor elementor-27205 elementor-3419\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/cartist-B5NMSjIJGn4-unsplash-768x512.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27204\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/cartist-B5NMSjIJGn4-unsplash-768x512.jpg 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/cartist-B5NMSjIJGn4-unsplash-300x200.jpg 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/cartist-B5NMSjIJGn4-unsplash-1024x683.jpg 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/cartist-B5NMSjIJGn4-unsplash-1536x1024.jpg 1536w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/cartist-B5NMSjIJGn4-unsplash-2048x1365.jpg 2048w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image source: CARTIST via Unsplash<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-604bfacc e-flex e-con-boxed e-con e-parent\" data-id=\"604bfacc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-080565f e-con-full e-flex e-con e-child\" data-id=\"080565f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6c39575 e-con-full e-flex e-con e-child\" data-id=\"6c39575\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26b6a68 elementor-widget elementor-widget-text-editor\" data-id=\"26b6a68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>08.11.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc5beb2 elementor-widget elementor-widget-heading\" data-id=\"dc5beb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Double Extortion Ransomware \u2013 what is it and how do I protect my business from it?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2e4ee5 elementor-widget elementor-widget-text-editor\" data-id=\"d2e4ee5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Everyday Clues | Cybersecurity | Attack Vectors <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b1797b7 e-con-full e-flex e-con e-child\" data-id=\"b1797b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f8959f3 elementor-widget elementor-widget-text-editor\" data-id=\"f8959f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Ransomware is a serious risk for companies. Currently, however, there is more and more talk of Double Extortion ransomware. What is it, what do these attacks mean for companies and how can you protect yourself? We&#8217;ll tell you in this blog post.   <\/strong><\/p><p><strong> <\/strong><\/p><h4><strong>What is Double Extortion ransomware?<\/strong><\/h4><p>Double extortion translates to &#8220;double extortion&#8221;. This does not necessarily involve multiple blackmail, but the cybercriminals use several means of extortion for their blackmail. With the ransomware that has been common up to now, there is usually a means of exerting pressure: the data of a computer, network or system is encrypted. A ransom is demanded for decryption.    In the case of Double Extortion ransomware, the cybercriminals add further leverage to make the ransom payment as unavoidable as possible for the blackmailed company.<\/p><p><strong> <\/strong><\/p><h4><strong>What do cybercriminals threaten with in the event of a double extortion?  <\/strong><\/h4><p>In many double extortions, the cybercriminals copy the data before it is encrypted. In doing so, they prefer information that is as sensitive as possible, such as company secrets or personal data. Later, they threaten to publish exactly this data or auction it off on the darknet.  <\/p><p><strong> <\/strong><\/p><h4><strong>Other possible means of pressure by cybercriminals:  <\/strong><\/h4><ul><li>DDoS attacks that cybercriminals use to render the website of the blackmailed company unusable.<\/li><li>Violations of regulations by the company detected by the cybercriminals, such as the GDPR. Then the ransom demands are often below the expected fine. <\/li><\/ul><p><strong> <\/strong><\/p><h4><strong>How does a typical double extortion attack work?  <\/strong><\/h4><p>Knowing the typical sequence of these attacks helps to protect yourself more effectively from them.<\/p><ol><li>Compromise of the corporate network. For example, through a successful phishing e-mail, about security gaps that have not yet been closed by updates or through attacks on remote access access. <\/li><li>Distribution in the network. The cybercriminals expand their access and explore the system and its data. <\/li><li>Data exfiltration. The cybercriminals copy as much of the company&#8217;s data as possible and as sensitive as possible. <\/li><li>Activation of the ransomware. Encryption of all data and systems of the company accessible to cybercriminals; Presentation of the ransom note. <\/li><li>The publication or auction of the copied data can be threatened if the company refuses to pay the ransom. However, it can also be promised directly with the first ransom demand. <\/li><\/ol><p><strong> <\/strong><\/p><h4><strong>The most common attack vectors used by cybercriminals<\/strong><\/h4><p>For cybercriminals, the first compromise of the corporate network is crucial. To do this, they use different attack paths: <\/p><ul><li>Phishing emails<\/li><li>Vulnerabilities in software and hardware<\/li><li>Vulnerabilities of VPN connections<\/li><li>Brute force attacks on remote access to the corporate network (these accesses are also known as Remote Desktop Protocol, RDP for short).<\/li><li>Credentials purchased on the dark web to networks that have already been compromised<\/li><\/ul><p><strong> <\/strong><\/p><h4><strong>How can you better protect your company against double extortion attacks?  <\/strong><\/h4><p>Fundamentally, you should set up your protection strategy in two ways:<\/p><ul><li>Prevention of successful attacks (prevention)<\/li><li>Damage control on successful attacks (reaction)<\/li><\/ul><p>Implementing a well-thought-out cybersecurity baseline protection already makes a big difference. In addition, we recommend specific measures to prevent typical processes of double extortion attacks \u2013 or at least to detect them quickly and be able to react immediately. <\/p><p>A consistently implemented Zero Trust model, which is supplemented with specific measures, offers special protection.<\/p><p>An effective protection strategy is individually tailored to your company \u2013 including its technical, human and content-related conditions, possibilities and limits. The experts at Perseus will be happy to advise you on this. <\/p><p>However, we would like to provide you with some particularly important measures here.<\/p><p><strong> <\/strong><\/p><h4><strong>Particularly important measures to prevent double extortion attacks<\/strong><\/h4><ul><li>Anti-phishing awareness and training of your employees<\/li><li>Immediate application of updates and patches, especially for common points of attack such as VPN and RDP.<\/li><li>Give access to common points of attack only to those who really need them. Secure these accesses with multi-factor authentication if possible. <\/li><li>Protect sensitive data in a targeted manner, e.g. through encryption or outsourced storage.<\/li><li>Segmentation of the company network into areas that are as separate as possible.<\/li><\/ul><p><strong> <\/strong><\/p><h4><strong>Particularly important measures for damage limitation in double extortion attacks<\/strong><\/h4><ul><li>Monitoring of the system for suspicious processes.<\/li><li>Comply with GDPR and other regulations to reduce blackmail.<\/li><li>Promote a positive, attentive security culture so that compromises are quickly detected and reported. Only then can an appropriate response be made. <\/li><li>A contingency plan that is familiar and accessible to all employees. He must name initial measures and contact persons for the cyber emergency. <\/li><li>If necessary, use hardware and software that prevents data leaks in the event of a successful compromise. Such products are also known as data loss prevention. <\/li><li>Up-to-date backups stored separately from the system<\/li><li>Strategy to easily and quickly restore the system from recent backups<\/li><\/ul><p><strong> <\/strong><\/p><h4><strong>Who can you contact in an acute case?<\/strong><\/h4><p>Do you suspect a compromise of your network or even have a ransom demand in front of you? Then act immediately: <\/p><p>Perseus members can count on our incident response around the clock, every day.<\/p><p><strong> <\/strong><\/p><h4><strong>Learn more<\/strong><\/h4><p>In a personal conversation, we will be happy to advise you on the topic of double extortion and how you can better protect your company. If you would like to read up on this topic, take a look here: <\/p><ul><li><a href=\"https:\/\/www.nomoreransom.org\/en\/index.html\">No More Ransom<\/a> is an initiative of the Dutch police&#8217;s National High Tech Crime Unit and Europol&#8217;s European Cybercrime Center, among others. Here you will find information on the topic and many prevention tips. <\/li><li>This <a href=\"https:\/\/static.rusi.org\/263_ei_ransomware_final_0_0.pdf\">report<\/a> takes a detailed look at the current state of ransomware and the increased prevalence of Double Extortion Ransomware. The organization behind the report is the Royal United Service Institute (RUSI), an independent British research institute dedicated to national and international security. <\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ransomware is a serious risk for companies. Currently, however, there is more and more talk of Double Extortion ransomware. What is it, what do these attacks mean for companies and how can you protect yourself? We&#8217;ll tell you in this blog post.   <\/p>\n","protected":false},"author":3,"featured_media":27204,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27205","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Double Extortion Ransomware \u2013 what is it and how do I protect my business from it? - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Double Extortion Ransomware \u2013 what is it and how do I protect my business from it? - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Ransomware is a serious risk for companies. Currently, however, there is more and more talk of Double Extortion ransomware. What is it, what do these attacks mean for companies and how can you protect yourself? We&#039;ll tell you in this blog post.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-08T15:39:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T13:31:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/cartist-B5NMSjIJGn4-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Double Extortion Ransomware \u2013 what is it and how do I protect my business from it?\",\"datePublished\":\"2021-11-08T15:39:00+00:00\",\"dateModified\":\"2026-03-30T13:31:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\\\/\"},\"wordCount\":977,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cartist-B5NMSjIJGn4-unsplash-scaled.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\\\/\",\"name\":\"Double Extortion Ransomware \u2013 what is it and how do I protect my business from it? - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cartist-B5NMSjIJGn4-unsplash-scaled.jpg\",\"datePublished\":\"2021-11-08T15:39:00+00:00\",\"dateModified\":\"2026-03-30T13:31:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cartist-B5NMSjIJGn4-unsplash-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cartist-B5NMSjIJGn4-unsplash-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Double Extortion Ransomware \u2013 what is it and how do I protect my business from it?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Double Extortion Ransomware \u2013 what is it and how do I protect my business from it? - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/","og_locale":"en_US","og_type":"article","og_title":"Double Extortion Ransomware \u2013 what is it and how do I protect my business from it? - Perseus Technologies","og_description":"Ransomware is a serious risk for companies. Currently, however, there is more and more talk of Double Extortion ransomware. What is it, what do these attacks mean for companies and how can you protect yourself? We'll tell you in this blog post.","og_url":"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/","og_site_name":"Perseus Technologies","article_published_time":"2021-11-08T15:39:00+00:00","article_modified_time":"2026-03-30T13:31:48+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/cartist-B5NMSjIJGn4-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Double Extortion Ransomware \u2013 what is it and how do I protect my business from it?","datePublished":"2021-11-08T15:39:00+00:00","dateModified":"2026-03-30T13:31:48+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/"},"wordCount":977,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/cartist-B5NMSjIJGn4-unsplash-scaled.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/","url":"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/","name":"Double Extortion Ransomware \u2013 what is it and how do I protect my business from it? - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/cartist-B5NMSjIJGn4-unsplash-scaled.jpg","datePublished":"2021-11-08T15:39:00+00:00","dateModified":"2026-03-30T13:31:48+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/cartist-B5NMSjIJGn4-unsplash-scaled.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/cartist-B5NMSjIJGn4-unsplash-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/double-extortion-ransomware-what-is-it-and-how-do-i-protect-my-business-from-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Double Extortion Ransomware \u2013 what is it and how do I protect my business from it?"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27205"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27205\/revisions"}],"predecessor-version":[{"id":27206,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27205\/revisions\/27206"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27204"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}