Feb 12, 2026 • ESET WeLiveSecurity
Naming and shaming: How ransomware groups tighten the screws on victims
This article examines the 'naming and shaming' tactic employed by ransomware groups to pressure victims into paying ransoms. These groups operate dedicated...
Executive Summary
This article examines the 'naming and shaming' tactic employed by ransomware groups to pressure victims into paying ransoms. These groups operate dedicated leak sites where they publish stolen corporate data, creating prolonged reputational and operational damage beyond the initial attack. This 'double extortion' strategy forces organizations to weigh the cost of paying the ransom against the potential exposure of sensitive information, customer data, and intellectual property. The practice has become increasingly prevalent in the ransomware ecosystem, with threat actors leveraging public data exposure as an additional pressure mechanism. Organizations are advised to implement robust data backup strategies, incident response plans, and security controls to prevent initial compromise and mitigate the impact of such attacks.
Summary
When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle
Published Analysis
This article examines the 'naming and shaming' tactic employed by ransomware groups to pressure victims into paying ransoms. These groups operate dedicated leak sites where they publish stolen corporate data, creating prolonged reputational and operational damage beyond the initial attack. This 'double extortion' strategy forces organizations to weigh the cost of paying the ransom against the potential exposure of sensitive information, customer data, and intellectual property. The practice has become increasingly prevalent in the ransomware ecosystem, with threat actors leveraging public data exposure as an additional pressure mechanism. Organizations are advised to implement robust data backup strategies, incident response plans, and security controls to prevent initial compromise and mitigate the impact of such attacks. When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle