Attackers are now demanding a ransom for de-encryption and a ransom to not release sensitive data
Double extortion has become the industry standard. According to our recent analysis of Resilience cyber insurance claims, ransomware attacks now routinely involve two distinct ransom demands: one for the decryption key to unlock encrypted systems, and another to prevent stolen data from being published on leak sites or sold to competitors.
This shift represents more than just criminal innovation—it’s a calculated response to improved organizational defenses. As more companies invested in robust backup systems and business continuity planning, threat actors found themselves with encrypted files that victims could simply restore. Their solution? Steal the data first, then encrypt it.
The financial impact has been staggering. According to Resilience data, in the first half of 2025, ransomware accounted for 76% of incurred cyber insurance losses, with the average ransomware claim reaching $1.18 million. When you factor in business interruption from vendors experiencing ransomware, that number jumps to 91% of all incurred losses.
Why paying for data suppression is a losing strategy
Here’s the uncomfortable truth that every executive needs to hear: paying ransomers to “suppress” your stolen data offers zero guarantee of data destruction and provides no mitigation when it comes to regulatory investigations, customer notifications, or subsequent lawsuits.
Consider what happens when you pay for data suppression. You’ve just taught criminals that your organization is willing to pay, making you a prime target for repeat attacks. You’ve depleted insurance limits that could have funded actual recovery efforts. And, most critically, you have no way to verify that the data was actually deleted: Cybercriminals aren’t exactly known for their integrity.
The real cost of double extortion
The shift to double extortion has created a perfect storm of pressure on victim organizations. Business leaders face immediate operational disruption while simultaneously worrying about reputational damage, regulatory penalties, and competitive disadvantage from leaked intellectual property.
In multiple recent cases, threat actors have even located copies of victims’ cyber insurance policies and used that information to calibrate their ransom demands. In one instance documented in the Resilience portfolio, the attacker directly referenced the client’s policy, saying they had placed their extortion demand strategically below the policy limit—essentially treating the insurance coverage as a pricing guide.
Building resilience instead of paying criminals
Organizations that successfully navigate double extortion attacks without paying share several key characteristics:
- They encrypt sensitive data by default. If stolen data is already encrypted, its value to attackers plummets dramatically. This isn’t just about compliance—it’s about making releasing your data worthless to criminals.
- They have clear breach protocols with pre-approved disclosure frameworks. When a breach occurs, these organizations don’t waste time debating whether to notify regulators or customers. They’ve already mapped out their legal obligations and communication strategies.
- They implement intelligence-led defenses. Rather than depending on ransom demands to understand what was stolen, mature organizations can independently track their data through dark web monitoring and threat intelligence platforms.
- They educate leadership on the true cost of suppression payments. Executives must recognize that paying for data suppression offers only the illusion of protection while potentially increasing long-term exposure and perpetuating cybercrime.
The insurance industry’s evolving role
Cyber insurers are beginning to evolve beyond simply covering ransom payments. Forward-thinking carriers are actively incentivizing security hardening, promoting intelligence sharing between clients, and providing robust post-breach support services that strengthen overall organizational resilience.
Some insurers have started implementing stricter requirements around backup validation and incident response planning before binding coverage. Others are offering premium discounts for organizations that demonstrate mature security practices. The message is clear: the industry is moving away from simply paying ransoms and toward preventing attacks in the first place.
What this means for your organization
The era of simple ransomware is over. Today’s attacks are multi-stage operations designed to extract maximum value from victims through psychological pressure, operational disruption, and the threat of permanent reputational damage.
The question is no longer whether you’ll face a double extortion attack—it’s whether you’ll be prepared to respond without funding criminal enterprises. Organizations that invest in comprehensive resilience—encrypted data, validated backups, tested incident response plans, and educated leadership—will find themselves in a far stronger position when attackers come calling.