• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    PowerPoint and HPE vulnerabilities CVE-2009-0556 and CVE-2025-37164 are the first to be added to CISA's KEV catalog in 2026

    CISA Warns of Attacks on PowerPoint and HPE Vulnerabilities

    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Trump, Exit, Coalition, cybersecurity, digital human rights, Hybrid Warfare, Hybrid Threats, Influence Operation, AI, Artificial Intelligence, Deepfakes, Trump, Donald Trump, Kamala Harris, Harris, U.S. Presidential Candidates, Influence Operations, Influence Ops, Iran, Iranians, ODNI, FBI, CISA, disinformation, misinformation

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    CVE-2026-21858

    New n8n Vulnerability (CVE-2026-21858) Allows Unauthenticated File Access and RCE

    Prosura cyberattack

    Australian Insurer Prosura Confirms Cyber Incident, Takes Online Services Offline Amid Investigation

    Infostealers and Lack of MFA Led to Dozens of Major Breaches

    Infostealers and Lack of MFA Led to Dozens of Major Breaches

    Crimson Collective Claims to Disconnect Brightspeed Internet Users After Hack

    Crimson Collective Claims to Disconnect Brightspeed Internet Users After Hack

    telecommunication sector

    Telecommunications Sector Sees a Four-fold Jump in Ransomware Attacks in last 4 Years: Report

    TOTOLINK EX200 CVE-2025-65606

    Unpatched TOTOLINK EX200 Flaw Enables Root-Level Telnet Access, CERT/CC Warns

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Trump, Exit, Coalition, cybersecurity, digital human rights, Hybrid Warfare, Hybrid Threats, Influence Operation, AI, Artificial Intelligence, Deepfakes, Trump, Donald Trump, Kamala Harris, Harris, U.S. Presidential Candidates, Influence Operations, Influence Ops, Iran, Iranians, ODNI, FBI, CISA, disinformation, misinformation

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    Cyber action plan, UK, cyber threats targeting political candidates

    UK Unveils £210M Cyber Overhaul as Nation Faces “Critically High” Digital Threat

    MongoBleed, MongoDB, CVE-2025-14847

    Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets

    DPDP Act Is Reshaping the Cyber Insurance Landscape

    Beyond Compliance: How India’s DPDP Act Is Reshaping the Cyber Insurance Landscape

    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    DPDP Act

    8 Ways the DPDP Act Will Change How Indian Companies Handle Data in 2026 

    FBI Warns

    FBI Cautions Alaskans Against Phone Scams Using Fake Arrest Threats

    City of Cambridge

    City of Cambridge Advises Password Reset After Nationwide CodeRED Data Breach

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    ARC Data Sale

    ARC Data Sale Scandal: Airlines’ Travel Records Used for Warrantless Surveillance

    NYT, ChatGPT, The New York Times, Voice Mode, OpenAI Voice Mode

    OpenAI Battles Court Order to Indefinitely Retain User Chat Data in NYT Copyright Dispute

    Telegram Bots, HTML phishing attack, Telegram bot credential theft, self-contained phishing malware, JavaScript credential harvesting, email security bypass techniques, RFQ phishing scams, invoice phishing attacks, Adobe login phishing, Microsoft credential theft, FedEx phishing campaign, DHL impersonation attack, Central Europe phishing 2025, Eastern Europe cyber threats, Cyble threat intelligence, CryptoJS AES obfuscation, anti-forensics phishing, F12 developer tools blocking, Telegram Bot API abuse, api.telegram.org malicious traffic, credential phishing 2025, HTML attachment malware, business email compromise, targeted phishing campaign, Czech Republic cyber threats, Slovakia phishing attacks, Hungary cybersecurity threats, Germany phishing campaign, Telekom Deutschland phishing, manufacturing sector attacks, automotive industry phishing, government agency phishing, energy utility cyber threats, telecommunications phishing, professional services attacks, garclogtools_bot, v8one_bot, dollsman_bot, dual-capture credential theft, fake login error messages, IP address harvesting, api.ipify.org abuse, ip-api.com malicious use, YARA phishing detection, phishing IOCs 2025, HTML file security risks, RFC-compliant filename spoofing, blurred document phishing, modal login phishing, brand impersonation attacks, CryptoJS malware obfuscation, right-click blocking malware, keyboard shortcut interception, multi-stage credential theft, decentralized phishing infrastructure, phishing toolkit generators, modular phishing templates, German language phishing, Spanish phishing variants

    Cyble Detects Phishing Campaign Using Telegram Bots to Siphon Corporate Credentials

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    PowerPoint and HPE vulnerabilities CVE-2009-0556 and CVE-2025-37164 are the first to be added to CISA's KEV catalog in 2026

    CISA Warns of Attacks on PowerPoint and HPE Vulnerabilities

    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Trump, Exit, Coalition, cybersecurity, digital human rights, Hybrid Warfare, Hybrid Threats, Influence Operation, AI, Artificial Intelligence, Deepfakes, Trump, Donald Trump, Kamala Harris, Harris, U.S. Presidential Candidates, Influence Operations, Influence Ops, Iran, Iranians, ODNI, FBI, CISA, disinformation, misinformation

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    CVE-2026-21858

    New n8n Vulnerability (CVE-2026-21858) Allows Unauthenticated File Access and RCE

    Prosura cyberattack

    Australian Insurer Prosura Confirms Cyber Incident, Takes Online Services Offline Amid Investigation

    Infostealers and Lack of MFA Led to Dozens of Major Breaches

    Infostealers and Lack of MFA Led to Dozens of Major Breaches

    Crimson Collective Claims to Disconnect Brightspeed Internet Users After Hack

    Crimson Collective Claims to Disconnect Brightspeed Internet Users After Hack

    telecommunication sector

    Telecommunications Sector Sees a Four-fold Jump in Ransomware Attacks in last 4 Years: Report

    TOTOLINK EX200 CVE-2025-65606

    Unpatched TOTOLINK EX200 Flaw Enables Root-Level Telnet Access, CERT/CC Warns

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Trump, Exit, Coalition, cybersecurity, digital human rights, Hybrid Warfare, Hybrid Threats, Influence Operation, AI, Artificial Intelligence, Deepfakes, Trump, Donald Trump, Kamala Harris, Harris, U.S. Presidential Candidates, Influence Operations, Influence Ops, Iran, Iranians, ODNI, FBI, CISA, disinformation, misinformation

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    Cyber action plan, UK, cyber threats targeting political candidates

    UK Unveils £210M Cyber Overhaul as Nation Faces “Critically High” Digital Threat

    MongoBleed, MongoDB, CVE-2025-14847

    Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets

    DPDP Act Is Reshaping the Cyber Insurance Landscape

    Beyond Compliance: How India’s DPDP Act Is Reshaping the Cyber Insurance Landscape

    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    DPDP Act

    8 Ways the DPDP Act Will Change How Indian Companies Handle Data in 2026 

    FBI Warns

    FBI Cautions Alaskans Against Phone Scams Using Fake Arrest Threats

    City of Cambridge

    City of Cambridge Advises Password Reset After Nationwide CodeRED Data Breach

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    ARC Data Sale

    ARC Data Sale Scandal: Airlines’ Travel Records Used for Warrantless Surveillance

    NYT, ChatGPT, The New York Times, Voice Mode, OpenAI Voice Mode

    OpenAI Battles Court Order to Indefinitely Retain User Chat Data in NYT Copyright Dispute

    Telegram Bots, HTML phishing attack, Telegram bot credential theft, self-contained phishing malware, JavaScript credential harvesting, email security bypass techniques, RFQ phishing scams, invoice phishing attacks, Adobe login phishing, Microsoft credential theft, FedEx phishing campaign, DHL impersonation attack, Central Europe phishing 2025, Eastern Europe cyber threats, Cyble threat intelligence, CryptoJS AES obfuscation, anti-forensics phishing, F12 developer tools blocking, Telegram Bot API abuse, api.telegram.org malicious traffic, credential phishing 2025, HTML attachment malware, business email compromise, targeted phishing campaign, Czech Republic cyber threats, Slovakia phishing attacks, Hungary cybersecurity threats, Germany phishing campaign, Telekom Deutschland phishing, manufacturing sector attacks, automotive industry phishing, government agency phishing, energy utility cyber threats, telecommunications phishing, professional services attacks, garclogtools_bot, v8one_bot, dollsman_bot, dual-capture credential theft, fake login error messages, IP address harvesting, api.ipify.org abuse, ip-api.com malicious use, YARA phishing detection, phishing IOCs 2025, HTML file security risks, RFC-compliant filename spoofing, blurred document phishing, modal login phishing, brand impersonation attacks, CryptoJS malware obfuscation, right-click blocking malware, keyboard shortcut interception, multi-stage credential theft, decentralized phishing infrastructure, phishing toolkit generators, modular phishing templates, German language phishing, Spanish phishing variants

    Cyble Detects Phishing Campaign Using Telegram Bots to Siphon Corporate Credentials

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Cyber Essentials

The Case of Ransomware Gangs Posting Empty Threats: How and Why

Cybersecurity researchers put ransomware gangs posting empty threats as downright fraud

Chandu Gopalakrishnan by Chandu Gopalakrishnan
October 23, 2025
in Cyber Essentials, Cyber News, Features, Firewall Daily, Ransomware News
0
Cl0p ransomware1
673
SHARES
3.7k
VIEWS
Share on LinkedInShare on Twitter

On June 21, Cl0p ransomware was busy releasing information of companies that it claimed to breach using the MOVEit vulnerability.

Amidst the muscle-flexing and threatening, it found time to post an odd message: a rejoinder.

The gist of the long, detailed message in unclear syntax, complete with bullet points, was this:  we refute a BBC report that said that the ransomware group was posting empty threats.

Curiously, the message did not explicitly say so!

In an email exchange with the BBC, the Cl0p ransomware group claimed that they did not possess the data and had informed the payroll provider Zellis, which was breached to gain access to the victims’ data.

Cl0p was offended at the prospects of the world knowing a long-used tactic: ransomware gangs posting empty threats.

report-ad-banner

ransomware gangs posting empty threats

Cl0p, MOVEit bugs, and ransomware gangs posting empty threats

Cl0p has been pressuring victims to pay a ransom by posting company profiles on its darknet website since June 14.

In the days that followed, Cl0p gradually added the names, websites, and addresses of nearly 50 victims from various countries, including the US, Germany, Switzerland, the UK, Canada, and Belgium.

The hack, initially announced by Progress Software, the makers of MOVEit, exposed vulnerabilities within the software that may have been exploited by different hackers.

As investigations continue, the US government has offered a $10 million reward for information linking the Cl0p gang or any other malicious cyber actors targeting critical infrastructure to a foreign government.

The situation is ongoing, and authorities, affected organizations, and cybersecurity experts are actively working to understand the extent of the breach and identify the responsible parties.

While some of the companies listed by Cl0p have confirmed separate data breaches, cybersecurity researchers warned that hundreds of organizations using the file transfer tool MOVEit have had their data stolen.

This included the BBC, British Airways, and Boots, who were customers of Zellis. However, the cybercriminals insist that they did not steal the Zellis data and claim to have informed the company accordingly.

Cybersecurity experts found Cl0p’s claims perplexing, adding to the complexity of the situation.

Some speculated that Cl0p may be concealing the fact that they sold the data to another hacking group, while others believe that another group may have accessed and stolen the data before Cl0p’s involvement.

The exact circumstances surrounding the data breach remain uncertain.

ransomware gangs posting empty threats

“I emailed Clop after wondering why they haven’t posted any of the big U.K. orgs which have had data stolen. ‘We don’t have that data’ they repeatedly claimed,” BBC reporter Joe Tidy tweeted.

“They also claim not to have sold it. A confusing picture but it raises other possibilities about this ongoing mass hack.”

The Cyber Express found that mounting fake threats as an extortion tactic is a common practice of threat actors.

Ransomware gangs posting empty threats: An established tactic

The Cyber Express contacted security analysts working across geographies. All of them have seen instances of ransomware gangs posting empty threats.

In fact, an entire gang of fake extortionists were found exploiting recent data breaches and ransomware incidents, posing as legitimate ransomware gangs to extort payment from U.S. companies.

These malicious actors, operating under the name “Midnight Group,” have been active since at least March 16, employing various tactics to coerce their victims.

Impersonating well-known ransomware and data extortion groups, the attackers have sent emails to targeted organizations, claiming responsibility for data breaches and the theft of substantial amounts of important information.

In one instance, an email was sent to an employee of a petroleum additives holding company, asserting affiliation with the Silent Ransom Group (SRG), also known as Luna Moth.

Interestingly, the same message used the name of another threat actor, the Surtr ransomware group, in the subject line, which first appeared in December 2021.

BleepingComputer discovered another email from the Midnight Group, where they professed to be the culprits behind a data breach, alleging the theft of 600GB of crucial data from servers.

Strikingly, this message was sent to a senior financial planner who had left the targeted company over six months prior.

In addition to data theft claims, some of these fake extortionists have threatened victims with distributed denial-of-service (DDoS) attacks if they fail to comply with the instructions provided in the messages.

Corporate investigation and risk consulting firm Kroll reported an increase in the number of such emails received under the Silent Ransom Group name since March 23.

The authors of these emails, who utilize the names of well-known cybercriminals, aim to intimidate and legitimize their threats.

According to Kroll, this method of scamming is cost-effective and easily conducted by low-skilled attackers.

Similar to wire fraud scams, these fake extortion attempts rely on social engineering tactics to pressure victims into paying before a given deadline.

Kroll predicts that this trend will continue indefinitely, as it generates revenue for cybercriminals.

Arete, an incident response company, has confirmed Kroll’s observations regarding the Midnight Group’s fraudulent emails.

Arete noted that the group primarily targets organizations that have previously fallen victim to ransomware attacks.

The initial attackers identified by Arete include QuantumLocker (now rebranded as DagonLocker), Black Basta, and Luna Moth.

At least 15 current and former clients of Arete have received fake threats from the Midnight Group, with the group supporting their claims of data theft using vague details.

It remains unclear how the victims are selected, but it is speculated that publicly available sources, such as leaked data from initial attackers, social media, news reports, or company disclosures, may play a role.

However, Arete also discovered instances where the fake attackers identified ransomware victims whose information was not publicly available, suggesting possible collaboration with the initial intruders.

This type of extortion scam is not new and was previously observed in 2019 by Coveware, a ransomware incident response company.

Coveware named it “Phantom Incident Extortion,” explaining that the threat actors use unique data about the targeted organization to lend credibility to their threats.

They also emphasize the potential costly consequences and demand a payment amount significantly lower than the damages that could arise from public exposure.

Both Coveware and Arete classify the Midnight Group’s threats as part of a fraud campaign. Attempts by Arete to engage with the group yielded no response or evidence of stolen data.

“Many organizations don’t realize they’re breached until the attackers disclose it to them,” Paul Bischoff, consumer privacy advocate at Comparitech, told The Cyber Express.

“So it’s not beyond the realm of possibility that an organization would believe a bogus threat and pay up under the assumption that the breach went unnoticed.”

Experts advise carefully analyzing such emails, recognizing the components of a phantom incident, confirming that the threat that you receive could be bogus.

The motivations behind ransomware gangs posting empty threats

Most ransomware resort to what is known as “double extortion,” where attackers not only encrypt the victim’s data but also steal them and threaten to release or sell it if the ransom is not paid.

On the other hand, cybersecurity researchers put ransomware gangs posting empty threats as downright fraud.

“Ransomware gangs that threaten leaks often post a sample of the stolen data to prove they do in fact have it,” Paul Bischoff, Consumer privacy advocate at Comparitech.

“In those cases I’d estimate almost all of them are legitimate. If they don’t post a sample, then I wouldn’t trust it.”

According to most of the researchers whom The Cyber Express interviewed for this report, the purpose of ransomware gangs posting empty threats is to increase the pressure on the victim to gains some quick money.

This strategy of ransomware gangs posting empty threats aims at exploiting the victim’s concerns about reputational damage, regulatory compliance violations, or the potential impact of data leaks.

Richard Caralli, Senior Cybersecurity Advisor at Axio, suggested another possibility.

“If attackers can get you to believe they have you, you’ll be willing to engage them which ironically might open the door to a real attack. It’s a ploy to get you to let them in,” he told The Cyber Express.

There are several possible motives behind ransomware gangs posting empty threats, even when they do not possess the victim’s data.

These motives can vary depending on the specific circumstances and goals of the attackers.

According to the cybersecurity researchers, these could be a few potential reasons behind ransomware gangs posting empty threats:

Psychological pressure: By claiming to have accessed and stolen sensitive data, attackers aim to create a sense of urgency, fear, and panic in the victim.

The psychological pressure may push the victim to pay the ransom quickly without questioning or verifying the validity of the claims.

Enhanced bargaining position: Empty threats can strengthen the bargaining position of the attackers during negotiations.

If victims believe their data is at risk, they may be more inclined to meet the ransom demands promptly and without negotiation.

The attackers may leverage the fear of potential data exposure to extract a higher ransom payment.

Reputation damage: The mere suggestion of a data breach or leak can erode public trust, impact customer confidence, and potentially harm the victim’s brand image, regardless of whether the claims are valid or not.

“Besides reaping the obvious financial rewards, making false claims about successful attacks hurts the reputation of the attacked organization,” told The Cyber Express

Deterrence and future leverage: By making empty threats, attackers can establish a reputation for being capable of data breaches and leaks, even if they have not actually executed them in a particular instance.

This reputation can serve as a deterrent to future targets and provide the attackers with a perceived advantage when attempting future extortion or negotiating with victims.

Disruption and distraction: Posting empty threats can also serve as a diversionary tactic.

It draws the victim’s attention to the data breach claim, potentially distracting them from other aspects of the attack, such as attempts to remove the ransomware or other malicious activities within the compromised network.

It’s important to note that these motives may not apply universally to all ransomware gangs, as different groups may have their own specific motivations and strategies, researchers pointed out.

Each attack should be assessed on a case-by-case basis, and victims should engage with cybersecurity experts to evaluate the credibility of the threats and determine the appropriate response.

How do organisations identify ransomware gangs posting empty threats?

“In my opinion, there are two clear signs of a bluff: repeated attempts and an increase in the ransom demand,” Axio’s Richard Caralli told The Cyber Express.

“Claims are most likely bogus when attackers make an attempt, threaten some retaliatory behavior, fail to retaliate, and then make another attempt.”

“The ransomware gang should be able to prove they’ve accessed your data by showing you a sample of it,” said Comparitech’s Bischoff.

According to Caralli, it’s another form of blackmail, where targeted individuals receive threat emails that claim to have pictures or videos of them.

If they don’t pay the ransom, they will release them to everyone in their contact list. Ransomware gangs often use this tactic with organizations as well to test their reaction to the attack, he said.

“If they offer no evidence of having something of value to you or your organization as an indication of their intent to proceed with an attack, it’s likely they are bluffing.

“Remember: their first inclination often is not to follow through with the threat; it’s to get you to pay them NOT to do it.”

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • More
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on WhatsApp (Opens in new window) WhatsApp

Related

Previous Post

Exploitation Motion Sensor Vulnerability: Unmasking the Fibaro Vulnerability Exploitation

Next Post

Piramal Group Cyber Attack: BianLian Ransomware Gang Lists Group as Victim

Next Post
Piramal Group Cyber Attack 1

Piramal Group Cyber Attack: BianLian Ransomware Gang Lists Group as Victim

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

PowerPoint and HPE vulnerabilities CVE-2009-0556 and CVE-2025-37164 are the first to be added to CISA's KEV catalog in 2026
Cyber News

CISA Warns of Attacks on PowerPoint and HPE Vulnerabilities

January 8, 2026
Government Cyber Action Plan
Cyber News

UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

January 8, 2026
Trump, Exit, Coalition, cybersecurity, digital human rights, Hybrid Warfare, Hybrid Threats, Influence Operation, AI, Artificial Intelligence, Deepfakes, Trump, Donald Trump, Kamala Harris, Harris, U.S. Presidential Candidates, Influence Operations, Influence Ops, Iran, Iranians, ODNI, FBI, CISA, disinformation, misinformation
Governance

Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

January 9, 2026
CVE-2026-21858
Firewall Daily

New n8n Vulnerability (CVE-2026-21858) Allows Unauthenticated File Access and RCE

January 8, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information