{"id":48153,"date":"2022-08-25T15:10:56","date_gmt":"2022-08-25T15:10:56","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33772\/Hackers-Leaked-Data-Anyways-After-Company-Pays-Ransom.html"},"modified":"2022-08-25T15:10:56","modified_gmt":"2022-08-25T15:10:56","slug":"hackers-leaked-data-anyways-after-company-pays-ransom","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/","title":{"rendered":"Hackers Leaked Data Anyways After Company Pays Ransom"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/this-company-paid-a-ransom-demand-hackers-leaked-its-data-anyway\/\" alt=\"a-man-looking-frustrated-at-his-computer-in-the-office\" height=\"800.377358490566\" width=\"1200\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Image: Getty\/5m3photos<\/span><\/figcaption><\/figure>\n<p>A victim of a ransomware attack paid to restore access to their network \u2013 but the cyber criminals didn&#8217;t hold up their end of the deal.&nbsp;<\/p>\n<p>The real-life incident,&nbsp;<a href=\"https:\/\/blog.barracuda.com\/2022\/08\/24\/threat-spotlight-the-untold-stories-of-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">as detailed by cybersecurity researchers at Barracuda Networks<\/a>, took place in August 2021, when hackers from <a href=\"https:\/\/www.zdnet.com\/article\/cisa-says-blackmatter-ransomware-group-behind-recent-attacks-on-agriculture-companies\/\" rel=\"follow\">BlackMatter<\/a>&nbsp;ransomware group used a <a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/\" rel=\"follow\">phishing email<\/a> to compromise the account of a single victim at an undisclosed company.<\/p>\n<div class=\"c-shortcodePinbox-textList c-shortcodePinbox-textList_floating g-border-thin-light-bottom g-outer-spacing-top-medium g-outer-spacing-bottom-medium\">\n<h3 class=\"c-sectionHeading\">ZDNET recommends<\/h3>\n<\/p><\/div>\n<p>From that initial entry point, the attackers were able to expand their access to the network by moving laterally around the infrastructure, ultimately leading to the point where they were able to install hacking tools and steal sensitive data.&nbsp;<\/p>\n<p><strong>SEE:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-why-its-still-a-big-threat-and-where-the-gangs-are-going-next\/\" rel=\"follow\">Ransomware: Why it&#8217;s still a big threat, and where the gangs are going next<\/a><\/strong><\/p>\n<p>Stealing sensitive data has become a common part of ransomware attacks. Criminals leverage it as part of their extortion attempts, <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-theres-been-a-big-rise-in-double-extortion-attacks-as-gangs-try-out-new-tricks\/\" rel=\"follow\">threatening to release it<\/a> if a ransom isn&#8217;t received. &nbsp;<\/p>\n<p>The attackers appear to have had access to the network for at least a few weeks, seemingly going undetected before systems were encrypted and a ransom was demanded, to be paid in Bitcoin.&nbsp;<\/p>\n<p>Cybersecurity agencies warn that despite networks being encrypted, <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-warning-to-law-firms-stop-encouraging-victims-to-pay-ransoms-to-cyber-criminals\/\" rel=\"follow\">victims shouldn&#8217;t pay ransom demands<\/a> for a decryption key because this only shows hackers that such attacks are effective.<\/p>\n<p>Despite this, the unidentified organisation chose to pay the ransom after negotiating the payment down from half the original demand. But even though the company gave in to the extortion demands, the BlackMatter group still leaked the data a few weeks later \u2013 providing a lesson in why you should never trust cyber criminals.&nbsp;<\/p>\n<p>Cybersecurity responders from Barracuda helped the victim isolate the infected systems, bring them back online, and restore them from backups.<\/p>\n<p>Following an audit of the network, <a href=\"https:\/\/www.zdnet.com\/article\/better-than-the-best-password-how-to-use-2fa-to-improve-your-security\/\" rel=\"follow\">multi-factor authentication<\/a> (MFA) was applied to accounts, suggesting that a lack of MFA was what helped the attackers gain and maintain access to accounts in the first place.&nbsp;<\/p>\n<p>A few months after the incident, <a href=\"https:\/\/www.zdnet.com\/article\/blackmatter-ransomware-to-shut-down-affiliates-transferring-victims-to-lockbit\/\" rel=\"follow\">BlackMatter announced it was shutting down<\/a>, with the recommendation that those using the ransomware-as-a-service scheme should switch to <a href=\"https:\/\/www.zdnet.com\/article\/fbi-watch-out-for-lockbit-2-0-ransomware-heres-how-to-reduce-the-risk-to-your-network\/\" rel=\"follow\">LockBit<\/a>.&nbsp;<\/p>\n<p>According to Barracuda&#8217;s report, <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-has-doubled-this-year-heres-what-you-need-to-do-to-stay-safe-from-hackers\/\" rel=\"follow\">ransomware attacks are on the rise<\/a>, with more than double the number of attacks targeting key sectors, including <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-attacks-against-hospitals-are-having-some-very-grim-consequences\/\" rel=\"follow\">healthcare<\/a>, <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-is-hitting-one-sector-particularly-hard-and-the-impact-is-felt-by-everyone\/\" rel=\"follow\">education<\/a> and <a href=\"https:\/\/www.zdnet.com\/article\/fbi-ransomware-attacks-are-piling-up-the-pressure-on-public-services\/\" rel=\"follow\">local government<\/a>.&nbsp;<\/p>\n<p>Researchers also warn that the number of recorded ransomware attacks <a href=\"https:\/\/www.zdnet.com\/article\/critical-infrastructure-is-under-attack-from-hackers-securing-it-needs-to-be-a-priority-right-now\/\" rel=\"follow\">against critical infrastructure<\/a> has quadrupled over the course of the last year. However, the report suggests there are reasons for optimism.&nbsp;<\/p>\n<p>&#8220;The good news is that in our analysis of highly publicized attacks, we saw fewer victims paying the ransom and more businesses standing firm thanks to better defenses, especially in attacks on critical infrastructure,&#8221; it said.&nbsp;<\/p>\n<p><strong>SEE:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/these-are-the-biggest-cybersecurity-threats-make-sure-you-arent-ignoring-them\/#link=%7B%22role%22:%22standard%22,%22href%22:%22https:\/\/www.zdnet.com\/article\/these-are-the-biggest-cybersecurity-threats-make-sure-you-arent-ignoring-them\/%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22These%20are%20the%20biggest%20cybersecurity%20threats.%20Make%20sure%20you%20aren't%20ignoring%20them%22%7D\" rel=\"follow\">These are the biggest cybersecurity threats. Make sure you aren&#8217;t ignoring them<\/a><\/strong><\/p>\n<p>In addition to <a href=\"https:\/\/www.zdnet.com\/article\/multi-factor-authentication-use-it-for-all-the-people-that-access-your-network-all-the-time\/\" rel=\"follow\">applying MFA<\/a>, organisations can take other actions to help secure their network against ransomware and cyberattacks, including setting up network segmentation, <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-brings-back-vba-macro-block-in-office\/\" rel=\"follow\">disabling macros<\/a> to prevent attackers exploiting them in phishing emails, and ensuring backups are stored offline.&nbsp;<\/p>\n<p>It&#8217;s also recommended that organisations <a href=\"https:\/\/www.zdnet.com\/article\/this-one-change-could-protect-your-systems-from-attack-so-why-dont-more-companies-do-it\/\" rel=\"follow\">apply security updates as quickly as possible<\/a> to stop attackers targeting known vulnerabilities to gain access to accounts and networks.&nbsp;<\/p>\n<h3><strong>MORE ON CYBERSECURITY<\/strong><\/h3>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33772\/Hackers-Leaked-Data-Anyways-After-Company-Pays-Ransom.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10165],"class_list":["post-48153","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackerprivacycybercrimedata-lossfraudcryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Leaked Data Anyways After Company Pays Ransom 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Leaked Data Anyways After Company Pays Ransom 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-25T15:10:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/this-company-paid-a-ransom-demand-hackers-leaked-its-data-anyway\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-leaked-data-anyways-after-company-pays-ransom\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-leaked-data-anyways-after-company-pays-ransom\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hackers Leaked Data Anyways After Company Pays Ransom\",\"datePublished\":\"2022-08-25T15:10:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-leaked-data-anyways-after-company-pays-ransom\\\/\"},\"wordCount\":552,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-leaked-data-anyways-after-company-pays-ransom\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/this-company-paid-a-ransom-demand-hackers-leaked-its-data-anyway\\\/\",\"keywords\":[\"headline,hacker,privacy,cybercrime,data loss,fraud,cryptography\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-leaked-data-anyways-after-company-pays-ransom\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-leaked-data-anyways-after-company-pays-ransom\\\/\",\"name\":\"Hackers Leaked Data Anyways After Company Pays Ransom 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-leaked-data-anyways-after-company-pays-ransom\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-leaked-data-anyways-after-company-pays-ransom\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/this-company-paid-a-ransom-demand-hackers-leaked-its-data-anyway\\\/\",\"datePublished\":\"2022-08-25T15:10:56+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-leaked-data-anyways-after-company-pays-ransom\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-leaked-data-anyways-after-company-pays-ransom\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-leaked-data-anyways-after-company-pays-ransom\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/this-company-paid-a-ransom-demand-hackers-leaked-its-data-anyway\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/this-company-paid-a-ransom-demand-hackers-leaked-its-data-anyway\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-leaked-data-anyways-after-company-pays-ransom\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,privacy,cybercrime,data loss,fraud,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerprivacycybercrimedata-lossfraudcryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hackers Leaked Data Anyways After Company Pays Ransom\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Leaked Data Anyways After Company Pays Ransom 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Leaked Data Anyways After Company Pays Ransom 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-08-25T15:10:56+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/this-company-paid-a-ransom-demand-hackers-leaked-its-data-anyway\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hackers Leaked Data Anyways After Company Pays Ransom","datePublished":"2022-08-25T15:10:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/"},"wordCount":552,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/this-company-paid-a-ransom-demand-hackers-leaked-its-data-anyway\/","keywords":["headline,hacker,privacy,cybercrime,data loss,fraud,cryptography"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/","url":"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/","name":"Hackers Leaked Data Anyways After Company Pays Ransom 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/this-company-paid-a-ransom-demand-hackers-leaked-its-data-anyway\/","datePublished":"2022-08-25T15:10:56+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/this-company-paid-a-ransom-demand-hackers-leaked-its-data-anyway\/","contentUrl":"https:\/\/www.zdnet.com\/article\/this-company-paid-a-ransom-demand-hackers-leaked-its-data-anyway\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hackers-leaked-data-anyways-after-company-pays-ransom\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,privacy,cybercrime,data loss,fraud,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacycybercrimedata-lossfraudcryptography\/"},{"@type":"ListItem","position":3,"name":"Hackers Leaked Data Anyways After Company Pays Ransom"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48153"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48153\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}