Threat Intelligence

Ransomware Data Exfiltration Explained: Why Encryption Is No Longer the Real Threat

BlackFog's 2024 State of Ransomware report confirmed that 93% of ransomware attacks now include data exfiltration — up from 70% in 2022. The LockBit group alone exfiltrated data from over 2,000 organisations in 2023 before the FBI's Operation Cronos disrupted their infrastructure. Encryption is no longer the primary weapon — stolen data is. Attackers know that the threat of publishing patient records, financial data, or trade secrets on leak sites is far more compelling than a locked hard drive.

93% of ransomware attacks now exfiltrate data before encryption begins.

The Shift from Encryption to Exfiltration

Between 2019 and 2025, ransomware fundamentally changed. The Maze group pioneered double extortion in late 2019, combining encryption with data theft to create dual pressure on victims. By 2024, groups like BianLian and Karakurt abandoned encryption entirely, operating as pure data extortion operations. The economics are clear: backups defeat encryption, but nothing defeats data that has already been stolen. Once your customer records, HR files, or intellectual property are on a leak site, no disaster recovery plan can undo the damage.

How Ransomware Exfiltration Works — The Kill Chain

Modern ransomware operators follow a methodical process that typically takes 4-10 days from initial access to data exfiltration. Understanding each stage is critical because prevention at any point breaks the chain:

  • Initial access: phishing emails, exploited VPN vulnerabilities (Fortinet, Citrix), or purchased credentials from initial access brokers on dark web forums
  • Persistence and privilege escalation: deploying Cobalt Strike beacons, harvesting credentials from Active Directory, escalating to domain admin
  • Internal reconnaissance: mapping network shares, identifying high-value data stores, locating backup infrastructure
  • Data staging: compressing target data into archives, often using legitimate tools like 7-Zip or WinRAR to avoid detection
  • Exfiltration: transferring data to attacker-controlled infrastructure using Rclone, Mega.nz, or custom tools over encrypted channels
  • Encryption (optional): deploying the ransomware payload only after data exfiltration is complete — by this point, the attacker already has leverage

Why Backups Alone No Longer Protect You

For years, the standard advice was simple: maintain good backups and you can recover from ransomware without paying. That advice is now dangerously incomplete. When the Cl0p group exploited MOVEit Transfer in 2023, they exfiltrated data from over 2,600 organisations without deploying any encryption whatsoever. Victims with perfect backup strategies were still forced to negotiate because the stolen data — employee Social Security numbers, medical records, financial statements — was the weapon. The reputational damage, regulatory fines, and class-action lawsuits triggered by a data leak far exceed the cost of restoring from backup.

How BlackFog Prevents Exfiltration at the Source

BlackFog's Anti Data Exfiltration (ADX) technology operates at the device level, monitoring all outbound data flows in real time. Rather than relying on detecting ransomware signatures or matching known attack patterns, it prevents data from leaving the device to unauthorised destinations. This means even novel, zero-day ransomware cannot exfiltrate data — the transfer is blocked before it begins, regardless of whether the malware has been seen before. By removing the exfiltration capability, BlackFog eliminates the leverage that makes modern ransomware profitable.

Frequently Asked Questions

What is the difference between data exfiltration and data encryption in ransomware?

Data encryption locks files in place, making them inaccessible until a decryption key is provided. Data exfiltration copies files out of your organisation to attacker-controlled servers. Modern ransomware does both — exfiltrating data first for extortion leverage, then encrypting for operational disruption.

Can endpoint detection and response (EDR) prevent data exfiltration?

EDR tools detect suspicious behaviour and can terminate malicious processes, but sophisticated attackers use legitimate tools like Rclone or cloud sync utilities for exfiltration, which EDR may not flag. BlackFog complements EDR by controlling data egress regardless of which tool is used.

How long does data exfiltration typically take during a ransomware attack?

The median dwell time — from initial compromise to exfiltration — is approximately 5 days according to Mandiant's 2024 M-Trends report. Some groups operate faster: LockBit affiliates have been observed exfiltrating data within hours of initial access.

Stop ransomware exfiltration before it starts

Kyanite Blue is an authorised BlackFog partner. We deploy, manage, and support ADX for organisations across every sector.

Get in touch

Featured Product

BlackFog

Learn more

Ready to stop data exfiltration?

Start with a free 30-day BlackFog assessment — 25 devices, no obligation.