Back to Blog

Triple Extortion Is the New Normal

Ransomware operators figured out that encrypting files alone was not enough leverage. Victims started restoring from backups. So attackers added data exfiltration and leak threats to the mix, creating double extortion. That worked for a while, until organizations started treating data leaks as an acceptable risk compared to the ransom demand. The response from threat actors was predictable: add a third lever. DDoS.

In 2026, triple extortion is standard operating procedure for every major ransomware-as-a-service (RaaS) operation. The playbook works like this: the attacker encrypts your systems, exfiltrates sensitive data, and then launches sustained DDoS attacks against your public-facing infrastructure while negotiating the ransom. The DDoS component serves a specific tactical purpose. It prevents your team from focusing on incident response. It makes it impossible to communicate with customers. It creates visible external pressure that accelerates the decision to pay.

The Chaos ransomware group now bundles DDoS capabilities as a standard feature for all affiliates. Lockbit 3.0 copycat operations and the emergent BlackFlood group both advertise triple extortion as a core service. Even smaller operations are purchasing DDoS-for-hire access through booter services and packaging it into their extortion campaigns. The barrier to adding DDoS as an extortion lever has dropped to essentially zero.

What an RDDoS Extortion Email Looks Like

RDDoS extortion emails follow a remarkably consistent template. They arrive at publicly listed email addresses, sometimes pulled from WHOIS records, sometimes scraped from contact pages. The sender claims to represent a well-known threat actor group, often impersonating Lazarus Group, Fancy Bear, or whatever name is currently generating headlines. Here is what a typical 2026 RDDoS email contains:

Subject: DDoS Attack Warning — [Your Company Name]

We are [Threat Group Name]. Your network will be the target of a
DDoS attack starting [date, usually 3-7 days out].

We have already conducted a small demonstration attack on your
IP range [specific IP] on [date] at [time] to prove our capability.

The attack will exceed 1 Tbps and will continue until you pay.

Send 5 BTC to the following wallet: bc1q[...]

You have 72 hours. If you do not pay, the attack will begin and
the price will increase by 2 BTC for every day you delay.

This is not a hoax. Check your logs for [timestamp].

The "demonstration attack" is key. Attackers will send a short burst of traffic, typically 5 to 15 minutes at moderate volume, to prove they can actually reach your infrastructure. This is designed to create urgency and establish credibility. In many cases, the demonstration attack is real but comes from a rented booter service that costs the attacker $30 to $50. The threatened "1 Tbps attack" is almost always a bluff, but the psychological pressure works regardless.

Some RDDoS campaigns skip the demonstration entirely. These are typically low-effort operations sending the same email to thousands of organizations, hoping a small percentage will pay out of fear. FBI data shows that these spray-and-pray campaigns have a roughly 2% to 4% payment rate, which at scale still generates significant revenue for the attackers.

Payment Trends: The Numbers Are Shifting

In 2025, approximately 28% of ransomware victims paid the ransom, down from 41% in 2023 and 46% in 2022, according to Coveware's quarterly ransomware reports. The downward trend is encouraging but the absolute number remains high. Organizations are still paying hundreds of millions of dollars annually to threat actors.

For RDDoS specifically, payment rates are harder to track because many incidents go unreported. Chainalysis data from 2025 shows that known RDDoS-related cryptocurrency payments totaled approximately $47 million, but the actual figure is likely two to three times higher when accounting for unreported payments and payments made through privacy coins.

The average RDDoS demand in 2026 ranges from 2 to 10 BTC (roughly $140,000 to $700,000 at current prices), though demands against large enterprises and financial institutions have reached 50 BTC or more. Attackers price their demands based on publicly available information about the target: annual revenue, industry vertical, and perceived ability to pay.

YearRansom Payment RateAverage RDDoS DemandKey Trend
202246%1-5 BTCDouble extortion dominates
202341%2-8 BTCTriple extortion emerges
202434%3-10 BTCLaw enforcement takedowns accelerate
202528%2-10 BTCTriple extortion becomes standard
2026 (YTD)~24%2-10 BTCAutomated defenses reduce leverage

Why Paying Never Works

Every law enforcement agency, from the FBI to Europol to the UK's NCSC, advises against paying ransoms. The reasons are both practical and strategic.

They Come Back

Organizations that pay are flagged as willing payers. Chainalysis research found that 80% of organizations that paid a ransom were attacked again within 12 months, often by the same group or an affiliate using shared intelligence. Paying does not buy safety. It buys a temporary pause and a target on your back. Threat actors maintain lists of organizations that have paid, and these lists circulate among criminal networks. Once you pay, you are on every list.

You Might Be Funding Sanctioned Entities

OFAC has made it clear that facilitating payments to sanctioned entities, even unknowingly, can result in federal penalties. Several RDDoS groups have ties to North Korean state-sponsored operations (Lazarus Group) or Russian criminal syndicates on the SDN list. Making a payment to these groups can expose your organization to secondary sanctions and regulatory action, adding legal costs on top of the ransom itself.

The DDoS Rarely Stops Immediately

Even when payment is made, there is no reliable mechanism to ensure the attacks stop. Decentralized RaaS operations mean that the affiliate who negotiated the ransom may not have direct control over the DDoS infrastructure being used. In documented cases, organizations have paid the ransom only to see attacks continue for days afterward because the DDoS was being executed by a separate team that had not received the stop order.

No Guarantee on Data Deletion

If the extortion includes a data leak threat alongside DDoS, paying provides zero assurance that exfiltrated data is actually deleted. Multiple investigations have found that ransomware groups retain copies of stolen data even after payment, using it for future extortion or selling it on dark web marketplaces.

The Economics of RDDoS for Attackers

Understanding the attacker's economics reveals why this threat model is so persistent. A typical RDDoS operation has remarkably low costs:

  • DDoS-for-hire access: $30 to $300 per month for a booter service capable of 100+ Gbps attacks
  • Email infrastructure: $10 to $50 per month for bulletproof hosting and disposable domains
  • Target research: Free, using public records, Shodan, and WHOIS data
  • Cryptocurrency wallets: Free to generate

Total operational cost: under $500 per month. If the attacker sends 500 extortion emails per month and achieves even a 2% payment rate at an average of $100,000 per payment, that is $1 million in monthly revenue from an investment of $500. The profit margin is staggering, which is why RDDoS campaigns continue despite law enforcement efforts.

The attacks are deliberately timed for maximum impact. Threat actors research their targets and schedule DDoS attacks during peak business hours, product launches, earnings calls, or major industry events. An ecommerce company receiving an RDDoS threat the week before Black Friday faces an entirely different calculus than the same company receiving the same threat in January. The timing is intentional and data-driven.

DDoS as Leverage During Ransomware Negotiations

The most sophisticated use of DDoS in 2026 is not standalone extortion but as a tactical weapon during active ransomware negotiations. Here is how it plays out:

  1. Attacker deploys ransomware and encrypts critical systems
  2. Attacker exfiltrates sensitive data and sends proof to the victim
  3. Victim engages incident response team and begins negotiating
  4. When negotiations stall or the victim pushes back on price, the attacker launches DDoS against the victim's remaining online services
  5. The DDoS attack prevents the victim from communicating with customers, processing transactions, or managing the incident effectively
  6. Under compounded pressure, the victim is more likely to pay a higher amount faster

This is not theoretical. Incident response firms including Mandiant, CrowdStrike, and Kroll have all documented cases where DDoS was deployed mid-negotiation as a pressure escalation tactic. The DDoS does not need to be massive. Even a moderate application-layer attack against the victim's customer portal or support site creates visible external disruption that amplifies the urgency.

The average cost of DDoS downtime, estimated at $30,000 or more per hour across industries, means that every hour of DDoS during negotiations shifts the math further in the attacker's favor. If paying $300,000 in ransom stops $30,000/hour of ongoing losses, the business decision becomes agonizingly simple from a pure cost perspective. That is exactly the calculation the attackers want you to make.

What to Do When You Receive an RDDoS Threat

Receiving an RDDoS extortion email is unsettling, but your response should be systematic and calm. Here is the playbook:

Step 1: Document Everything

Save the original email with full headers. Record the timestamp, sender address, Bitcoin wallet address, and any specific claims about demonstration attacks. Check your traffic logs for the timestamp mentioned in the email. If the attacker claims they sent a demonstration attack, verify whether it actually occurred. This documentation is critical for law enforcement and may be relevant for insurance claims.

Step 2: Do Not Respond to the Attacker

Do not reply to the email. Do not engage in negotiation. Any response confirms that the email reached a real person who cares enough to respond, which increases the likelihood of follow-up attacks and higher demands. Silence is the correct response.

Step 3: Report to Law Enforcement

File a report with the FBI's IC3 (ic3.gov) and notify your local FBI field office. If you are outside the US, contact your national cybersecurity agency (NCSC, CERT, etc.). Law enforcement cannot stop the immediate threat, but aggregated reports help them identify and prosecute threat actors. Several major RDDoS campaigns have been disrupted through coordinated law enforcement action, including Operation PowerOFF in 2024 and 2025.

Step 4: Verify Your Detection and Mitigation Posture

Confirm that your DDoS detection is active and functioning. Ensure alerting is configured and reaching the right people. Verify that your mitigation runbooks are current and that automated responses are enabled. If you have upstream scrubbing services, confirm they are reachable and activated. The goal is to ensure that if an attack comes, your infrastructure detects it in seconds and your response is automatic.

Step 5: Notify Your Team and Stakeholders

Brief your NOC, security team, and executive leadership. Ensure everyone understands the plan: do not pay, do not engage, rely on automated detection and mitigation. If you have cyber insurance, notify your insurer per your policy terms. Having the team aligned before an attack arrives eliminates the panic-driven decision making that attackers rely on.

The entire RDDoS business model depends on the threat of downtime being credible. If your detection fires in under a second and your mitigation is automated, the attacker's leverage evaporates. You receive the extortion email, verify your defenses are active, and move on with your day.

Why Sub-Second Detection Makes the Threat Toothless

RDDoS works because downtime is expensive and defenders are slow. The traditional detection and response cycle looks like this: SNMP polling detects an anomaly after 5 minutes, an engineer triages for another 10 minutes, a decision is made to engage mitigation after 5 more minutes, and mitigation takes effect 5 minutes after that. Total time from attack start to mitigation: 25 minutes. At $30,000 per hour, that is $12,500 in losses before you even start defending.

Now consider what happens with sub-second detection and automated response. Flowtriq detects the attack within one second. An automated webhook triggers your upstream scrubbing or firewall rules within seconds. Your team receives an alert with full packet-level forensics. Total time from attack start to mitigation: under 30 seconds. The attacker burns through their rented DDoS capacity achieving essentially nothing.

When an attacker conducts their demonstration attack against an organization running Flowtriq, the attack is detected and documented before the attacker's own monitoring confirms it landed. The forensic evidence, including PCAP captures and per-second traffic analysis, gives you complete documentation of the attack for law enforcement while the attacker has accomplished zero impact on your services.

This changes the economic calculation entirely. If the attacker knows (or discovers through their demonstration) that their DDoS will not cause meaningful downtime, the leverage disappears. They are spending money on booter services to generate traffic that gets scrubbed or blocked within seconds. The extortion email becomes an empty threat. And empty threats do not get paid.

At $9.99 per node per month, the cost of making RDDoS threats irrelevant is a fraction of a single hour of downtime. For organizations running flow-based monitoring, sources start at $19 per month. Compare that to a ransom demand of $140,000 to $700,000, and the investment in automated detection is not even a rounding error.

Make RDDoS extortion irrelevant. Flowtriq gives you sub-second detection, automated alerting, and full forensic documentation of every attack. When the next extortion email arrives, you will already have the answer: your defenses are active, your mitigation is automated, and the attacker has no leverage. Start your free 7-day trial and stop worrying about empty threats.

Back to Blog

Related Articles