Skip to content

Data Stack Hub

Primary Menu
  • Basic Concepts
  • Top Tools
  • Security Hub
    • CVE
  • Comparisons
  • Alternatives To
  • About Us
  • Contact Us
  • Home
  • Security Hub
  • Netwalker Ransomware: Double Extortion Threats on a Global Scale

Netwalker Ransomware: Double Extortion Threats on a Global Scale

David | Date: 26 October 2024

Netwalker ransomware gained attention in 2019 for its double extortion tactics, where attackers not only encrypt files but also steal data. The threat of publishing stolen data added additional pressure on victims to pay the ransom. The number of infections linked to Netwalker is estimated in the hundreds, with ransom demands reaching into the millions of dollars.

Netwalker targeted large organizations, especially in industries like healthcare, education, and government. Its impact was felt worldwide, particularly in North America and Europe.

Table of Contents

Toggle
  • What is Netwalker Ransomware?
  • How does Netwalker work?
  • History and Evolution
  • Notable Attacks
  • Impact and Threat Level
  • Netwalker Ransomware Mitigation and Prevention
  • FAQs
  • Conclusion

What is Netwalker Ransomware?

Netwalker is a ransomware family that encrypts a victim’s files and demands a ransom payment for the decryption key. Unlike some other ransomware families, Netwalker focuses on large organizations, making it a significant threat to critical infrastructure.

It also uses double extortion tactics, which means that in addition to locking up files, the attackers steal sensitive data. If the victim refuses to pay, they threaten to release the stolen data on public platforms or sell it on dark web forums.

How does Netwalker work?

Netwalker spreads primarily through phishing emails and vulnerabilities in remote desktop protocol (RDP) systems. Once the ransomware gains access to a network, it encrypts essential files and appends a unique extension to each one.

Victims are presented with a ransom note that provides instructions on how to pay the ransom in Bitcoin. The attackers give a deadline and threaten to release or sell the stolen data if the ransom is not paid within the specified timeframe.

The ransom demands associated with Netwalker often range from $500,000 to several million dollars, depending on the size and resources of the organization.

History and Evolution

Netwalker first appeared in August 2019 and quickly became a prominent ransomware threat due to its focus on large enterprises and critical sectors. Over time, it evolved to adopt double extortion tactics, which became a hallmark of its operation.

The ransomware-as-a-service (RaaS) model allowed Netwalker to spread widely, as affiliates could use the ransomware in exchange for sharing the ransom profits with the core operators. Netwalker continued to evolve, adding features to evade detection and improve its encryption capabilities.

In 2021, law enforcement efforts took down parts of the Netwalker operation, but the ransomware’s tactics remain influential in modern cybercrime.

Notable Attacks

Netwalker has been responsible for numerous high-profile attacks, including:

  • University of California, San Francisco (UCSF): In June 2020, Netwalker targeted UCSF, encrypting systems and demanding a ransom to avoid the release of sensitive research data. UCSF ultimately paid $1.14 million to recover its files.
  • Government Agencies: Netwalker also targeted government institutions, including local municipalities, disrupting services and causing significant operational damage.
  • Healthcare Providers: The ransomware has targeted healthcare organizations, especially during the COVID-19 pandemic, leading to the encryption of critical patient records and systems.

Impact and Threat Level

Netwalker’s impact has been significant due to its focus on large organizations and critical sectors. The ransom demands often exceeded $1 million, putting substantial financial pressure on victims.

In addition to ransom payments, the cost of downtime and data recovery added to the overall losses. The double extortion tactics further increased the stakes, as victims also had to worry about sensitive data being publicly exposed or sold.

The healthcare and education sectors were particularly hard hit, with ransomware attacks leading to the disruption of essential services. Netwalker’s global reach made it a persistent threat across North America, Europe, and beyond.

Netwalker Ransomware Mitigation and Prevention

To protect against Netwalker ransomware, organizations should adopt the following cybersecurity strategies:

  • Phishing Protection: Use advanced email filtering to block phishing emails that could deliver ransomware.
  • RDP Security: Secure remote desktop systems with strong passwords, multi-factor authentication (MFA), and limited access.
  • Data Backups: Maintain regular, offline backups of critical files to ensure quick recovery without paying a ransom.
  • Patch Management: Regularly update and patch systems to close vulnerabilities that could be exploited by ransomware.
  • Endpoint Detection and Response (EDR): Deploy EDR solutions to detect and block ransomware before it spreads.

FAQs

  1. What industries are most affected by Netwalker ransomware?
    Netwalker primarily targets healthcare, education, and government sectors, where sensitive data and critical services are at risk.
  2. How much does Netwalker typically demand in ransom?
    Ransom demands for Netwalker attacks usually range from $500,000 to several million dollars, depending on the organization’s size.
  3. What makes Netwalker ransomware unique?
    Netwalker’s use of double extortion tactics, where they encrypt and steal data, sets it apart from traditional ransomware, adding extra pressure on victims to pay the ransom.

Conclusion

Netwalker ransomware is a significant threat to large enterprises and critical infrastructure, especially in sectors like healthcare and education. Its double extortion tactics force victims to consider not only data encryption but also the potential release of sensitive information.To defend against Netwalker, organizations must adopt strong phishing protection, RDP security, and backup strategies to mitigate the risk of infection and ensure business continuity in the event of an attack.




Recent Posts

  • Crysis/Dharma Ransomware: A Persistent Threat to SMBs
  • Pysa Ransomware: Targeting Education and Government Sectors
  • LockBit Ransomware: Rapid Encryption and Double Extortion
  • Netwalker Ransomware: Double Extortion Threats on a Global Scale
  • DarkSide Ransomware: High-Profile Cyber Extortion Attacks
  • Ragnar Locker Ransomware: Targeting Critical Infrastructure
  • Zeppelin Ransomware Explained

CVEs

  • CVE-2025-21333: Linux io_uring Escalation Vulnerability
  • CVE-2025-0411: Microsoft Exchange RCE Vulnerability
  • CVE-2025-24200: WordPress Forminator SQL Injection Vulnerability
  • CVE-2025-24085: Use-After-Free Vulnerability in Apple OS
  • CVE-2025-0283: Stack-Based Buffer Overflow in Ivanti VPN

Comparisons

  • Cybersecurity vs Data Science: 19 Key Differences
  • Data Privacy vs Data Security: 14 Key Differences
  • MySQL vs NoSQL: 10 Critical Differences
  • MySQL vs PostgreSQL: 13 Critical Differences
  • CockroachDB vs MySQL: 11 Critical Differences

You may have missed

15 Data Management Best Practices: You Must Follow Data Management Best Practices - Featured Image | DSH
1 min read
  • Basic Concepts

15 Data Management Best Practices: You Must Follow

21 November 2023
Top 13 Data Warehouse Best Practices Data Warehouse Best Practices - Featured Image | DSH
2 min read
  • Basic Concepts

Top 13 Data Warehouse Best Practices

3 November 2023
Top 10 Data Profiling Best Practices Data Profiling Best Practices - Featured Image | DSH
2 min read
  • Basic Concepts

Top 10 Data Profiling Best Practices

3 November 2023
Top 12 Data Preparation Best Practices Data Preparation Best Practices - Featured Image | DSH
2 min read
  • Basic Concepts

Top 12 Data Preparation Best Practices

3 November 2023
Data Stack Hub - Featured Logo

  • LinkedIn
  • Twitter
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Basic Concepts
  • Top Tools
  • Comparisons
  • CVEs
  • Alternatives To
  • Interview Questions
Copyright © All rights reserved. | MoreNews by AF themes.