{"id":461,"date":"2025-03-19T21:28:05","date_gmt":"2025-03-19T21:28:05","guid":{"rendered":"https:\/\/www.techrepublic.com\/?p=4298600"},"modified":"2025-03-19T21:28:05","modified_gmt":"2025-03-19T21:28:05","slug":"techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure","status":"publish","type":"post","link":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/","title":{"rendered":"TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers \u2018Apply Psychological Pressure\u201d"},"content":{"rendered":"<figure id=\"attachment_4298601\" aria-describedby=\"caption-attachment-4298601\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4298601\" src=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-ransomware-attackers-call-phones-sygnia.jpg\" alt=\"A hacker wearing a mask to cover his face is using computer to hack data to get ransom from victims.\" width=\"1400\" height=\"900\" srcset=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-ransomware-attackers-call-phones-sygnia.jpg 1400w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-ransomware-attackers-call-phones-sygnia-300x193.jpg 300w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-ransomware-attackers-call-phones-sygnia-1024x658.jpg 1024w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-ransomware-attackers-call-phones-sygnia-768x494.jpg 768w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-ransomware-attackers-call-phones-sygnia-50x32.jpg 50w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-ransomware-attackers-call-phones-sygnia-770x495.jpg 770w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-ransomware-attackers-call-phones-sygnia-370x238.jpg 370w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-ransomware-attackers-call-phones-sygnia-270x174.jpg 270w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-ransomware-attackers-call-phones-sygnia-740x476.jpg 740w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-ransomware-attackers-call-phones-sygnia-540x347.jpg 540w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-ransomware-attackers-call-phones-sygnia-1110x714.jpg 1110w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250319-news-ransomware-attackers-call-phones-sygnia-810x521.jpg 810w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\"><figcaption id=\"caption-attachment-4298601\" class=\"wp-caption-text\">Image: rthanuthattaphong\/Envato Elements<\/figcaption><\/figure>\n<p>Experts warn that desperate ransomware attackers are shifting focus from businesses to individuals, applying \u201cpsychological pressure\u201d with personal threats that bring digital extortion into the physical world. In one stunning recent example, Guy Segal and Moty Cristal from ransomware negotiator and incident response firm Sygnia said a threat actor personally called an executive\u2019s mobile phone and referenced sensitive details extracted from the company\u2019s internal system.<\/p>\n<p>\u201cDuring the call, they referenced personal information, underscoring just how much data an employer may hold on its employees,\u201d Cristal \u2014 a tactical negotiator \u2014 told TechRepublic. \u201cRansomware attacks aren\u2019t just about encrypted files; they can become invasive in other ways.\u201d<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Ransomware_payments_decline_but_threats_escalate\"><\/span>Ransomware payments decline, but threats escalate<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While ransomware has been a problem for decades, global payouts in 2023 surpassed $1 billion for the first time, marking a historic escalation in cyber extortion. Attackers have continuously refined their tactics, finding new ways to extract maximum payments from victims.<\/p>\n<p>New data revealed last month that <a href=\"https:\/\/www.techrepublic.com\/article\/ransomware-cheat-sheet-everything-you-need-to-know\/\">ransomware<\/a> payments <a href=\"https:\/\/www.techrepublic.com\/article\/ransomware-payments-decrease-2024-chainalysis\/\">decreased by 35% in 2024<\/a>. Experts attribute the decline to successful law enforcement takedowns and improved cyber hygiene globally, which have enabled more victims to refuse payment. In response, <a href=\"https:\/\/www.techrepublic.com\/article\/microsoft-ransomware-attacks-grew-2024\/\">attackers are adapting<\/a>, acting faster to initiate negotiations and developing stealthier, harder-to-detect ransomware strains.<\/p>\n<p><strong>SEE: <a href=\"https:\/\/www.techrepublic.com\/article\/ransomware-trends-malwarebytes\/\">Most Ransomware Attacks Occur When Security Staff Are Asleep, Study Finds<\/a><\/strong><\/p>\n<p>Targeted individuals are often C-level executives or work in legal fields. The stolen personal data can include information about where their children live or go to school or even photos of loved ones. Cristal added that it is \u201cextremely rare\u201d for an attacker actually to act on these physical threats, but the success of the attack only requires the victim to believe they could.<\/p>\n<p>\u201cIt can become deeply personal to encourage a knee-jerk reaction from the victim,\u201d he said. Cristal added that about 70% of ransoms do not get paid. The majority of the time, the attacks are not personal.<\/p>\n<p>But when attackers escalate threats by promising to leak sensitive data, they also demonstrate their effectiveness within the cyber crime community\u2014if they do not receive payment, they can sell the valuable data on the black market for a last-minute payday.<\/p>\n<aside class=\"pinbox right\">\n<h3 class=\"heading\">Must-read security coverage<\/h3>\n<\/aside>\n<h2><span class=\"ez-toc-section\" id=\"The_risks_of_using_AI_in_ransomware_negotiations\"><\/span>The risks of using AI in ransomware negotiations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Modern ransomware attacks are using AI in new ways, with attackers using freely available chatbots to write malware, craft phishing emails, and <a href=\"https:\/\/www.techrepublic.com\/article\/ai-cyber-attacks-gartner\/\">create deepfake videos<\/a> to trick individuals out of valuable information or money. As a result, these tools have lowered the barrier to entry for staging a cyber attack. However, the Sygnia ransomware negotiation teams have also witnessed victims trying to use <a href=\"https:\/\/www.techrepublic.com\/article\/chatgpt-cheat-sheet\/\">tools like ChatGPT<\/a> to help them say the right thing to escape their ordeal.<\/p>\n<p>\u201cTypically, AI is not sensitive enough to pick up on human emotion or provide the necessary nuance required to connect with threat actors and diffuse the situation, and this is where it can escalate,\u201d Cristal told TechRepublic. It can encourage victims to break the golden rules of not using \u201cnegative language\u201d or telling the threat actor outright that they won\u2019t pay the ransom.<\/p>\n<p><strong>SEE: <a href=\"https:\/\/www.techrepublic.com\/article\/generative-ai-ransomware-threats-uk\/\">UK Study: Generative AI May Increase Ransomware Threat<\/a><\/strong><\/p>\n<p>Attackers \u201ccan be extremely polite, even friendly to begin with,\u201d Sygnia\u2019s Vice President of Corporate Development Guy Segal said. But they may get more \u201caggressive and threatening\u201d if they don\u2019t get what they want quickly \u2014 which would be the case if all hope of payment was extinguished. It is not uncommon for attackers to leave backdoors in malware that let them retaliate with additional encryption, or even by wiping all data, especially if they sense a lack of respect or that they\u2019re being strung along.<\/p>\n<p>Therefore, negotiators try to remain \u201capproachable,\u201d Cristal said.<\/p>\n<p>\u201cDefensive behavior will create a more hostile atmosphere,\u201d he told TechRepublic. Negotiators may be able to steer the conversation to extract more information from the attackers, such as what data they hold, how they breached the system, and the likelihood that they may return or publish data.<\/p>\n<p>\u201cEvery threat actor has their motives and life experiences that make them who they are \u2014 conversing is important to understand how we approach the situation,\u201d he said. \u201cDo they have enough data to damage the company? Could they cause real-world damage, particularly for critical infrastructure clients, or impact people\u2019s lives? The threat actor may well be happy with a smaller ransom payment than their initial request because they just need the money.\u201d<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_debate_over_banning_ransomware_payments\"><\/span>The debate over banning ransomware payments<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In January, the U.K. government announced it was considering banning <a href=\"https:\/\/www.techrepublic.com\/article\/uk-banning-ransomware-payments\/\">ransomware payments<\/a> to make critical industries \u201cunattractive targets for criminals,\u201d reducing the frequency and impact of incidents in the country. The ban would apply to all public sector bodies and critical national infrastructure, which includes NHS trusts, schools, local councils, and <a href=\"https:\/\/www.techrepublic.com\/article\/critical-national-infrastructure-email-security\/\">data centers<\/a>.<\/p>\n<p><strong>SEE: <a href=\"https:\/\/www.techrepublic.com\/article\/blue-yonder-ransomware-attack\/\">Starbucks, Supermarkets Targeted in Ransomware Attack<\/a><\/strong><\/p>\n<p>The Office of Foreign Assets Control has identified several sanctioned ransomware groups linked to Russia or North Korea that U.S. companies and individuals are legally prohibited from paying ransom to.<\/p>\n<p>Segal and Cristo say that ransomware bans are not a straightforward fix, noting that they have seen evidence of attacks increasing and decreasing. While some threat actors may be discouraged, others are forced to raise the stakes with more aggressive or personal threats. Some are driven by data theft or disruption for geopolitical reasons, not money \u2014 the ban does not affect them.<\/p>\n<p>But the Sygnia negotiators agree that bans on ransom payments within governments are positive on the whole.<\/p>\n<p>\u201cA blanket decision to never pay ransom is a privilege that governments can afford,\u201d Segal said. \u201cBut it is far less applicable in the business sector.\u201d<\/p>\n<p>Indeed, in the documentation outlining the U.K.\u2019s ban proposal, the Home Office acknowledged the potential for the legislation to disproportionately impact small and micro-businesses \u201cwhich cannot afford specialist ransomware insurance, or clean up specialists.\u201d These businesses will find it harder to recover from any financial losses incurred through operational disruption and the ensuing reputational damage.<\/p>\n<p>Such consequences may encourage some businesses to covertly pay ransoms through third parties or cryptocurrencies to avoid fines. Paying this way also aids the attacker, as they receive the payment anonymously, bypass jurisdictional restrictions, and can continue their operations without fear of being tracked or penalised.<\/p>\n<p>If the business is caught doing this, they will, of course, have to contend with a fine from the government on top of the ransom payment, exacerbating the damage to their operations. On the other hand, if they comply and report the incident to the authorities, it creates an additional administrative burden that disproportionately affects smaller firms.<\/p>\n<p>\u201cThis is why there must be more in place to support businesses before they suffer the brunt of a ransomware ban,\u201d Segal said.<\/p>\n<p>Sygnia\u2019s Senior Vice President of Global Cyber Services Amir Becker suggested that if governments impose a ban, they should also:<\/p>\n<ul>\n<li>Exempt critical infrastructure and healthcare sectors, as withholding the ransom could result in lives lost.<\/li>\n<li>Simultaneously provide incentives for organisations to enhance their cybersecurity posture and incident response capabilities.<\/li>\n<li>Provide financial and technical support to help businesses recover from the consequences of not paying a ransom.<\/li>\n<\/ul>\n<p>\u201cThis balanced approach can address the ransomware threat while minimizing collateral damage to businesses and the broader economy,\u201d he told TechRepublic.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Image: rthanuthattaphong\/Envato Elements Experts warn that desperate ransomware attackers are shifting focus from businesses to individuals, applying \u201cpsychological pressure\u201d with personal threats that bring digital extortion into the physical world. In one stunning recent example, Guy Segal and Moty Cristal from ransomware negotiator and incident response firm Sygnia said a threat actor personally called an [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":462,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-461","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers \u2018Apply Psychological Pressure\u201d - TecnoArtesanos Tech Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers \u2018Apply Psychological Pressure\u201d - TecnoArtesanos Tech Blog\" \/>\n<meta property=\"og:description\" content=\"Image: rthanuthattaphong\/Envato Elements Experts warn that desperate ransomware attackers are shifting focus from businesses to individuals, applying \u201cpsychological pressure\u201d with personal threats that bring digital extortion into the physical world. In one stunning recent example, Guy Segal and Moty Cristal from ransomware negotiator and incident response firm Sygnia said a threat actor personally called an [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoArtesanos Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-19T21:28:05+00:00\" \/>\n<meta name=\"author\" content=\"Sergio Morales\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sergio Morales\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/\",\"name\":\"TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers \u2018Apply Psychological Pressure\u201d - TecnoArtesanos Tech Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure.jpg\",\"datePublished\":\"2025-03-19T21:28:05+00:00\",\"author\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/#primaryimage\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure.jpg\",\"contentUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure.jpg\",\"width\":1400,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.tecnoartesanos.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers \u2018Apply Psychological Pressure\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/\",\"name\":\"TecnoArtesanos Tech Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\",\"name\":\"Sergio Morales\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"caption\":\"Sergio Morales\"},\"sameAs\":[\"https:\/\/sergiomorales.space\"],\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers \u2018Apply Psychological Pressure\u201d - TecnoArtesanos Tech Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/","og_locale":"en_US","og_type":"article","og_title":"TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers \u2018Apply Psychological Pressure\u201d - TecnoArtesanos Tech Blog","og_description":"Image: rthanuthattaphong\/Envato Elements Experts warn that desperate ransomware attackers are shifting focus from businesses to individuals, applying \u201cpsychological pressure\u201d with personal threats that bring digital extortion into the physical world. In one stunning recent example, Guy Segal and Moty Cristal from ransomware negotiator and incident response firm Sygnia said a threat actor personally called an [&hellip;]","og_url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/","og_site_name":"TecnoArtesanos Tech Blog","article_published_time":"2025-03-19T21:28:05+00:00","author":"Sergio Morales","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sergio Morales","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/","url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/","name":"TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers \u2018Apply Psychological Pressure\u201d - TecnoArtesanos Tech Blog","isPartOf":{"@id":"https:\/\/blog.tecnoartesanos.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/#primaryimage"},"image":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure.jpg","datePublished":"2025-03-19T21:28:05+00:00","author":{"@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807"},"breadcrumb":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/#primaryimage","url":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure.jpg","contentUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure.jpg","width":1400,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/19\/techrepublic-exclusive-new-ransomware-attacks-are-getting-more-personal-as-hackers-apply-psychological-pressure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.tecnoartesanos.com\/"},{"@type":"ListItem","position":2,"name":"TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers \u2018Apply Psychological Pressure\u201d"}]},{"@type":"WebSite","@id":"https:\/\/blog.tecnoartesanos.com\/#website","url":"https:\/\/blog.tecnoartesanos.com\/","name":"TecnoArtesanos Tech Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807","name":"Sergio Morales","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","caption":"Sergio Morales"},"sameAs":["https:\/\/sergiomorales.space"],"url":"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/comments?post=461"}],"version-history":[{"count":0,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/461\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media\/462"}],"wp:attachment":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media?parent=461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/categories?post=461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/tags?post=461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}