How Hackers Changed the Media (and the Media Changed Hackers)
This panel discussion explores the evolving relationship between cybercriminals and the media, specifically focusing on how ransomware groups use public exposure as a tactic to pressure victims. The panelists analyze the ethical and operational challenges faced by journalists when reporting on active cyber extortion incidents, including the risk of being manipulated by threat actors. The discussion highlights the tension between the public's need for information and the potential for media coverage to inadvertently empower attackers or compromise ongoing investigations.
When Ransomware Gangs Become Your PR Department
TLDR: Ransomware groups are increasingly weaponizing the media to amplify the pressure of their extortion campaigns. By creating dedicated leak sites and actively soliciting journalists, these groups turn data exfiltration into a public relations nightmare for victims. Security professionals must treat media engagement as a critical component of their incident response plans to avoid being manipulated by these tactics.
Ransomware has evolved far beyond simple file encryption. The modern extortion model is built on public humiliation and brand damage. When a group like BlackMatter or Vice Society exfiltrates sensitive data, they are not just looking for a decryption fee. They are looking for a megaphone. By hosting leak sites that explicitly invite journalists to register and browse stolen data, these groups have effectively turned the media into an unwitting partner in their extortion schemes.
The Mechanics of Public Extortion
The shift from purely technical impact to psychological and reputational warfare is a significant development in the threat landscape. Threat actors now use T1491 Defacement and public data leaks to force a response from victim organizations. The goal is to create a sense of urgency that bypasses traditional security decision-making.
During the panel, it became clear that these groups are not just waiting for the media to find them. They are actively curating their leaks to maximize impact. They understand that a story about a hospital or a school district being breached is more likely to gain traction than a story about a generic enterprise. By naming specific media outlets in their communications, they attempt to dictate the narrative and force the victim into a corner where paying the ransom seems like the only way to stop the public bleeding.
The Journalist's Dilemma
For security researchers and journalists, this creates a massive ethical and operational challenge. When a threat actor reaches out with a "scoop" or a link to a leak site, the temptation to report on it is high. However, reporting on these leaks often serves the attacker's goals. It provides the public exposure they crave and validates their extortion tactics.
The panelists highlighted that the objective of the media is to inform the public, while the objective of the victim organization is to manage the incident and protect their data. These objectives are frequently at odds. A journalist might want to verify the breach by accessing the leak site, but doing so can inadvertently provide the attacker with analytics on who is interested in the data, or worse, expose the journalist to malicious content hosted on the site.
Navigating the Incident Response
For those of us working on the front lines of incident response, this means that our communication strategy is just as important as our technical containment strategy. If you are handling a breach, you must assume that the media will be contacted by the threat actors.
Preparation is the only way to mitigate this risk. You need a communication playbook that addresses:
- Who is authorized to speak to the media?
- What is the company's stance on confirming or denying a breach?
- How do you handle inquiries from journalists who have been contacted by the attackers?
If you are a pentester or a researcher, you should be advising your clients to have these conversations before an incident occurs. When the pressure is on and the data is being leaked, it is too late to start drafting a PR strategy.
The Defensive Reality
Defending against this requires a shift in how we view data exfiltration. We often focus on preventing the initial access or the encryption, but we must also focus on the visibility of our data. If you cannot prevent the exfiltration, you must at least be able to detect it and understand what has been taken.
The OWASP Data Integrity principles are a good starting point for thinking about how to protect the data that matters most. If you know exactly what is in your most sensitive repositories, you can better prepare for the eventuality that it might end up on a public leak site.
Ultimately, the goal of these threat actors is to make you feel powerless. They want you to believe that the only way to control the situation is to pay them. By maintaining a clear, transparent, and proactive communication strategy, you can strip them of their most effective weapon: the ability to control the narrative.
Do not let the attackers be the ones to tell your story. If you are in the middle of an incident, be the first to communicate with your stakeholders. Be honest about what you know and what you do not know. The more you control the flow of information, the less leverage the attackers have. Keep your focus on the technical recovery, but never underestimate the power of a well-managed public response. The next time you are on an engagement, ask your client if they have a plan for when the media calls. If they do not, that is your first finding.
Target Technologies
Attack Techniques
Up Next From This Conference
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Exploiting Shadow Data in AI Models and Embeddings




