tl/dr: Data exfiltration here means the process of copying data from the victim to the attacker, which generates a lot of network
traffic and may therefore be noticed before the encryption/attack is
finished. Moreover, publishing stolen data is not quite as simple as
it seems, because it is most effective when done "publicly", and in
that case legal channels may be used to stop an attacker from doing it
effectively.
It's easy to misunderstand what is meant by "data exfiltration" here. So to be clear, when this article talks about data exfiltration they aren't talking about releasing data publicly. Rather, they are talking about the simple act of copying data off of the infected systems and onto a system controlled by the attacker. Consider a typical "lifecycle" of a ransomware infection:
Standard Ransomware
- Ransomware is downloaded/executed somehow
- Ransomware begins encrypting files locally
- Ransomware (theoretically) sends encryption keys back to C&C servers so the files can be unecrypted after payment
All-in-all this is a pretty "low profile" attack, and antivirus and other anti-malware solutions have adapted to try to catch such things early on before they encrypt everything. This is typically done by noting sudden and large spikes in disk usage, which are a sign of ransomware doing its thing (and also a sign of many other typical computer tasks, which can make detection a bit tricky). Sending the keys to a C&C server takes up effectively zero network traffic, so detecting that is virtually impossible.
Blackmail ransomware
Compare that to the lifecycle of a ransomware attack in which the attacker wants to hold data hostage to be released later:
- Ransomware is downloaded/executed somehow
- Ransomware begins encrypting files locally
- Ransomware sends the encryption key to C&C servers
- Ransomware begins sending unencrypted copies of all files to the C&C Servers
The big difference is step #4, aka data exfiltration. The important thing here is that this is very noisy. Now not only does the attacker have to worry about local antivirus/antimalware systems noticing the attack in progress, but they also run the risk of being detected at the network level. For a home user that doesn't even use an antivirus program (aka an easy target), their ISP may instead notice, start blocking traffic, and perhaps try to notify the user. In a corporate environment it is even worse: even if policies on the individual machines are lax, there may be network level logging and alerts which may notice the increase of traffic, bring it to someone's attention, and shut the whole thing down before much encryption has happened.
In essence, like any thief, ransomware will be the most successful when it has plenty of time to do its thing before getting detected. Trying to extract the data as you encrypt it is very "loud", and increases the risk of detection for the attacker.
It's like the difference between someone silently trying to steal the TV from your living room while everyone is asleep, versus someone who lights the kitchen on fire so they can steal the phones and laptops out of the bedrooms.
Publishing data
You also asked, in essence, why someone who has stolen data wouldn't publish it if their ransom isn't paid? That's tricky. Of course an attacker may very well do exactly that. However it isn't always that simple. There are a number of complicating factors:
- Due to the above, they may have chosen to limit the amount of data they stole, and therefore may know that they don't have anything worth publishing.
- The advantage of the classic ransomware attack is that, with the use of Bitcoin, it can be completely anonymous. Staying anonymous gets much trickier when you have to publicly publish your victims data.
- Actually publishing the data may itself be tricky to do well. Such data would obviously be published in violation of copyright, so the victim may be able to use legal channels to have the data taken down (which has actually happened). The attacker could publish it in the "dark" web or somewhere that is harder for legality to matter, but then it may not have the same impact to the victim's business (depending on the nature of the secrets).
All this to say that this whole "we'll publish your data if you don't pay up" situation is not quite as simple for the attacker as it seems. That's not to say it is safe to ignore such threats, but I think it may still be a bit unclear if this new take on ransomware will have much more success than the original kind.