When dealing with ransomware, there is no way to know for sure if the cyber-criminals actually steal any of the data, sensitive information or passwords for further criminal activity. In most cases, rather than the content of your data, the criminals are more interested in obtaining a ransom payment for financial gain. These criminals are in business to make money and make it fast, then move on to the next victim. Although some criminals may threaten to release (publish/leak) information if victims do not pay, uploading someone's data for such nefarious purposes is time consuming and could possibly leave a trail for law enforcement authorities to follow.
Nevertheless, there has been an increasing number of malware developers who are stealing files before encrypting them. If the criminals determine the stolen data is sensitive or very valuable, they demand a higher ransom payment and/or threaten to release (publish/leak) the data if a victim does not pay. According to the BlackBerry Research and Intelligence Team, there has been a distinct shift from widespread, indiscriminate distribution to highly targeted campaigns against large corporate, business and governmental agency networks which have enabled the criminals to demand higher ransom payments and threats to publish stolen data.
Another alarming trend involves the exfiltration of data prior to, or during, the ransomware encryption process, enabling attackers to blackmail victims with the threat of sensitive data leakage should they fail to pay in a timely manner...researchers learned that within this group, all of the targeted users who opted not to pay out subsequently had their data released by the threat actors in some way...
Some criminals incorporate a technique whereby the ransomware gets executed days after initial infiltration which allows them to delay encryption and use the extra time to harvest victims' data. Thereafter, the criminals use the stolen data as additional leverage to make victims pay the ransom under the threat of leaking the stolen information. With these increasing threats to leak and publish stolen data, malware developers are demanding a second ransom not to publish stolen files and actually creating sites to leak stolen data.
Even if victims pay the ransom demands, some attackers are following through on extortion threats after the ransom has been paid.