Denial of support: the attacker exhausts the assets needed to offer companies to legit end users. Thus, They are going to be far more suspicious of spearphishing strategies. Observe that not all tactics could be mitigated. attacks, demanding a second ransom to forestall sharing or publication of the victims info. https://ieeexplore.ieee.org/document/9941250