Ransomware as a service (RAAS)
This allows someone with only a small amount of computing knowledge to pay a price and use a tool to penetrate, copy, encrypt and negotiate with you, about your files.
Data leak extortion
With the possibility of serious fines for the non-disclosure of attacks, hackers can then threaten to reveal your information, regardless of whether a ransom has been paid or not.
Stolen Data Auctions
If one of these other attempts fails to work, attackers auction off the data they have stolen from your company files to any number of interested parties.