I hate to give the opposition ideas, ...
... the next step is to add analytics so that they "know" the relative values of the files encrypted under each key. In the beginning, that would likely involve traffic back and forth from the command and control server(s).
Later, on-site with very little traffic required at all.