cyberextortion

Cyberextortion is a crime involving an attack or threat of attack against an enterprise, coupled with a demand for money to avert or stop the attack.

Cyberextortion is a crime involving an attack or threat of attack against an enterprise, coupled with a demand for money to avert or stop the attack.

Cyberextortion can take many forms. Originally, denial of service (DoS) attacks were the most common method. In recent years, cybercriminals have developed ransomware that can be used to encrypt the victim's data. The attacker then demands money for the decryption key.

As the number of enterprises that rely on the Internet for their business has increased, opportunities for cyberextortionists have exploded. The probability of identification, arrest, and prosecution is low because cyberextortionists usually operate from countries other than those of their victims and use anonymous accounts and fake e-mail addresses.

Cyberextortion can be lucrative, netting attackers millions of dollars annually. A typical attack may result in a demand for thousands of U.S. dollars. Payment does not guarantee that further attacks will not occur, either by the same group of cyberextortionists or by another group.

Through concerted, high tech efforts, a few cyberextortionists have been found, arrested, prosecuted, convicted and sentenced to prison. However, according to some reports, most cyberextortion episodes go unreported because victims don't want the publicity and that, furthermore, the majority of reported episodes don't result in arrests.

This was first published in May 2010

Continue Reading About cyberextortion

Dig deeper on Hacker Tools and Techniques: Underground Sites and Hacking Groups

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close