Close Menu
JustWebWorldJustWebWorld
  • Astrology
  • Business & Finance
    • Cryptocurrency
    • Make Money
    • Entrepreneur
    • Brands
    • Companies
    • Personal Finance
      • Banking
      • Insurance
      • Trading and Investing
  • Tech
    • Computing
    • Cybersecurity
    • Electronics
    • Android
    • Apple
    • Gadgets
    • Social Media
    • Mobile Apps
    • Softwares
  • Education
    • Vocabulary
    • Abbreviations
    • General Knowledge
    • Writing & Translation
  • Lifestyle
    • Beauty & Cosmetics
    • Fashion & Style
    • Furniture & Decor
    • Luxury
    • People & Relationships
    • Pets and Animals
    • Shopping
    • Parenting
    • Gardening
    • Birthdays
  • Health
  • Travel
  • Auto
  • Gaming
  • Food
  • Entertainment
  • Sports
Facebook X (Twitter) Instagram
Friday, May 16
  • About
  • Contact Us
  • Advertise With Us
  • Disclaimer
  • Terms & Conditions
  • Privacy Policy
JustWebWorldJustWebWorld
  • Astrology
  • Business & Finance
    • Cryptocurrency
    • Make Money
    • Entrepreneur
    • Brands
    • Companies
    • Personal Finance
      • Banking
      • Insurance
      • Trading and Investing
  • Tech
    • Computing
    • Cybersecurity
    • Electronics
    • Android
    • Apple
    • Gadgets
    • Social Media
    • Mobile Apps
    • Softwares
  • Education
    • Vocabulary
    • Abbreviations
    • General Knowledge
    • Writing & Translation
  • Lifestyle
    • Beauty & Cosmetics
    • Fashion & Style
    • Furniture & Decor
    • Luxury
    • People & Relationships
    • Pets and Animals
    • Shopping
    • Parenting
    • Gardening
    • Birthdays
  • Health
  • Travel
  • Auto
  • Gaming
  • Food
  • Entertainment
  • Sports
JustWebWorldJustWebWorld
Home » Technology » Cybersecurity

Extortion Is An Increasingly Common Cybercrime Tactic

Tejas MahetaBy Tejas Maheta Cybersecurity
Facebook Twitter LinkedIn Telegram Pinterest Reddit Email WhatsApp
Follow Us
WhatsApp Telegram
Share
Facebook Twitter LinkedIn Pinterest Reddit Telegram WhatsApp

The motivations behind cybercrime vary, yet as with just about every other sphere of life, financial gain is a significant driver. While there will always be those who seek to use cyber attacks purely to cause chaos and disruption, or to otherwise gain access to personally identifiable information (PII), those who use these attacks to try and earn money for themselves remain a significant — and growing — presence.

The big challenge, of course, is how to use a cyber attack to make money. After all, causing damage to a victim of a cyber attack doesn’t automatically benefit the person who causes the harm to begin with. However, there are a few ways a hacker might seek to monetize a cyber attack.

An Increasingly Common Cybercrime Tactic

They could, for example, operate a DDoS-as-a-service that wages DDoS attacks for a price like a mercenary for hire. Alternatively, they might exploit a vulnerability to inject malicious code onto a website to steal payment information.

But perhaps the simplest strategy remains the one that has been used by criminals long before the world went digital: Extortion. Extorting the victims or would-be victims of cyber attacks is the most direct way to monetize a cyber attack.

In some cases, a cybercriminal might try to extort money from a victim after pulling off a successful cyber attack against them. In other cases, they may simply use the threat of an attack — and the target’s knowledge of how harmful this might be — to “persuade” them to cough up cash to avoid being victimized in this way.

Also Read: How to Hide Your Online Identity How to Hide Your Online Identity

In either scenario, depending on the type of attack and the target, the attacker could demand anything from tens or hundreds of dollars up to hundreds of thousands or even millions of dollars to call off the threat.

Types of extortion-based attacks you might encounter

There are multiple forms that an extortion-based attack might take. Probably the most famous approach to cyber attack extortion is a ransomware attack. Dating back several decades, although becoming increasingly widespread over the past several years, classic ransomware attacks work by infecting the target with malware.

Once this malware has been installed on a computer or system, it begins encrypting files and data, which can only be decrypted again if the rightful owner pays money for a decryption key. If they fail to do so, their files remain inaccessible.

A recent twist on the ransomware formula is known as a “double extortion” ransomware attack. To pile on extra pressure, in this variation on the ransomware formula, the malware is used both to encrypt files and also exfiltrate data from the system.

Once in the hands of cyber attackers, the threat is that this information will be published online (or, potentially, passed to a third party) if an extra ransom is not paid.

Another increasingly common form of cyber attack extortion involves DDoS. An acronym standing for Distributed Denial of Service, DDoS attacks seek to overwhelm target systems, usually websites or online services, by overwhelming them with massive quantities of fake traffic.

Such attacks can knock out victims for prolonged periods of time, rendering them inaccessible to legitimate customers or users.

Also Read: How to Guarantee Your Security and Privacy In the Age of IoT? How to Guarantee Your Security and Privacy In the Age of IoT?

Because of the financial and reputational damage such an attack may cause, DDoS extortionists know that any threats they make regarding such an assault is likely to be taken seriously. A DDoS extortion attack may sometimes commence with a smaller attack to prove the seriousness of the extortionists.

In other cases, they may not stage an attack at all, but simply state their credentials as serious attackers and note that one will follow if their ransom demands are not met. In some instances, attackers may unleash a full-size attack and only call it off when a payment is made.

Put the right protections in place

One of the main pieces of advice made about extortion-based cyber attacks is that targets should not pay them. Not only does doing so encourage the perpetuation of such attacks, but it can also make targets likely to be repeat victims since attackers might assume that a person who pays out once will do so again in the future.

There is also no guarantee that attackers will live up to their side of the bargain — whether that’s providing an encryption key or deleting exfiltrated information and not publishing it online.

Nonetheless, in some scenarios victims will be willing to pay out money to extortionists, which is, of course, why such attacks continue.

In what may well be the largest-ever ransomware payment, in July 2020 the U.S. travel services company CWT Global paid more than $4.5 million in bitcoin to stop an attack which had, among other things, compromised upward of two terabytes of data — including employee personal data, security documentation, and financial records.

Also Read: The Best Internet Security Suites and Software for 2020 The Best Internet Security Suites and Software for 2020

Organizations not wanting to be put in the position of paying for extortion-based attacks should ensure they have the proper precautions in place.

DDoS prevention systems, closing ransomware infection vectors, and other steps are crucial to offer proper safeguards against these attacks. Tools such as Web Application Firewalls (WAFs), which can monitor for suspicious behavior and block it before it can become a potentially damaging cyber attack, are also a game-changer.

Establish the right cyber security measures and you shouldn’t have to worry about the potential of an extortion-based attack. That means you can earmark your hard-earned money for something far more important — like growing your business.

Follow on WhatsApp Follow on Telegram
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram WhatsApp Copy Link
Previous ArticleThe Greatest Hacks On How to Become An Awesome Essay Writer
Next Article Some Convincing Reasons To Invest Money In Ethereum And BTC!
Tejas Maheta

Hi, I'm Tejas Maheta. A blogger & Internet marketer from India.

Related Posts

9300120111410471677883 USPS Package Scam Explained

The Future of Data Security: How to Protect Your Business Information

Understanding and Preventing Lateral Movement In Cyber Attacks

Safe Online Shopping: What to Look Out For

Why Trust Badges are Important for Ecommerce

Why Application Security Testing Should Be Your Top Priority

Leave A Reply

Categories
Translate
Archives

Luke Kornet Full Player Profile | Age, Height, Net Worth, Career Stats 2025

Who Is Brent Faiyaz? Age, Songs, Albums, Net Worth & Tour 2025

FaZe Rug Net Worth, Age, Girlfriend, House & Career | Must Read

Happy Father’s Day Wishes & Quotes | Heartfelt Messages, Sayings & Captions for Dad 2025

Why Stewart Vickers Is the Best SEO Expert in the World

Diljit Dosanjh : Latest Songs, Movies, Net Worth, Concerts & Full Biography

Katie Ledecky: Olympic Gold Queen | Records, Career, Net Worth & More!

Best New Clinic Opening Wishes | Heartfelt Messages, Quotes & Blessings to Celebrate Success

Brixton Cromwell 1200 Review 2025 | Price, Specs, Mileage & Top Speed Revealed!

Inverter Batteries 101: Understanding Types, Features And Performance For Your Needs

DMCA.com Protection Status
Quick Links
Age Calculator
Angel Number Calculator
Case Converter
Sudoku Online
Word Counter
Love Calculator
Useful Links
Number to Words
Period Calculator
Yes-No Picker Wheel
Demon Name Generator
Kingdom Name Generator
Harry Potter Name Generator
Helpful Resources
Colors Name In English
Best Computer Brands
WhatsApp Web
Most Beautiful Beaches
Tesla Cybertruck Review
Richest Actors in the World
Explore More
Good Morning Handsome
Best English Songs of All Time
Cricket World Cup Winners
Ways to Say Rest In Peace
Britain’s Got Talent Winners
American Idol Winners
Facebook X (Twitter) Instagram Pinterest YouTube Tumblr LinkedIn WhatsApp Telegram Threads RSS
  • About
  • Contact Us
  • Advertise With Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
  • Web Stories
Copyright © 2012-2025. JustWebWorld - All Rights Reserved. | Sitemap

Type above and press Enter to search. Press Esc to cancel.

×

👇 Bonus Reads for You 🎁

Security of Online Sports Betting Sportsbook
The Security of Online Sports Betting Sportsbook In New Jersey
What Is Spyware
What Is Spyware, And How Can You Protect Yourself From It?
Petrochemical Industries
Safety Measures At Petrochemical Industries
Tips to Protect Your Business and Secure Its Data
4 Must-Follow Tips to Secure Your Business Online