Close Menu
JustwebworldJustwebworld
  • Astrology
  • Business & Finance
    • Cryptocurrency
    • Make Money
    • Entrepreneur
    • Brands
    • Companies
    • Personal Finance
      • Banking
      • Insurance
      • Trading and Investing
  • Tech
    • Computing
    • Cybersecurity
    • Electronics
    • Android
    • Apple
    • Gadgets
    • Social Media
    • Mobile Apps
    • Softwares
  • Education
    • Vocabulary
    • Abbreviations
    • General Knowledge
    • Writing & Translation
  • Lifestyle
    • Beauty & Cosmetics
    • Fashion & Style
    • Furniture & Decor
    • Luxury
    • People & Relationships
    • Pets and Animals
    • Shopping
    • Parenting
    • Gardening
    • Birthdays
  • Health
  • Travel
  • Auto
  • Gaming
  • Food
  • Entertainment
  • Sports
Facebook X (Twitter) Instagram Pinterest YouTube LinkedIn WhatsApp Telegram
Thursday, March 5
  • About
  • Contact Us
  • Advertise With Us
  • Disclaimer
  • Terms & Conditions
  • Privacy Policy
JustwebworldJustwebworld
  • Astrology
  • Business & Finance
    • Cryptocurrency
    • Make Money
    • Entrepreneur
    • Brands
    • Companies
    • Personal Finance
      • Banking
      • Insurance
      • Trading and Investing
  • Tech
    • Computing
    • Cybersecurity
    • Electronics
    • Android
    • Apple
    • Gadgets
    • Social Media
    • Mobile Apps
    • Softwares
  • Education
    • Vocabulary
    • Abbreviations
    • General Knowledge
    • Writing & Translation
  • Lifestyle
    • Beauty & Cosmetics
    • Fashion & Style
    • Furniture & Decor
    • Luxury
    • People & Relationships
    • Pets and Animals
    • Shopping
    • Parenting
    • Gardening
    • Birthdays
  • Health
  • Travel
  • Auto
  • Gaming
  • Food
  • Entertainment
  • Sports
JustwebworldJustwebworld
Home » Technology » Cybersecurity » Extortion Is An Increasingly Common Cybercrime Tactic

Extortion Is An Increasingly Common Cybercrime Tactic

By Tejas Maheta Cybersecurity
Facebook Twitter LinkedIn Telegram Pinterest Reddit WhatsApp
Follow Us
WhatsApp Telegram

The motivations behind cybercrime vary, yet as with just about every other sphere of life, financial gain is a significant driver. While there will always be those who seek to use cyber attacks purely to cause chaos and disruption, or to otherwise gain access to personally identifiable information (PII), those who use these attacks to try and earn money for themselves remain a significant — and growing — presence.

The big challenge, of course, is how to use a cyber attack to make money. After all, causing damage to a victim of a cyber attack doesn’t automatically benefit the person who causes the harm to begin with. However, there are a few ways a hacker might seek to monetize a cyber attack.

An Increasingly Common Cybercrime Tactic

They could, for example, operate a DDoS-as-a-service that wages DDoS attacks for a price like a mercenary for hire. Alternatively, they might exploit a vulnerability to inject malicious code onto a website to steal payment information.

But perhaps the simplest strategy remains the one that has been used by criminals long before the world went digital: Extortion. Extorting the victims or would-be victims of cyber attacks is the most direct way to monetize a cyber attack.

In some cases, a cybercriminal might try to extort money from a victim after pulling off a successful cyber attack against them. In other cases, they may simply use the threat of an attack — and the target’s knowledge of how harmful this might be — to “persuade” them to cough up cash to avoid being victimized in this way.

Also Read: 6 Ways Your Personal Information Can Get Compromised Without a Warrant 6 Ways Your Personal Information Can Get Compromised Without a Warrant

In either scenario, depending on the type of attack and the target, the attacker could demand anything from tens or hundreds of dollars up to hundreds of thousands or even millions of dollars to call off the threat.

Types of extortion-based attacks you might encounter

There are multiple forms that an extortion-based attack might take. Probably the most famous approach to cyber attack extortion is a ransomware attack. Dating back several decades, although becoming increasingly widespread over the past several years, classic ransomware attacks work by infecting the target with malware.

Once this malware has been installed on a computer or system, it begins encrypting files and data, which can only be decrypted again if the rightful owner pays money for a decryption key. If they fail to do so, their files remain inaccessible.

A recent twist on the ransomware formula is known as a “double extortion” ransomware attack. To pile on extra pressure, in this variation on the ransomware formula, the malware is used both to encrypt files and also exfiltrate data from the system.

Once in the hands of cyber attackers, the threat is that this information will be published online (or, potentially, passed to a third party) if an extra ransom is not paid.

Another increasingly common form of cyber attack extortion involves DDoS. An acronym standing for Distributed Denial of Service, DDoS attacks seek to overwhelm target systems, usually websites or online services, by overwhelming them with massive quantities of fake traffic.

Such attacks can knock out victims for prolonged periods of time, rendering them inaccessible to legitimate customers or users.

Also Read: Listen to Cell Phone Calls Remotely With TheOneSpy Call Spy App Listen to Cell Phone Calls Remotely With TheOneSpy Call Spy App

Because of the financial and reputational damage such an attack may cause, DDoS extortionists know that any threats they make regarding such an assault is likely to be taken seriously. A DDoS extortion attack may sometimes commence with a smaller attack to prove the seriousness of the extortionists.

In other cases, they may not stage an attack at all, but simply state their credentials as serious attackers and note that one will follow if their ransom demands are not met. In some instances, attackers may unleash a full-size attack and only call it off when a payment is made.

Put the right protections in place

One of the main pieces of advice made about extortion-based cyber attacks is that targets should not pay them. Not only does doing so encourage the perpetuation of such attacks, but it can also make targets likely to be repeat victims since attackers might assume that a person who pays out once will do so again in the future.

There is also no guarantee that attackers will live up to their side of the bargain — whether that’s providing an encryption key or deleting exfiltrated information and not publishing it online.

Nonetheless, in some scenarios victims will be willing to pay out money to extortionists, which is, of course, why such attacks continue.

In what may well be the largest-ever ransomware payment, in July 2020 the U.S. travel services company CWT Global paid more than $4.5 million in bitcoin to stop an attack which had, among other things, compromised upward of two terabytes of data — including employee personal data, security documentation, and financial records.

Also Read: Why Application Security Testing Should Be Your Top Priority Why Application Security Testing Should Be Your Top Priority

Organizations not wanting to be put in the position of paying for extortion-based attacks should ensure they have the proper precautions in place.

DDoS prevention systems, closing ransomware infection vectors, and other steps are crucial to offer proper safeguards against these attacks. Tools such as Web Application Firewalls (WAFs), which can monitor for suspicious behavior and block it before it can become a potentially damaging cyber attack, are also a game-changer.

Establish the right cyber security measures and you shouldn’t have to worry about the potential of an extortion-based attack. That means you can earmark your hard-earned money for something far more important — like growing your business.

cards
Powered by paypal
Follow on WhatsApp Follow on Telegram
Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram WhatsApp Copy Link
Previous ArticleThe Greatest Hacks On How to Become An Awesome Essay Writer
Next Article Some Convincing Reasons To Invest Money In Ethereum And BTC!
Tejas Maheta

Hi, I'm Tejas Maheta. A blogger & Internet marketer from India.

Related Posts

Why Privacy Is Becoming a Luxury in 2026: The Shocking Reality of Digital Surveillance

FAQs Cloud-Based Businesses Have About DSPM

Future-Proofing Your Content: The Indispensable Role of Video DRM

Why Renting A Phone Number Is the Smart Way to Receive SMS Safely

How Safe Is Your Data? A Real Look Into Everyday Privacy

9300120111410471677883 USPS Package Scam Explained

Leave A Reply

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 43K other subscribers
Categories
Latest Posts

What Happens When Bills Fall Behind for Several Months

How to Choose the Best Electric Scooter in India for 2026

Navigate the world of used cars: How BidCars ensures privacy

Why People Fear Automation | AI Job Loss, Robots Replacing Jobs & The Future of Work Explained

Why Data Is More Valuable Than Money | The Secret Asset Behind Billion-Dollar Tech Companies

Why Smart Shopping Starts With the Right Savings Platform

7 Things to Consider When Buying a Used Truck

A Beginner’s Guide On How To Choose The Right Solar Inverter For Your Home

Building a Budget That Actually Works

3 Birkenstock Sandals to Pack for You and Your Partner’s Next Weekend Escape

The content on this website is provided solely for educational and informational purposes. We do not promote, endorse, or deal in any products, services, or activities mentioned. While we strive to share accurate and up-to-date information, we make no warranties regarding completeness, reliability, or accuracy. Any action you take based on the information found here is strictly at your own risk, and we will not be liable for any losses or damages in connection with the use of our website.

DMCA.com Protection Status
Quick Links
Age Calculator
Angel Number Calculator
Case Converter
Sudoku Online
Word Counter
Love Calculator
Jack Doherty YouTuber
Snake Dream Meaning
Get Rid of Cockroaches
Indian Cricket Team Coaches
Best Volleyball Team Names
Useful Links
Number to Words
Period Calculator
Yes-No Picker Wheel
Demon Name Generator
Kingdom Name Generator
Harry Potter Name Generator
Daddy Yankee Biography
Crocodile Dream Meaning
Goa Budget Trip Guide
Maryse Mizanin WWE Diva
Best Cricket Team Names
Helpful Resources
Colors Name In English
Best Computer Brands
WhatsApp Web
Most Beautiful Beaches
Tesla Cybertruck Review
Richest Actors in the World
India Jarvis Actress
Cat Dream Meaning
Belmar Beach New Jersey
Aryna Sabalenka Tennis Superstar
Best WhatsApp Group Names
Explore More
Good Morning Handsome
Best English Songs of All Time
Cricket World Cup Winners
Ways to Say Rest In Peace
Britain’s Got Talent Winners
American Idol Winners
Dude Perfect Net Worth
Horse Dream Meaning
Ramakrishna Beach Visakhapatnam
Anastasia Potapova Tennis Star
Best Funny Team Names
Facebook X (Twitter) Instagram Pinterest YouTube Tumblr LinkedIn WhatsApp Telegram Threads RSS
  • About
  • Contact Us
  • Advertise With Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
  • Web Stories
Copyright © 2012-2026. JustWebWorld - All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.

×

👇 Bonus Reads for You 🎁

Understanding Your Attack Surface
Understanding Your Attack Surface and Managing Your Risk
Different Types of Data Backup
The Different Types of Data Backup
Benefits of Cloud Solutions for Businesses
The Benefits of Cloud Solutions for Businesses
Ways To Enhance Your Data Security
Fool-Proof Ways To Enhance Your Data Security