×

Register to Continue Reading

First Name
Last Name
Job Title
Company
Country
State
Thank you!
Error - something went wrong!
   

A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

Not long ago, online extortion typically involved blackmailers sending threatening emails to their victims, promising to leak compromising information. Other extortionists tried warning victims of an impending cyber attack, such as a denial of service (DoS) attempt if ransom demands were not met. In the early 2010s, ransomware emerged as a viable method of coercion, culminating in the 2017 “WannaCry” attack that crippled business operations in over 100 countries.

Although these techniques are still popular, Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been. Specifically, cybercriminals recognize they can monetize elements of our online exposure for extortion-based activity, including exploiting compromised credentials, sensitive documents and intellectual property, and technical vulnerabilities. 

In this new research piece, the team explores:

  • How attackers such as sextortionists, thedarkoverlord and the SamSam group use our online exposure to perform extortion campaigns
  • How a growing market for network accesses, stolen documents, and extortion guides on gated, dark web sites has emboldened novice extortionists
  • What practical mitigation advice business leaders and network defenders can implement to manage their digital footprints and reduce extortion risks
Previous Report
How One Large Bank Detected More Than 50,000 Exposed Credentials in 1 Year | Case Study
How One Large Bank Detected More Than 50,000 Exposed Credentials in 1 Year | Case Study

See how one large bank detected more than 50,000 exposed credentials in 1 year.

Next Post
Dark Web Typosquatting: Scammers v. Tor
Dark Web Typosquatting: Scammers v. Tor

Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business worl...

×

Threat Intel Fan?

Sign up below to get our TI updates delivered to your inbox!

First Name
Last Name
Company
Country
State- optional
Job Title
Thank you!
Error - something went wrong!