Extortion Online in The 21st Century

By: Sameer Somal |  August 8, 2024

  1. Cyber extortion is a rising cybercrime involving illegal access to sensitive data for financial gain.
  2. Encompassing cyberthreats, ransomware attacks, DDoS assault are aimed at coercing victims into paying ransoms.
  3. Impacts include financial losses, reputational damage, and operational risks.
  4. Mitigating measures include strong authentication, firewall updates, and strict adherence to global cybersecurity laws.
  5. Cultivating a vigilant culture is essential for defending against evolving cyber threats and protecting business integrity.

In the ever-evolving landscape of cyber crimes, especially, extortion online has become relentlessly casual. The spectrum of cybercrimes, encompassing a diverse array of illicit activities, has escalated to increasingly severe and unlawful extremes. Extortion online, more commonly known as “Cyber Extortion” occurs when a hacker illegally accesses an organization’s confidential data. Such data is illegally procured by a hacker to magnify their agenda further. The demand of coercing money from you in return for the stolen sensitive information is what the prime agenda is. However, some attackers do not follow through on their promise of letting you relinquish the stolen information. Thus, an organization may pay the extortionist but not get the expected results.

The Relevance of Extortion Online in the Digital Era

The avowed history of cybercrime began in 1962, when Allen Scherr launched a cyber attack. Such an attack was statistically planned against the Massachusetts Institute of Technology (MIT) computer networks. The root of the crime arose from stealing passwords from MIT’s database via punch card. That is when the digital world hit the “groundbreaking” initiation of how cybercrimes came into existence.

hackers-with-laptops-sitting-in-dark
Image credits: Pexels

In the world of prima donna individuals, the practice of performing a cybercrime has become relatively common. Cyber extortion is an illegal misconduct practiced by an individual who holds crucial data in his possession. The person who does this digital crime is known as a “cyber extortionist”. In every case of extortion online, the health of the victim takes an adverse turn when posed with such a situation. As a result, nowadays, it can be understood that cyber extortion is one of the most cruel forms of cybercrime.

Common Types of Cyber Extortion

Ransomware Attacks (Digital Hostage-Taking)

Extortion-Online
Image credits: Pexels

Ransomware is a type of digital malware that is designed to deny a user access to files on a computer. Through the encryption of files, a hacker would demand a ransom payment for the description key. Then, cyberattackers would place the organization in a critically placed position jeopardizing the confidential data. The last resort to regain access to the stolen files would be paying the ransom which would be prominent.

Denial-of-Service (DDoS) Attacks (Internet Traffic Jam)

A denial-of-service (DDoS) attack is one such attack initiated by a cyberattacker used to steal personally identifiable information (PII). Moreover, such information is ascertained combined with other data where it could be an identification (I.D.) of the user. Ordinarily, cyberattackers can use DOS, a form of attack by putting a great deal of traffic on the victim’s server. Such a DOS can last for months, causing the distributed system to ultimately crash. Such information extorted by the attacker could be misused to further expose the victim and meld with greater threats.

Email Extortion (Digital Blackmail)

Extortion online prominently operates via email, wherein the attacker sends a message containing the sensitive information of the victim. For such an operative cyber extortion, the personal or sensitive information has to be of high value to the individual. Following the cyber act, the extortionist demands the ransom to be paid by the victim. Additionally, the attacker threatens to release the victim’s personal information to the public domain if not met with the ransom demand.

Unleash the Vast Potential of Our Experts!

Book your consultancy session at Blue Ocean Global Technology today!

The Impact of Extortion Online

The Individual Impact

The soaring impact of extortion online has resulted in the implications of an individual’s scrutiny. From understanding the motivation behind cyber attacks, an attacker poses a threat to an individual’s:

    1. social,
    2. mental, and
    3. emotional health.

The agenda of these cyber extortionists can range on a spectrum of personal motivations to causing malicious harm to victims. It ranges from victimizing someone by misusing their identification (I.D.) for personal gain to targeting financial components.

The Business Impact

With the ever-growing legal implications of business scrutiny, financial losses, reputational damages, and operational disruptions are common outcomes. The regulatory consequences of such a cyber attack on an organization can be termed as the potential for financial gain. Furthermore, the anonymous nature of these cyber extortionists has reached a level that can cause harm to the registered investors. Given that a firm, legally, is its entity, yet, the harm can be multiplied with respect to the parties involved.

woman-with-text-projected-on-her-face-Extortion-Online
Image credits: Pexels

Responding to Cyber Extortion

Defending the risks against rising tide of extortion online demands a business to prioritize cyber security by taking proactive measures. It is imperative to understand that a cyber attack not only jeopardizes public’s safety but also national and economic security. Thus, being aware of the country-specific laws against cyber crimes is as vital as putting up cybersecurity measures. Furthermore, certain active steps to mitigate the risks of extortion online are listed below:

Robust Credentials

Individuals and businesses must use a spectrum of cyber security measures to protect their databases. Such preventive measures can be targeted from various unprotected sources, for instance, spyware or malware. Thus, using a strong password for the credentials login can be one way to protect yourself from being extorted.

man-in-gray-suit-taking-down-notes
Image credits: Pexels

Double-Authentication Access

Having control access to data and systems can ensure authorized control by the designated user, for instance;

  1. controlling access to physical premises of the computer networks,
  2. restricting access to unauthorized users,
  3. limiting access to data and applications through controls,
  4. restrict what can be copied and saved to storage devices,
  5. limit sending and receiving of certain types of email attachments, et cetera.

Firewall Extension

Firewalls are effectively gatekeepers between your computer and the internet. Such acts as a barrier to prevent the malicious spread of threats such as viruses and malware. It’s vital to regularly update the software of the installed firewall for potential and maximal utilization ensuring server security. One of the most common firewall configuration set-ups is to add global rules filtering incoming traffic for protocols other than:

  1. Transmission Control Protocol (TCP) and
  2. User Datagram Protocol (UDP).
a-man-and-a-woman-with-prosthetic-arms-shaking-hands Extortion Online in The 21st Century
Image credits: Pexels

Conclusion

The rise in extortion online this century has heightened awareness of mitigating risks and avoiding the scrutiny of vulnerabilities. In the sophisticated and complex dynamic of the business, a variety of cyber security solutions can mitigate cyber risks. Having cyber protection in all horizons in an organization towards its assets and employees is critical to the business world. As we navigate the perilous landscape bolstering cybersecurity and fostering a culture of vigilance has become paramount.

Frequently Asked Questions

1. How do cyber extortionists usually operate?

Cyber extortionists take advantage of various methods such as ransomware attacks, DDoS assaults, and email extortion to expose confidential data. Leveraging technological tactics is how coercing a victim into paying a ransom has become a trend in the cybercrime era.

2. What legal implications are involved in cyber extortion cases?

Ordinarily, cyber extortion is illegal in most jurisdictions. Victims must be aware of the country-vide law enforcement agencies and methods to investigate the incident. Furthermore, the prosecution of these cyber extortionists in compliance with the legal requirements is crucial throughout the process.

Elevate Your Case with Our Personal & Insurance Claim Expert Witness Services!

Contact our global team today to get the assistance you need to help mitigate any cyber threats.

Published by Sameer Somal

Sameer Somal is the CEO of Blue Ocean Global Technology and Co-Founder of Girl Power Talk. He is a CFA Charterholder, a CFP®️ professional, and a Chartered Alternative Investment Analyst. Sameer leads client engagements focused on digital transformation, risk management, and technology development. A testifying subject matter expert witness in economic damages, intellectual property, and internet defamation, he authors CLE programs with the Philadelphia Bar Foundation. Sameer is a frequent speaker at private industry and public sector conferences, including engagements with the Federal Home Loan Bank (FHLB), Global Digital Marketing Summit, IBM, New York State Bar Association (NYBSA), US Defense Leadership Forum, and US State Department’s Foreign Service Institute. He proudly serves on the Board of Directors of Future Business Leaders of America (FBLA) and Girl Power USA. Committed to building relationships, Sameer is an active member of the Abraham Lincoln Association (ALA), Academy of Legal Studies in Business (ALSB), American Bar Association (ABA), American Marketing Association (AMA), Business Transition Council, International Trademark Association (INTA), and Society of International Business Fellows (SIBF). A graduate of Georgetown University, he held leadership roles at Bank of America, Morgan Stanley, and Scotiabank. Sameer is also a CFA Institute 2022 Inspirational Leader Award recipient and was named an Iconic Leader by the Women Economic Forum.

3 replies on “Extortion Online in The 21st Century”

Comments are closed.

Sameer Somal
Sameer Somal, CFA, CFP®, CAIA

We Listen. We Evaluate.
We Provide Solution.

Our professionals carefully construct a strategy as per your goals. It is individually structured catering to all your needs. Our motto is to personalize your experience and journey of establishing your brand!