A lot of sextortion cases start with a different form of attack, which is catfishing. Most of cases, perpetrators who met online victims try new methods and tricks to ask for more intimate images of the victim and some other sources to obtain more images and sexual interaction. “The problem is that most victims feel embarrassed and ashamed to share it to handle it on their own. This threat happened online mode by a stranger who met online and befriended the victim and once by the romantic partner of the victim to harass the victim. “Sextortion occurs in different forms but mainly, it is the threat to expose private images and explicit videos of the victim, in order to make a person do something. All IT companies have chances to face cyber extortion, as they depend on online modes to generate the work and they use digital tools, online customer management software, or internal application so they are more vulnerable to cyber extortion. Generally, small businesses rely on websites for their sales, and e-commerce, these types of businesses are susceptible to cyber extortion. How can cyber extortion affect my business? A youth was blackmailed as he created his profile account on a dating app and ended up paying 1 lakh extortion money to cyber miscreants and later reported to the police when miscreants demanded more money. In most of the cases, it has been found by the police that the victims are generally trapped by cyber miscreants because of call talk recordings and video call recordings, or social media chats, and women are the miscreants in most of the men victims’ cases. In simple words, cyber extortion is an attack or threat to harm sensitive data or information of a person or to a business with the demand of money payment. These two can result in harm to a business. It mainly occurs in two forms, Ransomware attacks or stealing of sensitive data, and distributed denial of service (DDoS). they blackmail the victims until they meet the demands of hackers. The cybercriminals in cyber extortion hold sensitive data, computer systems, and websites. However, identification and arrest of cyberextortionists are low because they usually operate from countries other than those of their victims and use anonymous accounts and fake e-mail addresses.Cyber extortion is an online crime in which cybercriminals hold the confidential data of a person and then demand money so as to not expose that data to the public. Since majority of business enterprises are using Internet for their business, opportunities for cyberextortionists have exploded. The attacker then demands money for the decryption key. In recent years, cybercriminals have developed ransomware that can be used to encrypt the victim's data. A website, email server or computer system may be subjected to repeated denial of service by malicious attackers, who demand money in return for promising to stop the attacks. Originally, denial of service (DoS) attacks were the most common method used by cyberextortionists. There are various forms of cyberextortion. Cyberextortion is a form of online crime which occurs when a person uses the Internet to demand money or other goods or behavior (such as sex), from another person by threatening to inflict harm to his person, his reputation, or his property.
0 Comments
Leave a Reply. |