
Cyber extortion is a crime involving an attack or threat of an attack, coupled with a demand for money or some other response, in return for stopping an attack or preventing one from happening.
Cyber extortion attacks involve gaining access to an organization's systems and identifying points of weakness or valuable targets. Two of the most common variants of cyber extortion areransomware and distributed denial-of-service (DDoS) attacks.
During a ransomware attack,cybercriminals demand payment through malicious activity. They might also use a DDoS attack to make a service unavailable or use othermalware to steal sensitive corporate information and threaten to make it public. The victims are then left in the precarious position of whether to give in to the demands of the threat actors.
Cyber extortion can cause significant financial and reputational damage to individuals and organizations of all sizes.
Cyber extortion occurs when the attacker gains access to sensitive data on a victim's computer network or system through methods such as ad scams,phishing emails, infected websites and other techniques. The attacker might not be directly responsible for executing the attack. They can alsouse ransomware as a service or cybercrime as a service, where they hire skilled cyberattackers to perform the task on their behalf.
The type of attack used and how it is executed will differ depending on the goals of the attacker and the potential vulnerabilities of the victim. For example, in a DDoS attack, the cybercriminal typically threatens to carry out an attack if payment is not made. The attack process might start with thethreat actor making an initial ransom demand and using a botnet to carry out a small-scale DDoS attack. Often, if the ransom is not paid, this will escalate into a large-scale DDoS attack. The threat is suspended once the victim pays the attacker, but if the ransom is not paid, the DDoS attack continues.
In a ransomware attack, a blackmailer encrypts the victim's files and offers to decrypt them only after payment is made, usually in the form ofcryptocurrencies such asbitcoin. Ransomware attacks can be automated through malware distributed in emails, infected websites or ad networks. These attacks tend to spread indiscriminately, creating networks of infected computers. However, they can result in only a small percentage of victims paying the cyber extortionists. More targeted attacks can produce less collateral damage but provide more lucrative targets for the extortion attempt. Ransomware attacks can also leave an organization open to follow-up attacks throughdouble extortion ortriple extortion ransomware strategies.
Cyber extortion can happen to individuals and businesses alike, but small businesses are more likely to be targeted. While larger businesses might still be targeted for bigger potential payouts or because they are a target for nation-state reasons, they also typically have more resources they can dedicate to effective cybersecurity practices.
Smaller organizations commonly have fewer resources to implement effective cybersecurity practices, meaning they are like 'low-hanging fruit' to threat actors. Even though the payout might be less for smaller organizations, they might feel more pressure to pay the ransom, as the attack can be more crippling for them than for larger organizations. Smaller organizations might also be a gateway to access any connected larger organization.
While cyber extortion and ransomware are related concepts, they are not the same.
Cyber extortion is a broader term that refers to the different techniques cybercriminals use to force victims to comply with their demands. It entails threatening or blackmailing individuals, businesses or organizations to obtain money or other valuable assets.
Ransomware is a specific type of cyber extortion that uses malicious software to encrypt a victim's files or lock them out of their systems. After encrypting the victim's files, the attacker demands a ransom in return for releasing the decryption key or regaining access to the infected systems. During a ransomware attack, the victim is frequently given instructions on how to pay the ransom and restore access to their data.
Today, businesses are being hit by the followingtypes of cyber extortion and cyberthreats:
According to a 2024 blog post that summarized the "Flashpoint 2024 Global Threat Intelligence Report," threat actors can employ the following techniques to pressure victims into compliance:
Companies victimized by cyber extortion schemes suffer the effects of data breaches and loss of sensitive information. These can include damage to their reputation, lost customers and lost revenue. For example, if customers cannot access their preferred websites, they will likely move on to other companies that offer the same or similar products or services. In addition, hackers will use the threat of making a victim's trade secrets or intellectual property public or selling it to rival companies. That tactic is the motivation for a victim company to pay the ransom.
Cyber extortion attacks continue to threaten businesses of all sizes across the world. Some effects of recent cyber extortion events include the following:
According to British cybersecurity company Sophos' "State of Ransomware 2024" report, 59% of organizations were affected by ransomware in 2023, and the average ransom payment increased from $400,000 in 2023 to $2 million in 2024.
For example, in 2023, LockBit ransomware caused serious problems for several well-known companies. Among those affected was a prominent dental insurance provider that exposed the sensitive information of approximately 9 million patients throughout the U.S. Additionally, a water utility in Portugal and the esteemed Royal Mail of the U.K. encountered substantial service disruptions because of LockBit attacks.
Customers whose data is made public as the result of a cyber extortion exploit or other type of data breach might be able to recover damages from the company. Under theGramm-Leach-Bliley Act andHealth Insurance Portability and Accountability Act, financial and healthcare companies can be held liable for such disclosures, incurring hefty government fines.
Cyber extortionists might also have access to a victim's private information, such as personal photos or videos. These cyber attackers can demand payment to prevent them from sharing that information with contacts in the victim's email or social media accounts.
Cyber extortionists are constantly searching for new vulnerabilities to exploit and new ways to threaten victims. Consequently, companies must be vigilant in their efforts to combat these exploits.
To reduce the risk of becoming a victim of cybercrime, organizations must enforce strong cyberdefenses. Best practices to reduce the risk of cyber extortion include the following:
The Financial Crimes Enforcement Network, a bureau of the U.S. Department of the Treasury, has identified multiplered flag indicators of ransomware related to illicit activity in the financial industry. The organization alerts financial institutions to situations that can help them detect suspicious transactions and prevent incidents.
In addition to the 2017 cyber extortion attacks against Netflix and HBO, there are other notable cases.
In 2015, a hacktivist group calling itself The Impact Team attacked Ashley Madison, a hookup site for people who are married or in relationships. The attackers said they compromised the company's database, which held the personally identifiable information of 37 million users. Rather than asking for money, the group threatened to release the information if the company's owners, Avid Life Media (ALM), didn't take down two of its dating websites as punishment for defrauding its customers. The hackers claimed ALM did not remove the personal information of some customers, even though they had paid extra to have that information expunged. When ALM did not give in to The Impact Team's demands, the group leaked Ashley Madison's customer data.
In 2017, theWannaCry attack encrypted more than 250,000 systems usingasymmetric encryption. The U.K.'s National Health Service was among the targets and had to take its systems offline. The threat actors demanded payment in bitcoin. It's unclear how many victims paid the ransom.
In 2019, threat actors attacked numerous state and local governments using Ryuk ransomware. According to the Center for Internet Security, ransoms ranged from $100,000 to $500,000 worth of bitcoin.
In December 2020 and again in January 2021, hackers accessed dozens of organizations' data by exploitingzero-day vulnerabilities of Palo Alto-based Accellion's file transfer application. Victims included supermarket chain Kroger, blue chip law firm Jones Day, Reserve Bank of New Zealand and Shell Oil. The methods used includedStructured Query Language injection and server-side request forgery. The attackers sent emails to victims threatening to make their data publicly available.
Cybersecurity firm FireEye -- now Symphony Technology Group --revealed in December 2020 that hackers had made off with its Red Team tools, which could be used to launch sophisticated cyberattacks. U.S. officials believed that Russian intelligence agencies were behind the attack.
TheSolarWinds attack was also disclosed in December 2020, revealing that the company's monitoring software had been compromised in the latter half of 2019 and was used to infiltrate and extort government agencies and private sector companies.
The ransomware attack on Colonial Pipeline in 2021 caused an eight-day shutdown of the 5,500-mile pipeline, which resulted in gas lines and shortages in New York and the Southeast. The Federal Bureau of Investigation (FBI) identified the attacker as DarkSide, a ransomware-as-a service group known to use double extortion tactics. Colonial Pipeline is reported to have paid nearly $5 million in bitcoin.
Since its discovery in 2022, Royal ransomware has been used in high-profile assaults againstcritical infrastructure, particularly hospitals. With the special partial encryption method used by this ransomware, the threat actor can select the precise portion of a file's data to encrypt, which reduces the encryption percentage for bigger files and aids in avoiding detection. In addition to encrypting material, Royal actors use double extortion strategies. Notable victims of Dev-0569, the group associated with the Royal ransomware, include Silverstone Circuit, the renowned racing circuit in the U.K.; Travis Central Appraisal District; a Texas government entity; and a major U.S. telecom provider that received a $60 million ransom demand.
Within the period of a month in 2023, there was a cyberattack on both Caesars Entertainment and MGM Resorts. Identity management vendor Okta confirmed that both mentioned customers were compromised using social engineering attacks. The MGM attack was attributed to the Alphv/BlackCat ransomware gang and another group called Scattered Spider. It is theorized these groups performed both the Caesars and MGM attacks. Caesars paid up to $15 million to Scattered Spider after they threatened to release company data, and MGM reportedly refused to pay the ransom, leading to significant operational interruptions.
In 2024, London Drugs was the victim of a ransomware attack by the LockBit group. According to the company, data from its corporate environment was exposed, including files from its finance and human resources departments, as well as employee information. No customer data was compromised, however. London Drugs set up a tool enabling employees to check if they were affected by the attack; if they were, they were offered a 24-month subscription for MyTrueIdentity credit monitoring and identity theft services, plus a $1 million reimbursement insurance policy, through TransUnion Canada.
The obvious benefit of paying a ransom is regaining access to crucial files and systems. While the ransom is expensive, rebuilding files or systems can be exponentially more expensive and time-consuming.
The FBIdiscourages ransom payments to criminals. It contends that doing so will embolden attackers to target other organizations, encourage other criminals and fund criminal activities. Paying the ransom also doesn't always guarantee the recovery of a victim's files. Once a ransom is paid, the victim could be marked as a company that will comply and pay a ransom, potentially increasing the likelihood that it will be targeted again. Likewise, the use of double or triple extortion ransomware means that a single attacker could have multiple chances to target the same organization.
Instead, the FBI urges victims to report ransomware threats to local FBI offices or the FBI's Internet Crime Complaint Center.
In a 2021 update to its initial advisory, the U.S. Treasury's Office of Foreign Assets Control warned that organizations helping victims make ransomware payments could be in violation of the agency's regulations. It identified companies such as financial institutions cyber insurance firms and those involved incomputer forensics and incident response as possible offenders, depending on the tactics they use. The updated advisory adds new guidance on steps organizations can take to mitigate risks. These include implementing strong cybersecurity practices before an attack and promptly reporting a ransomware attack to law enforcement.
The Department of Commerce Internet Policy Task Force states that cybersecurity insurance could help increase cybersecurity and reduce the number of successful cyber extortion incidents. At the same time, insurers are encouraging customers to exercisepreventative measures and best practices by basing coverage and premiums on the insured's level of self-protection.
Increasingly, customers are requiring vendors to have cyber insurance policies as part of their compliance contracts. The adoption of cyber insurance is increasing, with the cyber insurance market totaling $15.3 billion globally in 2024 -- according to areport from German multinational insurance company Munich Re. Likewise, according to a2025 summary of cyber insurance market trends from software vendor JumpCloud, 80% of large firms have cyber insurance, while only 10% of small and midsize businesses do.
However, before deciding on cyber liability insurance, an organization should evaluate its risks and consult an insurance expert. In general, due to the rise in cyberattacks and data breaches, having cyber liability insurance can be beneficial for companies in all industries but is especially important for technology-dependent businesses, small businesses and organizations that process sensitive data.
Cybercrime and ransomware affect every sector of the economy. Learn more about how toprevent common types of malware attacks.
FWA delivers wireless broadband internet to remote regions, temporary setups and other locations not suitable for wired ...
The internet would be different today without DNS anchoring digital communications. Companies can take some basic steps to ensure...
Cisco's entrée into 102.4 Tbps silicon boasts in-place programmability and new AgenticOps features as enterprise AI ...
The current AI hype era resembles the dot-com bubble era in some ways, but there are significant differences as well.
Rimini Street's CIO explains how he deployed agentic AI for research and service -- and how an AI steering committee governs ...
Agentic AI is forcing CIOs to rethink IT strategy. Success depends on identifying key use cases, assessing data readiness, ...
With Windows 10 end of support now past, enterprises must evaluate whether to upgrade to Windows 11 based on hardware readiness, ...
Risk is no longer centered only in core systems. Identity, hiring, endpoints and partner platforms are where exposure ...
The Windows 10 end-of-support deadline forces IT teams to choose between Windows 11 migration, ESU enrollment and broader desktop...
Q4 cloud infrastructure service revenues reach $119.1 billion, bringing the 2025 total to $419 billion. See how much market share...
Will $5 trillion in AI infrastructure investment be enough? Cloud providers facing that question must also yield a return, ...
As IT leaders aggressively re-allocate capital to fund new AI initiatives, repatriation offers both savings and greater control, ...
Spain-based global telco reveals progress made in Autonomous Network Journey programme, closing last year with 12 Level 4 use ...
With AI agents increasingly acting as digital concierges for shoppers, verifying bot identities, securing the APIs they rely on ...
The UK Information Commissioner’s Office has won an important appeal relating to data protection obligations arising from a 2017-...
