SlideShare a Scribd company logo
Be aware of Cyber Extortion
Cyber extortion is a crime involving
an attack or threat of attack coupled
with a demand for money to avert
or stop the attack.
Cyber extortion can take many forms. Originally, denial of service (DoS) attacks
against corporate websites were the most common method of cyber extortion.
In recent years, Hackers have developed ransomware which encrypts the victim's data. The
extortionist's victim typically receives an email that offers the private decryption key in
exchange for a monetary payment in Bitcoins, a digital currency. Cyber extortion can be
lucrative, netting attackers millions of dollars annually.
Most cyber extortion efforts are initiated through malware in e-mail attachments or on
compromised websites. To mitigate the risks associated with cyber extortion, experts
recommend that end users should be educated about phishing exploits and back up their
computing devices on a regular basis.

More Related Content

PDF
Social engineering attacks
PPTX
PPT on Phishing
PPTX
Cia security model
PPTX
Cyber stalking
PPTX
Social engineering
PPT
Hacking And Its Prevention
PPTX
Email security
PDF
Scams and-fraud-presentation
Social engineering attacks
PPT on Phishing
Cia security model
Cyber stalking
Social engineering
Hacking And Its Prevention
Email security
Scams and-fraud-presentation

What's hot (20)

PPTX
Cybercrime investigation
PPTX
Phishing ppt
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Cyber crime
PPT
Cybercrime presentation
PPTX
Cyber crime
PPT
CYBER CRIME ppt
PPTX
Phishing ppt
PPT
Computer Worms
PPTX
cyber crime
PPTX
Phishing
PPT
Cyber Crime
PPT
Phishing
PPTX
Cyber warfare
PPTX
Cyber Security PPT.pptx
PDF
What is Social Engineering? An illustrated presentation.
PPTX
CyberCrimes
PDF
Social engineering
PPT
Cyber crime and security
PDF
Cyber security awareness presentation nepal
Cybercrime investigation
Phishing ppt
Network security (vulnerabilities, threats, and attacks)
Cyber crime
Cybercrime presentation
Cyber crime
CYBER CRIME ppt
Phishing ppt
Computer Worms
cyber crime
Phishing
Cyber Crime
Phishing
Cyber warfare
Cyber Security PPT.pptx
What is Social Engineering? An illustrated presentation.
CyberCrimes
Social engineering
Cyber crime and security
Cyber security awareness presentation nepal
Ad

Similar to Cyberextortion (20)

PPTX
Cyber crime
PPTX
cyber threats and attacks.pptx
PDF
ccs12-18022310494mghmgmyy3 (1).pdf
PPTX
Cyber Crime and Security
DOCX
Cyber crime
PPTX
Computer Crimes
PDF
7 Major Types of Cyber Security Threats.pdf
PPTX
cyber threats introduction and cyber threats types
PPTX
Cyber crime and security 1
PPTX
PPT FOR CYBER SECURITY AND FORENSICS MICRO PROJECT
PDF
Know _ Top 7 Cyber Security threat.pdf
PPTX
Types-of-Cyberattacks:Malware, Phishing.pptx
PPTX
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
PPTX
Cyber crime
PPTX
Cyber terrorism
PPTX
Cyber terrorism
PPTX
My presentation
PDF
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
PDF
Guarding the Digital Fortress.pdf
PPTX
Cyber crime against property
Cyber crime
cyber threats and attacks.pptx
ccs12-18022310494mghmgmyy3 (1).pdf
Cyber Crime and Security
Cyber crime
Computer Crimes
7 Major Types of Cyber Security Threats.pdf
cyber threats introduction and cyber threats types
Cyber crime and security 1
PPT FOR CYBER SECURITY AND FORENSICS MICRO PROJECT
Know _ Top 7 Cyber Security threat.pdf
Types-of-Cyberattacks:Malware, Phishing.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
Cyber crime
Cyber terrorism
Cyber terrorism
My presentation
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress.pdf
Cyber crime against property
Ad

Recently uploaded (20)

PPTX
innovation process that make everything different.pptx
PPTX
Funds Management Learning Material for Beg
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
E -tech empowerment technologies PowerPoint
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Introduction to Information and Communication Technology
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
DOCX
Unit-3 cyber security network security of internet system
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
artificial intelligence overview of it and more
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
innovation process that make everything different.pptx
Funds Management Learning Material for Beg
SASE Traffic Flow - ZTNA Connector-1.pdf
Power Point - Lesson 3_2.pptx grad school presentation
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Sims 4 Historia para lo sims 4 para jugar
The Internet -By the Numbers, Sri Lanka Edition
E -tech empowerment technologies PowerPoint
Decoding a Decade: 10 Years of Applied CTI Discipline
international classification of diseases ICD-10 review PPT.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
Introduction to Information and Communication Technology
Introuction about WHO-FIC in ICD-10.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Unit-3 cyber security network security of internet system
Paper PDF World Game (s) Great Redesign.pdf
artificial intelligence overview of it and more
Cloud-Scale Log Monitoring _ Datadog.pdf
The New Creative Director: How AI Tools for Social Media Content Creation Are...

Cyberextortion

  • 1. Be aware of Cyber Extortion Cyber extortion is a crime involving an attack or threat of attack coupled with a demand for money to avert or stop the attack. Cyber extortion can take many forms. Originally, denial of service (DoS) attacks against corporate websites were the most common method of cyber extortion. In recent years, Hackers have developed ransomware which encrypts the victim's data. The extortionist's victim typically receives an email that offers the private decryption key in exchange for a monetary payment in Bitcoins, a digital currency. Cyber extortion can be lucrative, netting attackers millions of dollars annually. Most cyber extortion efforts are initiated through malware in e-mail attachments or on compromised websites. To mitigate the risks associated with cyber extortion, experts recommend that end users should be educated about phishing exploits and back up their computing devices on a regular basis.