Now Reading
What Is Online Extortion?
0

What Is Online Extortion?

Online extortion is a serious problem that is becoming more and more common. If you have been a victim of online extortion, you are not alone. In this blog post, we will define online extortion, discuss some common scenarios, and offer some tips on what to do if you find yourself in this situation.

What Is Online Extortion?

In short, Internet extortion is when someone threatens to release information or take action that will cause you harm unless you pay them money or meet some other demand.

The information or action that the extortionist threatens to take can be anything that would damage your reputation or cause you financial harm. For example, an online extortionist may threaten to release embarrassing photos or videos unless you pay them $500.

How Can You Protect Yourself From Cyber Extortion

Protecting yourself from cyber extortion calls for awareness and proactive actions. Here’s how to protect your online presence and avoid being a victim of extortionists:

1. Strengthen Your Passwords

Cybercriminals can much more easily slip by weak passwords. Using the same password across several online accounts increases a major risk, so make sure each one is unique. Choose tough-to-guess, strong, distinctive passwords.

One advised strategy is to mix three random phrases, say “boatfrogladder” or “carpetchainsawboomerang.” This approach generates unique but strong passwords difficult for extortionists to get through.

To further securely save your credentials, think about utilizing a password manager. By helping you to maintain unique passwords for every one of your accounts, this solution lowers the chance of a breach.

On your password manager and any other online account, turn on two-factor authentication 

(2FA) for extra security. Even with a hacked password, this additional layer of security can stop illegal access.

2. Monitor Data Breaches

One common cause of cyber extortion is data leaks. To blackmail victims, criminals leverage stolen personal data — sensitive pictures or bank account information, for example.

Use tools like the website haveibeenpwned.com to routinely see whether your data has been hacked, therefore safeguarding yourself. Should your email address or other information become leaked, this page can notify you.

Change your passwords right away if you find that your data has been hacked; then, think about adjusting your security settings on every one of your internet accounts.

Personal information on websites should not be entered via autofill, as this increases the likelihood of data being accessed during a breach and becoming exposed.

3. Beware of Unauthorized Websites

To steal your data, scammers sometimes construct phony websites that look like real ones. These misleading websites could show up in emails, text messages, or even on reliable social media sites.

Always check a website’s credentials carefully to ensure they are legitimate before adding any personal information. Carefully examine the URL for indicators of phishing efforts, such as odd domain names, misspellings, or minute changes that can fool you into thinking the site is legitimate.

Never click on links from unverified sources, particularly if they look dubious or originate from unfamiliar contacts. To guarantee you’re visiting the right website, instead input the web URL directly into your browser.

Being especially careful about the websites you visit can help you avoid the traps established by extortionists, who are always seeking a means to profit from your trust.

4. Scrutinize Communication

Being cautious of any correspondence that seems strange is one of the best strategies to guard against cyber extortion. Promises of money or threatening language are common tools used by scammers to deceive victims into divulging sensitive data.

If you receive an email, text message, or social media communication that appears suspicious, rely on your gut feeling and investigate more.

Look for language errors, unusual wording, and bad spelling; these are frequently indicators that the letter is bogus. Real organizations, including government agencies or banks, will never request your personal information via text or email.

If a message claims you have won a prize, are due a tax refund, or need to verify an account, approach it with skepticism. Always verify such claims through official channels before taking any action to protect yourself from potential scams.

5. Keep Your Social Media Private

Did you know that hackers trying to take advantage of you could even use your social media presence? It might be a gold mine of data, so keeping your social media accounts private will help restrict the personal information available to extortionists seeking specifics about you.

Carefully choose who you accept as friends or followers; avoid sharing information about your whereabouts, daily schedule, or personal connections that could be exploited against you.

Regularly review and update your privacy settings on social media platforms to ensure you are only sharing what you intend to share with trusted contacts.

Protecting your online presence from prying eyes is a crucial step in defending yourself against cyber extortion. Being mindful of what you share can make it significantly harder for cybercriminals to target you.

6. Report Suspicious Activity

Do not hesitate to report the activity right away if you believe a cyber extortionist is specifically targeting you. As soon as you can, get in touch with your neighborhood law enforcement department, the Internet Crime Complaint Center (IC3), or any pertinent body.

Early reporting of the crime makes it easier for authorities to find the offenders and stop them from harming others. Apart from informing local police, think about contacting support groups like the FBI or the National Center for Missing & Exploited Children should the scenario involve kids, explicit content, or other sensitive material.

These groups can provide you with insightful direction and encouragement to help you negotiate the circumstances and safeguard your mental health during this trying period.

7. Trust Your Instinct

And lastly, always follow your instincts. Something that feels off or bad most likely is. Whether it’s a threatening message or an email that looks too good to be true, trust your gut feeling and respond accordingly.

Pay no demands or interact with an extortionist; this will only serve to encourage further threats. Instead, get expert assistance from the pros at Digital Forensics. We’re specialized in handling cyber extortion and other online threats.

By following these guidelines, your chance of falling victim to internet extortion will be much lower. Still, don’t hesitate to call Digital Forensics should you find yourself in a vulnerable position. Our knowledgeable staff is on call around the clock to aid you with quick intervention and enable you to take charge of your digital life.

Common Scenarios of Online Extortion Scams

There are many different ways that online extortion can play out. Some common scenarios include: 

  • Theft of sensitive data such as customer information or company secrets: In this scenario, the extortionist may threaten to release the stolen data to the public unless you pay them a ransom. 

  • DDoS Attacks: In a DDoS (distributed denial of service) attack, the attacker inundates your website with so much traffic that it crashes. The attacker may then demand payment to stop the attack and allow your website to come back online. 

  • Malware Attacks: In this type of attack, the attacker infects your computer with malware that either locks you out of your system or encrypts your files. The attacker will then demand payment for you to regain access to your system or files.

  • Social Media Attacks: In this scenario, extortionists, or sextortionists, create dozens of catfish profiles and flirt their way into getting their victims to exchange explicit content, then threaten to expose them online if they do not receive compensation. 

What Are Examples of Cyber Extortion?

Although we have named a few common scenarios of extortion, it’s helpful and informative to know about real lives that have been affected by this awful crime. Here is an example of a real-life case of sextortion we have dealt with here at Digital Forensics. (Real names will not be used to protect the victim’s privacy) 

Jane Smith was a divorced mother of three feeling like it was time to put herself out there and join a dating app called Hinge. Not being on the app long, she received a message from an attractive man called Christ Morgan, “Chris” for short.

He immediately started being flirtatious once he reached out, feeding Jane with compliments. The two got to talking on the app for a little until Chris suggested they exchange numbers which led to the two hitting it off and forming a relationship over months.  

Christ claimed that he worked overseas for an oil rig (which was a lie, and he was a scammer based in Nigeria) and formed numerous excuses as to why they couldn’t video chat or see each other. He would fill Jane with hope when he promised he would fly to her and visit. This is when things took a turn, causing Jane to be alarmed.

Chris would come up with numerous amounts of excuses as to why he needed to borrow money from her such as, “My bank card froze,” “I’m hungry, but I’m short on cash,” and “They aren’t paying me enough over here, can you help.”

Jane being the helpful and loving person she is continued to send him money but noticed how he constantly would ask nonstop and he became more of a burden.

She explained that she had kids to feed and take care of and wasn’t able to help him out anymore; she wanted out of the relationship. This is when Chris showed his true colors. He got extremely hostile and threatened that he would expose all of her nude images and videos online, including her place of work, if she didn’t keep sending him money.  

Unfortunately, Chris went through with his threats and harassed Jane for months, which led her to file for bankruptcy. This type of crime can be labeled a romance scam, online extortion, and sextortion.

The way sextortionists string along their victims varies, the attack can happen within a few hours, days, or even months; it’s ultimately based on what type of criminal you are dealing with.  

What to do if someone is extorting you online?

If you find yourself the victim of online extortion, the best thing to do is contact law enforcement and online blackmail experts right away and report internet extortion. Document the harassment and do not agree to any demands. Law enforcement officials and experts have experience dealing with these types of situations and will be able to help you resolve the issue safely.  

Online extortion is a serious crime, and it is important to get law enforcement involved as soon as possible so that they can catch the person responsible and prevent anyone else from becoming a victim. The best option is to Report Sextortion to sextortion helpline.

Sources:

Use Strong Passwords | CISA

What Is Two-Factor Authentication (2FA)? | Microsoft Security

Check if your email address is in a data breach | Have I Been Pwned

IC3 Complaint Referral Form | IC3

 

Leave a Response


Please enter the result of the calculation above.