TIME Magazine
Super Lawyers
NACDA
Avvo Rating Top Attorney
Avvo Rating Top Attorney Federal Crime
10 Best Client Satisfaction Award 2014
Newsweek 2011

Cyber Crime – Cyber Extortion on the Rise

Conaway & Strickler, P.C.

Cyber extortion threats are on the rise. The threat the hacker uses is that if a certain amount of money is not paid, then information of some sort will be exposed. Hackers gain access through a digital break in. Cyber extortion is different then ransomware attacks. Ransomware will render a hard drive/server/file unreadable/unaccessible until a ransom is paid. Extornists threaten to expose sensitive material and people are paying them. But, in some cases the threats are just that – threats, and the hackers are bluffing.

Cyber extortion can take many forms. The below, is by no means, an exhaustive list.

*Denial-of-Service attacks – attack happens, and then hackers demand money to stop the attack.

*Patient data attacks – taking information from server and then hackers demand money to stop the publication of PII and/or medical information of patients.

*Installing malware – for example installing malware on an executive’s individual computer, taking data and then demanding money to keep that information from going public.

*Disgruntled employee attack – employee breaks in to company’s computer system and wreaks havoc. This type of hacker usually wants recognition, not necessarily money, but it will still cost the company money cleaning up the mess.

*Law firm attack. Law firm is breached and data taken. This data can take the form of intellectual property, mergers, or any type of litigation. The data can then be used to generate better outcome for one side of the litigation, or can be used to embarrass firms. Hackers may also do this for political gain.

*Hackers can plant information, in addition to malware. Interestingly, cyber extortionists can plant child pornography on an executive’s computer, and then threaten to make that information public.

*Hackers can release personal data. Hackers can also access an executive’s computer and threaten to release private information such as credit card information, PII, or embarrassing pictures/sexts.

Payment will not guarantee that the issue will be resolved.

How to protect against this? Protective measures are imperative in today’s world. Backing up data, practicing cyber hygiene, having a current incident response plan, data encryption, constant risk assessment, and weighing which data is most important are some of the protective measures all of us can take to protect against cyber extortion. Also, it is important to get cyber extortion insurance coverage to protect against the losses incurred.

For other entries on cyber crimes, please click here and for our blog, please click here

Client Reviews

I am so very grateful to all of you for working diligently for him. I prayed Conaway & Strickler would have the skill to prove him innocent. And you did. God bless all of you, and thank you again.

Liz

Thank you for your magnificent representation of our son in court today. It seemed like everyone in the courtroom was against him, and you were his champion. My wife and I will never forget how you stood up in court for our son today. Thank you for saving him from jail and getting him a second...

Peter and Darcy

Our family wants to thank Conaway and Strickler for their professional and hard work in this case. We never thought this nightmare was going to be over so soon. With receiving a No Bill from the Grand Jury, my employer has given me my job back. This has been by far a true miracle.

The R. Family

Thank you so much for your support and guidance! Have a wonderful year!

Bob

Thanks for your concern and caring. You were so kind when I called. Thanks to all!

Vergie

Contact Us

  1. 1 Free Confidential Consultation
  2. 2 Available 24/7
  3. 3 Over 25 Years of Combined Experience
Fill out the contact form or call us at (404) 816-5000 to schedule your free consultation.

Leave Us a Message