Cyber Extortion

The word sounds terrific isn’t it? Obviously it does, so lets get deep into it and know what it exactly is. 

Cyber extortion is an act done by hackers that harms a targeted computer or the entire network. As the title says, cyber crime seeks committing frauds, violates privacy, false bank transactions, stealing identity, etc. It has grown more turbulent through the internet as computers these days are a center to commercial and governmental enterprises and also entertainment.

Not all, but most of these criminal activities are being conducted by hackers, criminals and other people who have the greed to earn money. Their focus mainly remains on individuals, corporations  and government.

In this digital era, they can identify multiple databases that are being owned by organisations and it highlights the centrality of networked computers. This usually takes place in cyberspace.

This is where a conversation takes place between two people over the telephone. A planet-spacing network on the internet provides multiple hiding places to these criminals. However, there’s always some mark left on the way that gives clues to identify their identity.

That’s not just all ! Such crimes are committed either by individuals or by organizations. Some of them are highly organized, while some use advanced techniques and are highly skilled. Hence, let’s get onto the types of cybercrime.

Types Of Cyber Extortion:

It ranges through a wide spectrum of activities. Mainly, it falls under two main categories – one that targets computers and the other that uses computers.

Activities that target computers involve viruses leading to the malfunctioning of the device and also lead to deletion of saved data alongside harming the softwares in it. While others uses the computer to commit other crimes. This is used to spread malfunctioning system to other devices, spoiling the entire network.

At one end of the spectrum lies basic, personal or corporate privacy assaulting the information held in digital machines and getting used up to blackmail the firm or individual. Mid-way lies certain transaction based crimes like fraud, money laundering, forgery and counterfeiting.

Another type of these crimes involves people within the organisation. These people deliberately alter the data either for their profit or for their political aims.

At the last end of the spectrum, those crimes are involved that focus on disrupting the actual working of the internet. This ranges from spamming, hacking, denying of services, cyber terror, etc. They concentrate on more usage of the internet to affect the national economy and the technological infrastructure.


This simply is an act performed by an invader – who have an advanced knowledge on computers – by accessing your computer. Various techniques used by them are:

  • SQL Injections
  • Theft of Passwords
  • Cross-site Scripting

Virus Diffusion:

These are certain programs that attach themselves to the system to infect its data and have the propensity to spread to other computer networks. They harm the files either by altering and disrupting them or by deleting it completely.

Denying of Services:

The DoS is a straightforward method by attackers to deny a particular service that the user intends to use. It consists of flooding a computer with more number of requests than its capacity that leads to the crashing of website or its reduced speed.


This involves extracting private or confidential information such as ID number or credit-card number, etc. Phishing is mainly done through email spoofing. The criminals trick you to download certain malware, make you fill certain information under random false pretenses.

Email spamming:

In spamming, bulk emails are sent to target audiences and opening such emails, leads you to phishing as it may contain infected files. The situation worsens when people who do not have sufficient knowledge, reply to spam emails. These spammers collect email addresses from chat-rooms, websites, address books, customer lists, etc. Sending such emails violates the policy and can result onto your emails being slowed down.

ID Theft and Credit Card Fraud:

Identity theft happens when people steal your identity and hence pretend to be you. Credit card fraud is also an identity theft. Hackers steal your money through credit card very easily. People forget to have a copy of their credit card receipt after making a transaction and this is where the mistake is. Another major concern is the opening of accounts with fake documents. These unscrupulous people collect personal data from your email.

The rising cases of such crimes is a concern for all the financial institutions and also the country. But, you don’t have to worry. There are ways out through which you can protect yourself from being harmed and they are listed below.

  • Keeping you device updated
  • Using good quality and updated antivirus program
  • Having strong passwords
  • Not opening spam emails or untrusted web pages
  • Not sharing personal info with unknown people
  • Being careful with my UPI id and pins
  • Mindful with the URL’s you surf
  • Checking bank statements regularly

5 thoughts on “Cyber Extortion

Leave a Reply

Your email address will not be published. Required fields are marked *