Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been. Specifically, cybercriminals recognize they can monetize elements of our online exposure for extortion-based activity, including exploiting compromised credentials, sensitive documents and intellectual property, and technical vulnerabilities.
In this new research piece, the team explores:
How attackers such as sextortionists, thedarkoverlord and the SamSam group use our online exposure to perform extortion campaigns
How a growing market for network accesses, stolen documents, and extortion guides on gated, dark web sites has emboldened novice extortionists
What practical mitigation advice business leaders and network defenders can implement to manage their digital footprints and reduce extortion risks