Hello, you are using an old browser that's unsafe and no longer supported. Please consider updating your browser to a newer version, or downloading a modern browser.

Glossary > Cyber Extortion

What is Cyber Extortion?

Understanding Cyber Extortion

Cyber Extortion has grown from niche ransomware incidents to a dominant threat where attackers leverage multiple tactics—encryption of data, theft of sensitive information, or denial-of-service threats—to demand payment. Modern variants include “double extortion,” where attackers encrypt critical files and also threaten to publicly leak stolen data if the victim refuses to pay. Sophisticated groups run dedicated leak sites, coordinate affiliates, and handle ransom negotiations as a structured business. Mitigation strategies include regular offline backups, thorough network segmentation, strong access control measures (especially for privileged accounts), and endpoint detection. However, many organizations also prepare response playbooks covering payment decisions, cryptocurrency logistics, legal review, and communications. Law enforcement often advises against paying ransoms, but victims sometimes see it as the quickest or cheapest resolution. Consequently, cyber insurance policies increasingly impose strict underwriting guidelines (e.g., requiring MFA, EDR) before covering ransom-related losses. Cyber extortion pressure can lead to prolonged operational downtime, reputational damage, and compliance complications (if personal data is leaked). Mature organizations treat it as a top-level risk, integrating crisis management teams, incident response expertise, and strategic planning to handle the complex decisions that arise during an extortion event.

Learn More About Cyber Extortion: