{"id":10374,"date":"2018-08-22T14:47:42","date_gmt":"2018-08-22T14:47:42","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=541843"},"modified":"2018-08-22T14:47:42","modified_gmt":"2018-08-22T14:47:42","slug":"how-digital-extortion-impacts-todays-enterprises","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/","title":{"rendered":"How Digital Extortion Impacts Today\u2019s Enterprises"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/brafton-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/brafton-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/brafton-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/brafton-1024x683.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/brafton-640x427.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/brafton-900x600.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/brafton-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/brafton-380x253.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/brafton.jpg 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p>By now, many enterprise decision-makers are familiar with the concept of digital extortion, particularly in the form of ransomware. These encryption-based attacks lock users out of their sensitive and valuable data, applications and operating systems. Attackers demand a ransom in the form of untraceable digital currency for the decryption key \u2013 which may or may not actually be delivered upon payment.<\/p>\n<p>Ransomware attacks have been impacting organizations for a few years now. However, this isn\u2019t the only form of digital extortion in use today. As with other attack styles, hackers are becoming increasingly advanced in their preparations and malicious software capabilities.<\/p>\n<p>As digital extortion attacks continue to increase, it\u2019s imperative that IT leaders and executives ensure they are aware of these kinds of threats and the impacts they can have on overall company reputation as well as relationships with partners and customers.<\/p>\n<h3><strong>Digital extortion explained: Generating profits for cybercriminals<\/strong><\/h3>\n<p>A main reason behind the rise of digital extortion \u2013 and predictions on the part of security experts that these instances will only expand in the near future \u2013 is the fact that these attacks can be incredibly lucrative for hackers.<\/p>\n<p>Ransomware, and other digital extortion attack styles, which we\u2019ll delve into later on, all have a common denominator: high profit potential for cybercriminals. When enterprises and individual users are prevented from accessing their most important files and data \u2013 and particularly when these key assets are not backed up in a second location \u2013 victims are forced into paying attackers to lift strong encryptions and regain access.<\/p>\n<p>Unfortunately, past ransomware attacks have demonstrated that just because a hacker is paid, doesn\u2019t mean the attack will end. In some instances, including <u><a href=\"https:\/\/www.pcworld.com\/article\/3196880\/security\/paying-the-wannacry-ransom-will-probably-get-you-nothing-heres-why.html\">during the widespread WannaCry attacks<\/a><\/u>, victims paid ransoms but never received a decryption key \u2013 or even a response \u2013 from cybercriminals. In other instances, once the ransom is paid, hackers will demand a second, higher ransom with the promise that access will be restored.<\/p>\n<p>Due to these and other reasons, digital extortion has become a particularly dangerous and damaging threat to enterprises.<\/p>\n<p>\u201cDigital extortion is <u><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/security-101-digital-extortion\">one of the most lucrative ways<\/a><\/u> cybercriminals can profit in today\u2019s threat landscape,\u201d Trend Micro security researchers pointed out. \u201cMany have fallen victim to this particularly particular scheme and been bilked out of their money \u2013 from ordinary users to big enterprises.\u201d<\/p>\n<h3><strong>Digital extortion of the past: DoS pave the way<\/strong><\/h3>\n<p>Although current awareness of digital extortion attacks is most closely tied with ransomware infections, this style of making profit was also being used in combination with another familiar approach \u2013 denial-of-service attacks. And as Trend Micro\u2019s <em>Digital Extortion: A Forward-Looking View<\/em> report notes, this style of extortion has been utilized by cybercriminals for over a decade, and hackers can be very insensitive in their approach.<\/p>\n<p>\u201c<em>Good morning \u2026we hope you\u2019ve been enjoying the 100+ Gbps DDoS. To make it stop, please pay 30 bitcoins to the following wallet\u2026<\/em>\u201d an example in the report stated.<\/p>\n<p>As with ransomware attacks, the key here is to prevent access and coerce victims into payment. By bombarding key systems \u2013 typically consumer- or client-facing platforms \u2013 with high traffic volumes, they become inaccessible.<\/p>\n<p>While not a top favorite any longer, some hackers still leverage DoS in conjunction with extortion in order to encourage payment on the part of victims. After all, a brand\u2019s website that is inaccessible for even a few hours can translate to significant lost opportunities to connect with potential customers and foster business for today\u2019s enterprises.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-541844\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/Brafton1.jpg\" alt=\"\" width=\"800\" height=\"420\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/Brafton1.jpg 800w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/Brafton1-300x158.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/Brafton1-768x403.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/Brafton1-640x336.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/Brafton1-440x231.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/Brafton1-380x200.jpg 380w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"\/><\/p>\n<p><em>Ransom notes like this are often sent to businesses and consumers alike when hackers access their data.<\/em><\/p>\n<h3><strong>Impacts to business reputation: Fake online reviews<\/strong><\/h3>\n<p>In the current age, online reviews mean a lot to consumers and the buying decisions they make. In fact, Inc. Magazine reported that not only do 91 percent of individuals read online reviews, but <u><a href=\"https:\/\/www.inc.com\/craig-bloem\/84-percent-of-people-trust-online-reviews-as-much-.html\">84 percent trust them<\/a><\/u> as much as a personal recommendation from a friend.<\/p>\n<p>This is no secret to hackers, who have used this knowledge to demand payment from businesses that rely on online reviews.<\/p>\n<p>\u201c<em>Did you notice how all the hotels in your chain are lately getting very many negative reviews? If you want this problem to go away, follow the instructions\u2026<\/em>\u201d noted an example in Trend Micro\u2019s digital extortion report.<\/p>\n<p>Often, hackers will work to be very timely in these types of extortion, targeting a company with an upcoming product release or other launch. In these instances, more consumers are looking for reviews and information, and cybercriminals work to negatively impact public perception. In some situations, like the example above, attackers will offer to stop the review spamming in exchange for payment, or may even go further and offer to retract negative reviews once the ransom is paid.<\/p>\n<h3><strong>Supply chain disruptions: Machine hijacking<\/strong><\/h3>\n<p>As the <em><u><a href=\"https:\/\/documents.trendmicro.com\/assets\/wp-digital-extortion-a-forward-looking-view.pdf\">Digital Extortion: A Forward-Looking View<\/a><\/u><\/em> report shows, some types of extortion go beyond the digital realm and impact operations in the physical world. Such is the case with equipment or machine hijacking, where cybercriminals hack into the software systems used to control and manage heavy machinery and\/or manufacturing equipment.<\/p>\n<p>In these events, hackers bring down supply chain operations, preventing production, manufacturing, shipping, distribution and other key processes, demanding payment in exchange for returned access to equipment. This can topple business activity for an organization, and have a considerable impact on its reputation and relationships with partners across the supply chain, as well as customers.<\/p>\n<h3><strong>Uber extortion: A real-world case<\/strong><\/h3>\n<p>Overall, extortion-style attacks can impact nearly anyone, including high ranking company officials, political figures, celebrities, individual users and beyond. Unfortunately, more often than not, even when payment to cybercriminals is made and a quasi-resolution reached, the damage to the victim or organization is already done.<\/p>\n<p>Uber learned this the hard way in 2016, when it was discovered that hackers breached the company\u2019s systems and made off with a considerable amount of personal data belonging to 57 million app users. Although the ride-sharing platform paid off cybercriminals to the tune of $100,000 to keep the matter quiet and prevent further data leakage, a change in management within Uber shifted this decision about a year later.<\/p>\n<p>Uber representatives disclosed the hack and subsequent extortion to the public, which was generally met with negativity that the organization had waited so long to make customers aware of the potential danger surrounding their stolen data.<\/p>\n<h3><strong>Mitigating extortion attacks<\/strong><\/h3>\n<p>While attacks like this can impact any user or organization, there are a few best practices that can be leveraged to reduce the chances of these instances. The first step, of course, is awareness of this attack style in the threat landscape \u2013 advanced knowledge can help users strengthen protections proactively.<\/p>\n<p>In addition, it\u2019s imperative to properly safeguard sensitive personal and business information and to leverage strong authentication credentials in this manner.<\/p>\n<p>To find out more, <u><a href=\"https:\/\/documents.trendmicro.com\/assets\/wp-digital-extortion-a-forward-looking-view.pdf\">check out Trend Micro\u2019s Digital Extortion report today<\/a><\/u>.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/how-digital-extortion-impacts-todays-enterprises\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By now, many enterprise decision-makers are familiar with the concept of digital extortion, particularly in the form of ransomware. These encryption-based attacks lock users out of their sensitive and valuable data, applications and operating systems. Attackers demand a ransom in the form of untraceable digital currency for the decryption key &#8211; which may or may&#8230;<br \/>\nThe post How Digital Extortion Impacts Today&#8217;s Enterprises appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":10375,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[1147,2898,91,307,562],"class_list":["post-10374","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-cybercriminals","tag-digital-extortion","tag-ransomware","tag-security","tag-wannacry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Digital Extortion Impacts Today\u2019s Enterprises 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Digital Extortion Impacts Today\u2019s Enterprises 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-22T14:47:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/how-digital-extortion-impacts-todays-enterprises.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-digital-extortion-impacts-todays-enterprises\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-digital-extortion-impacts-todays-enterprises\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How Digital Extortion Impacts Today\u2019s Enterprises\",\"datePublished\":\"2018-08-22T14:47:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-digital-extortion-impacts-todays-enterprises\\\/\"},\"wordCount\":1146,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-digital-extortion-impacts-todays-enterprises\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/how-digital-extortion-impacts-todays-enterprises.jpg\",\"keywords\":[\"cybercriminals\",\"Digital extortion\",\"ransomware\",\"Security\",\"WannaCry\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-digital-extortion-impacts-todays-enterprises\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-digital-extortion-impacts-todays-enterprises\\\/\",\"name\":\"How Digital Extortion Impacts Today\u2019s Enterprises 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-digital-extortion-impacts-todays-enterprises\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-digital-extortion-impacts-todays-enterprises\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/how-digital-extortion-impacts-todays-enterprises.jpg\",\"datePublished\":\"2018-08-22T14:47:42+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-digital-extortion-impacts-todays-enterprises\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-digital-extortion-impacts-todays-enterprises\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-digital-extortion-impacts-todays-enterprises\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/how-digital-extortion-impacts-todays-enterprises.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/how-digital-extortion-impacts-todays-enterprises.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-digital-extortion-impacts-todays-enterprises\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"cybercriminals\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybercriminals\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Digital Extortion Impacts Today\u2019s Enterprises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Digital Extortion Impacts Today\u2019s Enterprises 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/","og_locale":"en_US","og_type":"article","og_title":"How Digital Extortion Impacts Today\u2019s Enterprises 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-08-22T14:47:42+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/how-digital-extortion-impacts-todays-enterprises.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How Digital Extortion Impacts Today\u2019s Enterprises","datePublished":"2018-08-22T14:47:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/"},"wordCount":1146,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/how-digital-extortion-impacts-todays-enterprises.jpg","keywords":["cybercriminals","Digital extortion","ransomware","Security","WannaCry"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/","url":"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/","name":"How Digital Extortion Impacts Today\u2019s Enterprises 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/how-digital-extortion-impacts-todays-enterprises.jpg","datePublished":"2018-08-22T14:47:42+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/how-digital-extortion-impacts-todays-enterprises.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/how-digital-extortion-impacts-todays-enterprises.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-digital-extortion-impacts-todays-enterprises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"cybercriminals","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybercriminals\/"},{"@type":"ListItem","position":3,"name":"How Digital Extortion Impacts Today\u2019s Enterprises"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=10374"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10374\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/10375"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=10374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=10374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=10374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}