martes, 31 de julio de 2018

Deliberate Act of Information Extortion / Blackmail






The development of new technologies such as cloud computing that allow the user to have many services through the Internet, technological convergence and the great reception of social networks has allowed the Internet to have an exponential growth and a tendency to a society increasingly dependent on technology, this has caused an increase in information exposed on the network with the subsequent security problems that this entails.



The exposure of information and vulnerabilities in applications and user systems and companies are exploited by criminals, one of the threats that has grown in recent times and is of general concern is the computer extortion




Computer blackmail




Computer blackmail or extortion is the threat of "public defamation" or, in its case, with the objective of obtaining some pecuniary or material benefit from someone, or obligation to act in a certain way.

Within the cybercrime this figure takes a special form with the "extortion" and "threats" that a person can suffer online, requesting sexual content or minors using social networks; but it can also produce through cyber attacks on a web page or blog, attacking its structure and functioning or collapsing its servers and in exchange for money to import for various amounts so that everything works again as before.

Deliberate act of extortion
the deliberate act of extortion consists of the same act, of the use of violence or intimidation, applied through the computerized means, in such a way that the victim is able to perform an act against himself or others, processed through the web.
The deliberate act of extortion is basically an extortion technique that uses tools and resources provided by the Internet for a monetary purpose, among the most common scenarios are:
  • Threats of disclosure of sensitive information: which basically consists of requesting money in exchange for not publicly exposing confidential information.

  • Threats of destruction of information: consisting of the request for money in exchange for the non-elimination of important information of the victim.

  • Denial of service for platforms such as web portals, applications, etc.: consisting of requesting money in exchange for stopping denial of service (DDoS) attacks that cause interruptions on the benefits provided by a certain web infrastructure.

  • Blocking personal accounts: consisting of the request for money in exchange for the unlocking of user accounts, of which the delinquent has taken over.

  • Data hijacking also known as ransomware: which consists of requesting money in exchange for "releasing" data from the victim that are generally encrypted in such a way that the owner of the data can not access their own information.

Both the deliberate act of extortion and other threats to information security occur due to the existence of vulnerabilities in the system, which can be mitigated through the implementation of appropriate policies and controls for the environment and infrastructure.

Types of blackmail or deliberate acts of extortion that can be given:
  •  sexting: This method consists of extorting someone with the threat of spreading through the Internet a picture of him that is committed and generally of sexual content. In return, the blackmailer asks to have sexual relations with the victim for different purposes. Although this crime is committed against adults and minors, when the blackmail occurs on the latter, the risks multiply.
  •  theft of data files containing customer credit card information




there are a video  


No hay comentarios.:

Publicar un comentario