Only a handful of hackers responsible for email extortion attacks

Date:

A new research study conducted by security firm Barracuda Networks and Columbia University has revealed that only a small number of cybercriminals are responsible for the majority of email extortion attacks worldwide. The study analyzed over 300,000 extortion attack emails flagged by the company’s AI detectors over a one-year period. The researchers examined the bitcoin wallet addresses mentioned in these emails, as cybercriminals often prefer to be paid in cryptocurrency due to its anonymous nature.

The research discovered that approximately 80% of these email extortion attacks were linked to just 100 bitcoin addresses. However, the number of bitcoin addresses does not necessarily indicate the number of attackers, as individuals involved in such activities may use multiple bitcoin addresses. The actual number of attackers could be fewer than 100 or even smaller, according to Zixi (Claire) Wang, a Master’s student at Columbia University.

In terms of the monetary demands made in these attacks, the study found that a significant proportion of the emails requested relatively small amounts. Around a quarter of the emails sought less than $1,000, and more than 90% asked for less than $2,000. Wang speculated that attackers opt for lower amounts to increase the likelihood of victims complying without investigating the legitimacy of the compromise. Furthermore, smaller amounts are less likely to raise suspicion with banks or tax authorities.

The study also revealed that bitcoin was the sole cryptocurrency used by the attackers in the dataset. Wang explained that bitcoin’s level of anonymity, the use of wallet addresses, and the ability to generate unlimited wallet addresses made it the preferred choice for cybercriminals.

See also  Google Launches Chromebook Plus: Powerful Laptops Built for Productivity and Performance

These email extortion attacks typically involve claims of having compromising photos or videos of the target, obtained by hacking their device’s camera, and threatening to release them unless the demands are met. However, the researchers note that the majority of these claims are false, as attackers often do not possess any incriminating content or infect the target’s system with malware.

The limited number of perpetrators worldwide identified in the study is seen as a positive sign by Wang, as it suggests that tracking down and targeting a small number of attackers could significantly disrupt this form of cyber threat. Additionally, the researchers believe that email security vendors can block a large percentage of these attacks by implementing relatively simple detectors, given that extortion attackers often follow similar templates.

In conclusion, this research highlights the concentrated nature of email extortion attacks, with a small group of cybercriminals being responsible for the majority of these illicit activities. By understanding this pattern, law enforcement agencies can focus their efforts on identifying and apprehending these individuals, significantly mitigating the threat. Meanwhile, email security vendors can enhance their defenses by utilizing effective detection mechanisms to block a substantial portion of these attacks. As the prevalence of such attacks continues to rise, collaborative efforts between researchers, law enforcement, and security vendors are crucial in successfully combating this form of cybercrime.

Frequently Asked Questions (FAQs) Related to the Above News

How many cybercriminals are responsible for the majority of email extortion attacks?

The research study reveals that only a small number of cybercriminals, potentially fewer than 100 individuals, are responsible for the majority of email extortion attacks worldwide.

What percentage of email extortion attacks is linked to a specific group of bitcoin addresses?

Approximately 80% of email extortion attacks are linked to just 100 bitcoin addresses.

Why do attackers prefer to be paid in cryptocurrency?

Attackers prefer to be paid in cryptocurrency, specifically bitcoin, due to its anonymous nature, which makes it harder to trace the money back to them.

How much money do these attackers typically demand in email extortion attacks?

The study found that a significant proportion of the emails requested relatively small amounts. Around a quarter of the emails sought less than $1,000, and more than 90% asked for less than $2,000.

Why do attackers opt for lower monetary amounts in their demands?

Attackers choose lower amounts to increase the likelihood of victims complying without investigating the legitimacy of the compromise. Smaller amounts are also less likely to raise suspicion with banks or tax authorities.

Which cryptocurrency is primarily used by the attackers in these email extortion attacks?

The study revealed that bitcoin is the sole cryptocurrency used by attackers in the dataset. Its level of anonymity, the use of wallet addresses, and the ability to generate unlimited wallet addresses make it the preferred choice for cybercriminals.

What kind of claims do these email extortion attacks typically involve?

These attacks often involve claims of possessing compromising photos or videos of the target, obtained by hacking their device's camera, and threatening to release them unless the demands are met.

Do attackers usually possess incriminating content or infect the target's system with malware?

No, the majority of these claims are false. Attackers often do not possess any incriminating content or infect the target's system with malware.

How can law enforcement agencies and email security vendors combat these email extortion attacks?

Law enforcement agencies can focus their efforts on identifying and apprehending the small number of perpetrators responsible for the majority of these attacks. Email security vendors can enhance their defenses by implementing effective detection mechanisms that can block a significant portion of these attacks. Collaboration between researchers, law enforcement, and security vendors is crucial in combating this form of cybercrime.

Please note that the FAQs provided on this page are based on the news article published. While we strive to provide accurate and up-to-date information, it is always recommended to consult relevant authorities or professionals before making any decisions or taking action based on the FAQs or the news article.

Advait Gupta
Advait Gupta
Advait is our expert writer and manager for the Artificial Intelligence category. His passion for AI research and its advancements drives him to deliver in-depth articles that explore the frontiers of this rapidly evolving field. Advait's articles delve into the latest breakthroughs, trends, and ethical considerations, keeping readers at the forefront of AI knowledge.

Share post:

Subscribe

Popular

More like this
Related

Obama’s Techno-Optimism Shifts as Democrats Navigate Changing Tech Landscape

Explore the evolution of tech policy from Obama's optimism to Harris's vision at the Democratic National Convention. What's next for Democrats in tech?

Tech Evolution: From Obama’s Optimism to Harris’s Vision

Explore the evolution of tech policy from Obama's optimism to Harris's vision at the Democratic National Convention. What's next for Democrats in tech?

Tonix Pharmaceuticals TNXP Shares Fall 14.61% After Q2 Earnings Report

Tonix Pharmaceuticals TNXP shares decline 14.61% post-Q2 earnings report. Evaluate investment strategy based on company updates and market dynamics.

The Future of Good Jobs: Why College Degrees are Essential through 2031

Discover the future of good jobs through 2031 and why college degrees are essential. Learn more about job projections and AI's influence.