Only a handful of hackers responsible for email extortion attacks

Date:

A new research study conducted by security firm Barracuda Networks and Columbia University has revealed that only a small number of cybercriminals are responsible for the majority of email extortion attacks worldwide. The study analyzed over 300,000 extortion attack emails flagged by the company’s AI detectors over a one-year period. The researchers examined the bitcoin wallet addresses mentioned in these emails, as cybercriminals often prefer to be paid in cryptocurrency due to its anonymous nature.

The research discovered that approximately 80% of these email extortion attacks were linked to just 100 bitcoin addresses. However, the number of bitcoin addresses does not necessarily indicate the number of attackers, as individuals involved in such activities may use multiple bitcoin addresses. The actual number of attackers could be fewer than 100 or even smaller, according to Zixi (Claire) Wang, a Master’s student at Columbia University.

In terms of the monetary demands made in these attacks, the study found that a significant proportion of the emails requested relatively small amounts. Around a quarter of the emails sought less than $1,000, and more than 90% asked for less than $2,000. Wang speculated that attackers opt for lower amounts to increase the likelihood of victims complying without investigating the legitimacy of the compromise. Furthermore, smaller amounts are less likely to raise suspicion with banks or tax authorities.

The study also revealed that bitcoin was the sole cryptocurrency used by the attackers in the dataset. Wang explained that bitcoin’s level of anonymity, the use of wallet addresses, and the ability to generate unlimited wallet addresses made it the preferred choice for cybercriminals.

See also  Walmart Teams Up with Microsoft to Revolutionize Shopping with AI-Powered Features

These email extortion attacks typically involve claims of having compromising photos or videos of the target, obtained by hacking their device’s camera, and threatening to release them unless the demands are met. However, the researchers note that the majority of these claims are false, as attackers often do not possess any incriminating content or infect the target’s system with malware.

The limited number of perpetrators worldwide identified in the study is seen as a positive sign by Wang, as it suggests that tracking down and targeting a small number of attackers could significantly disrupt this form of cyber threat. Additionally, the researchers believe that email security vendors can block a large percentage of these attacks by implementing relatively simple detectors, given that extortion attackers often follow similar templates.

In conclusion, this research highlights the concentrated nature of email extortion attacks, with a small group of cybercriminals being responsible for the majority of these illicit activities. By understanding this pattern, law enforcement agencies can focus their efforts on identifying and apprehending these individuals, significantly mitigating the threat. Meanwhile, email security vendors can enhance their defenses by utilizing effective detection mechanisms to block a substantial portion of these attacks. As the prevalence of such attacks continues to rise, collaborative efforts between researchers, law enforcement, and security vendors are crucial in successfully combating this form of cybercrime.

Frequently Asked Questions (FAQs) Related to the Above News

How many cybercriminals are responsible for the majority of email extortion attacks?

The research study reveals that only a small number of cybercriminals, potentially fewer than 100 individuals, are responsible for the majority of email extortion attacks worldwide.

What percentage of email extortion attacks is linked to a specific group of bitcoin addresses?

Approximately 80% of email extortion attacks are linked to just 100 bitcoin addresses.

Why do attackers prefer to be paid in cryptocurrency?

Attackers prefer to be paid in cryptocurrency, specifically bitcoin, due to its anonymous nature, which makes it harder to trace the money back to them.

How much money do these attackers typically demand in email extortion attacks?

The study found that a significant proportion of the emails requested relatively small amounts. Around a quarter of the emails sought less than $1,000, and more than 90% asked for less than $2,000.

Why do attackers opt for lower monetary amounts in their demands?

Attackers choose lower amounts to increase the likelihood of victims complying without investigating the legitimacy of the compromise. Smaller amounts are also less likely to raise suspicion with banks or tax authorities.

Which cryptocurrency is primarily used by the attackers in these email extortion attacks?

The study revealed that bitcoin is the sole cryptocurrency used by attackers in the dataset. Its level of anonymity, the use of wallet addresses, and the ability to generate unlimited wallet addresses make it the preferred choice for cybercriminals.

What kind of claims do these email extortion attacks typically involve?

These attacks often involve claims of possessing compromising photos or videos of the target, obtained by hacking their device's camera, and threatening to release them unless the demands are met.

Do attackers usually possess incriminating content or infect the target's system with malware?

No, the majority of these claims are false. Attackers often do not possess any incriminating content or infect the target's system with malware.

How can law enforcement agencies and email security vendors combat these email extortion attacks?

Law enforcement agencies can focus their efforts on identifying and apprehending the small number of perpetrators responsible for the majority of these attacks. Email security vendors can enhance their defenses by implementing effective detection mechanisms that can block a significant portion of these attacks. Collaboration between researchers, law enforcement, and security vendors is crucial in combating this form of cybercrime.

Please note that the FAQs provided on this page are based on the news article published. While we strive to provide accurate and up-to-date information, it is always recommended to consult relevant authorities or professionals before making any decisions or taking action based on the FAQs or the news article.

Advait Gupta
Advait Gupta
Advait is our expert writer and manager for the Artificial Intelligence category. His passion for AI research and its advancements drives him to deliver in-depth articles that explore the frontiers of this rapidly evolving field. Advait's articles delve into the latest breakthroughs, trends, and ethical considerations, keeping readers at the forefront of AI knowledge.

Share post:

Subscribe

Popular

More like this
Related

Samsung Unpacked: New Foldable Phones, Wearables, and More Revealed in Paris Event

Get ready for the Samsung Unpacked event in Paris! Discover the latest foldable phones, wearables, and more unveiled by the tech giant.

Galaxy Z Fold6 Secrets, Pixel 9 Pro Display Decision, and More in Android News Roundup

Stay up to date with Galaxy Z Fold6 Secrets, Pixel 9 Pro Display, Google AI news in this Android News Recap. Exciting updates await!

YouTube Unveils AI Tool to Remove Copyright Claims

YouTube introduces Erase Song, an AI tool to remove copyright claims and easily manage copyrighted music in videos. Simplify copyright issues with YouTube's new feature.

Galaxy Z Fold6 Secrets, Pixel 9 Pro Display, Google AI Incoming: Android News Recap

Stay up to date with Galaxy Z Fold6 Secrets, Pixel 9 Pro Display, Google AI news in this Android News Recap. Exciting updates await!