{"id":167225,"date":"2023-04-18T13:19:37","date_gmt":"2023-04-18T20:19:37","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=167225"},"modified":"2023-07-11T11:12:19","modified_gmt":"2023-07-11T18:12:19","slug":"extortion-fraud-is-still-on-the-rise","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/","title":{"rendered":"Extortion Fraud is Still on the Rise"},"content":{"rendered":"<p>Authored by <span class=\"TextRun SCXW9777606 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW9777606 BCX0\">Lakshya Mathur and<\/span><span class=\"NormalTextRun SCXW9777606 BCX0\">\u00a0Sriram P<\/span><\/span><span class=\"EOP SCXW9777606 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">McAfee Intelligence observed a huge spike in extortion email frauds over the past month. The intent of these fraudulent activities is to intimidate individuals into paying a specified amount of money as a ransom.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Figure 1 shows the number of blackmail emails received over a month recently.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-167240\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.20.35.png\" alt=\"\" width=\"1053\" height=\"595\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.20.35.png 1053w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.20.35-300x170.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.20.35-1024x579.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.20.35-768x434.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.20.35-205x116.png 205w\" sizes=\"auto, (max-width: 1053px) 100vw, 1053px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW182443476 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW182443476 BCX0\">Figure 1 \u2013 Stats for\u00a0<\/span><\/span><span class=\"TextRun SCXW182443476 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW182443476 BCX0\">20 February\u00a02023 \u2013 23<\/span><\/span><span class=\"TextRun SCXW182443476 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun Superscript SCXW182443476 BCX0\" data-fontsize=\"9\">rd<\/span><\/span><span class=\"TextRun SCXW182443476 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW182443476 BCX0\"> March 2023<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">In this blog, we&#8217;ll delve into frauds that are becoming increasingly common in the digital age. We&#8217;ll first define what these frauds are and provide examples to help readers better understand the nature of these frauds. Additionally, we&#8217;ll explore how these frauds are on the rise, highlighting the reasons behind this trend and the impact it has on individuals.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Finally, we&#8217;ll provide practical advice to help consumers protect themselves from these types of attacks. This will include a discussion of some of the most effective measures individuals can take to safeguard their personal and financial information from fraudsters.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><span class=\"TextRun MacChromeBold SCXW179541815 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW179541815 BCX0\">What are Extortion Fr<\/span><span class=\"NormalTextRun SCXW179541815 BCX0\">auds?<\/span><\/span><span class=\"EOP SCXW179541815 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span class=\"TextRun SCXW227801508 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW227801508 BCX0\">Extortion emails are a type of <\/span><span class=\"NormalTextRun SCXW227801508 BCX0\">scam<\/span><span class=\"NormalTextRun SCXW227801508 BCX0\"> where cybercriminals send threatening messages to individuals or organizations\u2014demanding payment in exchange for not releasing sensitive or embarrassing information. These emails typically claim that the sender has compromising information, such as private photos or personal data, and threaten to share it with the recipient&#8217;s friends, family, or the public unless a payment is made. The payment is usually asked in the form of cryptocurrency, such as Bitcoin in the recent spam, which is difficult to trace and can be transferred quickly and anonymously. The goal of these emails is to scare the recipient into paying the demanded amount, even though there might not be any compromising information to release.<\/span><\/span><span class=\"EOP SCXW227801508 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><span class=\"TextRun MacChromeBold SCXW174375757 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW174375757 BCX0\">Examples of Extortion fraud<\/span><\/span><span class=\"EOP SCXW174375757 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span class=\"TextRun SCXW16694972 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW16694972 BCX0\">Scammers use different scareware sentiments like bad internet browsing habits, hacking for Wi-Fi, and hacking of networks<\/span><span class=\"NormalTextRun SCXW16694972 BCX0\">\u00a0because of hardware vulnerabilities. <\/span><\/span><span class=\"TextRun SCXW16694972 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW16694972 BCX0\">We&#8217;ll now examine various illustrations of extortion emails and analyze scammers&#8217; strategies to intimidate victims into <\/span><span class=\"NormalTextRun SCXW16694972 BCX0\">providing<\/span><span class=\"NormalTextRun SCXW16694972 BCX0\"> payment.<\/span> <span class=\"NormalTextRun SCXW16694972 BCX0\">By presenting various real-life examples, we can <\/span><span class=\"NormalTextRun SCXW16694972 BCX0\">demonstrate<\/span><span class=\"NormalTextRun SCXW16694972 BCX0\"> how scammers <\/span><span class=\"NormalTextRun SCXW16694972 BCX0\">use<\/span><span class=\"NormalTextRun SCXW16694972 BCX0\"> scareware tactics to manipulate and intimidate their victims into complying with their demands. By instilling fear, the scammers hope to provoke a sense of urgency in the victim, increasing the likelihood that they will pay the demanded ransom.<\/span><\/span><span class=\"EOP SCXW16694972 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-167226\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.19.10.png\" alt=\"\" width=\"1046\" height=\"562\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.19.10.png 1046w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.19.10-300x161.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.19.10-1024x550.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.19.10-768x413.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.19.10-205x110.png 205w\" sizes=\"auto, (max-width: 1046px) 100vw, 1046px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun SCXW57619159 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW57619159 BCX0\">Figure 2 \u2013 Extortion fraud Example 1<\/span><\/span><\/strong><span class=\"EOP SCXW57619159 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">Figure 2 is an illustration of a typical extortion email that scammers use to exploit their victims. In this instance, the scammer is claiming to have gained unauthorized access to the victim&#8217;s account through a security vulnerability in a Cisco router. The scammer is then threatening to expose embarrassing information about the victim unless a payment of $1,340 is made.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The payment is demanded through a Bitcoin wallet address that the scammer has provided. In this example, the scammer has obfuscated the Bitcoin wallet address by adding spaces between the characters, which is a tactic used to make it harder to track the payment.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-contrast=\"auto\">Now, let us examine another instance of extortion emails.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-167256\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.30.58.png\" alt=\"\" width=\"1031\" height=\"522\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.30.58.png 1031w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.30.58-300x152.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.30.58-1024x518.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.30.58-768x389.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.30.58-205x104.png 205w\" sizes=\"auto, (max-width: 1031px) 100vw, 1031px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun SCXW25971350 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW25971350 BCX0\">Figure 3 \u2013 Extortion fraud example 2<\/span><\/span><span class=\"EOP SCXW25971350 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">Figure 3 is another example of an extortion email that scammers use to trick and manipulate their victims. In this case, the attacker is claiming to have gained unauthorized access to the victim&#8217;s accounts and has deployed trojans and viruses on the victim&#8217;s system. The scammer is also blackmailing the victim by alleging that they have explicit adult content about the victim and the victim&#8217;s web browsing history. The purpose of this is to instill fear and provoke a sense of urgency in the victim.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Like the previous example, the scammer has provided a Bitcoin wallet address for the victim to make a ransom payment of $950. Additionally, the attacker has explained that the virus they&#8217;ve deployed is undetectable by antivirus software because they&#8217;ve used drivers that update the virus every few hours.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><span class=\"TextRun MacChromeBold SCXW87890010 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW87890010 BCX0\">Use of Cryptocurrency<\/span><\/span><span class=\"EOP SCXW87890010 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Cryptocurrency tools are the most common way these scammers ask for a ransom. They use this tactic because it is difficult to trace and can be sent quickly and anonymously to other platforms.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-contrast=\"auto\">We noticed that scammers were demanding ransom payments through Bitcoin wallets. So, we tried to gather statistics on the number of unique Bitcoin wallets we came across in the past month.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-167271\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.40.51.png\" alt=\"\" width=\"950\" height=\"545\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.40.51.png 950w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.40.51-300x172.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.40.51-768x441.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-09.40.51-205x118.png 205w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun SCXW34275051 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW34275051 BCX0\">Figure <\/span><span class=\"NormalTextRun SCXW34275051 BCX0\">4<\/span><span class=\"NormalTextRun SCXW34275051 BCX0\"> \u2013 Unique Bitcoin Stats for 20<\/span><\/span><span class=\"TextRun SCXW34275051 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun Superscript SCXW34275051 BCX0\" data-fontsize=\"9\">th<\/span><\/span><span class=\"TextRun SCXW34275051 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW34275051 BCX0\"> February 2023 \u2013 23<\/span><\/span><span class=\"TextRun SCXW34275051 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun Superscript SCXW34275051 BCX0\" data-fontsize=\"9\">rd<\/span><\/span><span class=\"TextRun SCXW34275051 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW34275051 BCX0\"> March 2023<\/span><\/span><span class=\"EOP SCXW34275051 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/strong><\/p>\n<p><span data-contrast=\"auto\">We checked these Bitcoin addresses to see what their transactions activities are and their reputation on the blockchain and Bitcoin abuse database.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-contrast=\"auto\">Below are some snapshots of the transaction of these addresses.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-167285\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-10.33.41.png\" alt=\"\" width=\"1044\" height=\"359\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-10.33.41.png 1044w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-10.33.41-300x103.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-10.33.41-1024x352.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-10.33.41-768x264.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-10.33.41-205x70.png 205w\" sizes=\"auto, (max-width: 1044px) 100vw, 1044px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-167299\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-10.37.22.png\" alt=\"\" width=\"1039\" height=\"344\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-10.37.22.png 1039w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-10.37.22-300x99.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-10.37.22-1024x339.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-10.37.22-768x254.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-10.37.22-205x68.png 205w\" sizes=\"auto, (max-width: 1039px) 100vw, 1039px\" \/><\/p>\n<p style=\"text-align: center;\"><em><span class=\"TextRun SCXW169336478 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW169336478 BCX0\">Figure 5 \u2013 Bitcoin received, and abuse report count for Bitcoin address<\/span><\/span><span class=\"EOP SCXW169336478 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/em><\/p>\n<p><span data-contrast=\"auto\">As illustrated in Figure 5, it is clear that the Bitcoin addresses mentioned in these extortion emails have numerous abuse reports against them. Additionally, some ransom payments have been received through these addresses.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-contrast=\"auto\">Our intelligence also collected weekly trends on how much money they had within them.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-167344\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-13.12.25.png\" alt=\"\" width=\"918\" height=\"442\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-13.12.25.png 918w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-13.12.25-300x144.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-13.12.25-768x370.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/04\/CleanShot-2023-04-18-at-13.12.25-205x99.png 205w\" sizes=\"auto, (max-width: 918px) 100vw, 918px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW147015391 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW147015391 BCX0\">Figure 6 \u2013 Total Amount received (<\/span><span class=\"NormalTextRun SCXW147015391 BCX0\">US<\/span><span class=\"NormalTextRun SCXW147015391 BCX0\"> Dollar<\/span><span class=\"NormalTextRun SCXW147015391 BCX0\">s<\/span><span class=\"NormalTextRun SCXW147015391 BCX0\">)<\/span><span class=\"NormalTextRun SCXW147015391 BCX0\"> in that week\u00a0<\/span><\/span><span class=\"EOP SCXW147015391 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW123019634 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW123019634 BCX0\">Figure 6 shows that the amount of money received in these Bitcoin addresses is increasing weekly.<\/span><span class=\"NormalTextRun SCXW123019634 BCX0\"> This implies that scammers are successfully extorting money from <\/span><span class=\"NormalTextRun SCXW123019634 BCX0\">more<\/span><span class=\"NormalTextRun SCXW123019634 BCX0\"> consumers.<\/span><\/span><span class=\"EOP SCXW123019634 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><span class=\"TextRun MacChromeBold SCXW31392595 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW31392595 BCX0\">How to avoid these frauds?<\/span><\/span><span class=\"EOP SCXW31392595 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">If you receive extortion emails, follow the steps outlined below.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Don&#8217;t make any decisions quickly and don&#8217;t panic. If you panic that will be a win for these scammers.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Mostly the stuff they scare you about in the mail is always false. As soon as you receive such think twice before sending payment emails, to block them and delete them.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Try to search important keywords on your search engines, for example, if scammers are claiming to exploit Cisco router vulnerabilities search that vulnerability with keywords like \u2018BTC\u2019, \u2018hack\u2019, and some other keywords from the email, and you will find many results which will help you to understand that the scammer&#8217;s claims are only false.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Try to discover more about the email you got, you can search for the sender\u2019s address, the subject of the mail, or even certain paragraphs from the mail on the internet. You will surely get information on how these emails are only scareware.<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Keep yourself educated on such scams so that you can protect yourself.<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Keep your antivirus updated and do timely full scans of your machines.<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Don&#8217;t surf on questionable web pages or download illegal\/cracked software.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span class=\"TextRun SCXW88715016 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW88715016 BCX0\">Despite advancements in technology, extortion frauds continue to increase as seen in this blog. However, the best defense against such <\/span><span class=\"NormalTextRun SCXW88715016 BCX0\">scams<\/span><span class=\"NormalTextRun SCXW88715016 BCX0\"> is to remain calm, and informed, and to make others aware of such frauds. By following the steps mentioned above, such as not responding to or paying any ransom demands, keeping your system and software updated, using strong passwords, and being wary of unusual emails or links, you can protect yourself from falling victim to these frauds. It is important to stay vigilant and to report any questionable activity to the <\/span><span class=\"NormalTextRun SCXW88715016 BCX0\">appropriate authorities<\/span><span class=\"NormalTextRun SCXW88715016 BCX0\">. By taking these precautions, you can help prevent yourself and others from becoming victims of extortion fraud.<\/span><\/span><span class=\"EOP SCXW88715016 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Lakshya Mathur and\u00a0Sriram P\u00a0 McAfee Intelligence observed a huge spike in extortion email frauds over the past month&#8230;.<\/p>\n","protected":false},"author":695,"featured_media":131842,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5219,15794,15793],"coauthors":[4136],"class_list":["post-167225","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-bitcoin","tag-bitcoin-wallet","tag-extortion-frauds"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Extortion Fraud is Still on the Rise | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Lakshya Mathur and\u00a0Sriram P\u00a0 McAfee Intelligence observed a huge spike in extortion email frauds over the past month. The intent of these\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Extortion Fraud is Still on the Rise | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Lakshya Mathur and\u00a0Sriram P\u00a0 McAfee Intelligence observed a huge spike in extortion email frauds over the past month. The intent of these\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-18T20:19:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-11T18:12:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/300x200_EmailHack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Extortion Fraud is Still on the Rise\",\"datePublished\":\"2023-04-18T20:19:37+00:00\",\"dateModified\":\"2023-07-11T18:12:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/\"},\"wordCount\":1157,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/300x200_EmailHack.jpg\",\"keywords\":[\"Bitcoin\",\"Bitcoin wallet\",\"Extortion Frauds\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/\",\"name\":\"Extortion Fraud is Still on the Rise | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/300x200_EmailHack.jpg\",\"datePublished\":\"2023-04-18T20:19:37+00:00\",\"dateModified\":\"2023-07-11T18:12:19+00:00\",\"description\":\"Authored by Lakshya Mathur and\u00a0Sriram P\u00a0 McAfee Intelligence observed a huge spike in extortion email frauds over the past month. The intent of these\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/300x200_EmailHack.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/300x200_EmailHack.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Extortion Fraud is Still on the Rise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Extortion Fraud is Still on the Rise | McAfee Blog","description":"Authored by Lakshya Mathur and\u00a0Sriram P\u00a0 McAfee Intelligence observed a huge spike in extortion email frauds over the past month. The intent of these","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Extortion Fraud is Still on the Rise | McAfee Blog","og_description":"Authored by Lakshya Mathur and\u00a0Sriram P\u00a0 McAfee Intelligence observed a huge spike in extortion email frauds over the past month. The intent of these","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2023-04-18T20:19:37+00:00","article_modified_time":"2023-07-11T18:12:19+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/300x200_EmailHack.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Extortion Fraud is Still on the Rise","datePublished":"2023-04-18T20:19:37+00:00","dateModified":"2023-07-11T18:12:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/"},"wordCount":1157,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/300x200_EmailHack.jpg","keywords":["Bitcoin","Bitcoin wallet","Extortion Frauds"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/","name":"Extortion Fraud is Still on the Rise | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/300x200_EmailHack.jpg","datePublished":"2023-04-18T20:19:37+00:00","dateModified":"2023-07-11T18:12:19+00:00","description":"Authored by Lakshya Mathur and\u00a0Sriram P\u00a0 McAfee Intelligence observed a huge spike in extortion email frauds over the past month. The intent of these","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/300x200_EmailHack.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/300x200_EmailHack.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/extortion-fraud-is-still-on-the-rise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Extortion Fraud is Still on the Rise"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/167225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=167225"}],"version-history":[{"count":7,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/167225\/revisions"}],"predecessor-version":[{"id":171480,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/167225\/revisions\/171480"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/131842"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=167225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=167225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=167225"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=167225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}