Extortion scam

Protect your employees from getting extorted with plaintext emails that bypass traditional detection systems.

solution_extortion_hero_visual_n
Problem

Plaintext emails exploiting human fear

Most extortion scams bypass detection with simple plaintext emails. These emails are not detected by traditional security because do not contain any known malicious indicators such as links and attachments. 

Instead of targeting an organization, extortion scams threaten individual employees. Attackers claim to have obtained compromising material and threaten to release that information unless the victim pays the ransom.

solution_extortion_problem_email
Solution

How xorlab detects and blocks extortion scams

xorlab learns typical communication patterns and identifies language or claims that deviate from a sender’s usual behavior. It detects anomalies in email content, focusing on discrepancies that signal potential threats.

The platform analyzes emails for warning signs like cryptocurrency wallet addresses or suspicious payment requests. By blocking these emails before they reach users, xorlab prevents fear and pressure tactics from taking hold.

solution_extortion_solution_visual_1

Extortion scam techniques and characteristics

impersonation_light

Fear Tactics

Attackers claim to have hacked accounts or systems and threaten to leak sensitive information.

money_light

Ransom Demands

Victims are instructed to pay the ransom in crypto currency, making the attackers hard to trace.

target_light

Broad Targeting

Attacks use generic threats and are distributed through mass email campaigns to intimidate a wide audience.

folder_ulocked_light

Inconsistent Claims

Attackers usually do not have the data they claim, but rely solely on the victim's fear instead.

email_alert_light

Low Sophistication

Attacks typically use simple email tactics without real system compromise or technical infiltration.

Within the MITRE ATT&CK® Matrix, extortion scam maps to Financial Theft as one of the techniques aimed at the tactical objective of Impact.

Resource center

 

tracebility_icon_light

Ciso Guide

Explore our ebook about smarter email security – an attacker-centric, proactive approach.

magnifier_light

News

How attackers leverage the trust of GitHub to launch targeted phishing attacks.

settings_locked_light

Attack simulation

Stress test your email security with our realistic email attack simulation.

Pen-test your email security

False negatives causing extra work? Unsure of your protection against extortion scams? Identify gaps with xorlab's Email Attack Simulation.

attack_similuation_landingpage_hero_visual_attacks

Trusted by organizations with highest security needs