Beyond ransomware: Navigating the perils of cyber extortion

As cybercriminals evolve their tactics, businesses must strengthen their defenses to protect against the growing threat of cyber extortion.

Cyber extortion has become one of the most sophisticated forms of cybercrime, outpacing traditional ransomware attacks in both complexity and targeted precision. Unlike the broad, indiscriminate ransomware assaults of the past, cyber extortionists now focus on specific companies, holding sensitive data hostage with the threat of public exposure unless a ransom is paid. According to Doros Hadjizenonos, regional director at Fortinet, relying solely on traditional firewalls and endpoint protection is no longer sufficient to counter this escalating threat.

“We’re witnessing a hybrid of traditional ransomware and cyber extortion where attackers encrypt and exfiltrate data, threatening to release it publicly,” explains Hadjizenonos. “Whether it’s ransomware, cyber extortion, or a blend of both, attackers often exploit vulnerabilities in systems or through human error to gain access to sensitive data.”

Adding to the complexity of the problem is the role of artificial intelligence (AI), which has empowered both cybercriminals and cybersecurity professionals. Hadjizenonos notes that AI makes it easier for criminals with little technical experience to generate code or craft phishing emails that sound convincing. The more serious danger arises when malware is enhanced with AI capabilities, which can adapt and avoid detection. However, AI is also being used extensively to detect anomalies and suspicious behavior within networks, providing a crucial line of defense.

Preparing for the Worst

The consequences of a successful cyber extortion attack can be financially devastating and ruinous to an organisation’s reputation. While financial institutions and major retailers are frequent targets, smaller businesses connected to larger networks are increasingly vulnerable. These connections present significant risks, requiring firms to be vigilant about third-party access and the security gaps it can create.

“When protecting the organisation, businesses must consider any connections to third parties,” Hadjizenonos advises. He also stresses the importance of cyber insurance and an effective incident response plan, with real-world testing of that plan being essential to identifying weaknesses before an attack occurs.

Companies must understand the potential fallout from cyber extortion and be prepared for hard decisions, such as whether to pay the ransom. “Even if you pay, there’s no guarantee you’ll get your data back or receive the encryption key. The decision to pay or not is fraught with complications, especially if extremely sensitive data is at stake,” Hadjizenonos says.

The Human Element: A Key Vulnerability

Technology plays a vital role in defending against cyber extortion, but human error remains one of the most significant vulnerabilities. Cyber extortionists often employ sophisticated social engineering tactics to exploit individuals within an organisation, using personal information gathered from social media to craft highly convincing phishing schemes.

“Everyone is susceptible to this,” Hadjizenonos points out. “It takes just one email, well-timed and crafted to elicit an emotional response, for an employee to click a malicious link. This is why regular employee training and heightened awareness are critical in preventing cyber extortion.”

A Multi-Layered Approach to Cyber Extortion

So, what can organisations do to prevent cyber extortion? Hadjizenonos advocates for a robust, multi-layered cybersecurity strategy that covers all potential entry points. “Data is everywhere—whether it’s in the cloud, on employee laptops, or with third-party vendors—so a unified cybersecurity platform is essential. A comprehensive security approach, such as Fortinet’s Security Fabric, integrates multiple technologies to cover the entire attack surface,” he explains.

While no system is entirely foolproof, organisations can greatly reduce their exposure to cyber extortion by adopting layered cybersecurity defenses. “Effective measures and a comprehensive approach to cybersecurity are critical steps toward protecting valuable data from increasingly complex threats,” Hadjizenonos concludes.

Read next: Bridging the Cybersecurity Disconnect Between Boards and CISOs

More

News

Sign up to our newsletter to get the latest in digital insights. sign up

Welcome to Ventureburn

Sign up to our newsletter to get the latest in digital insights.