Ransomware & Extortion Emails
The "hostage" attack. This section covers two types of "extortion" mail: 1) Ransomware (where a "malware" payload locks your files) and 2) "Sextortion" (where a scammer claims to have compromising info on you and demands payment).
Questions about Ransomware & Extortion Emails
What is ransomware?
How does ransomware spread via email?
What are ransom phishing scams (fake threats)?
How do extortion email scams work?
How do fake “hacked your webcam” scams operate?
What are sextortion scams?
How do Bitcoin wallet threats get distributed?
How do filters detect ransom or blackmail patterns?
What’s the difference between scareware and ransomware?
How can DMARC reduce fake “from yourself” ransom emails?
How do spoofed “CEO” ransom requests work?
How can mailbox rules be abused for ransomware persistence?
How to report ransomware-related phishing emails?