Different Online Extortion Types:
Different Online Extortion Types:

Ransomware
- Ransomware is a malicious form of malware that encrypts a victim’s digital files that renders them inaccessible.
- The attacker then demands a ransom, often in cryptocurrency due to its anonymous nature, in exchange for the decryption key.
- This type of cyberattack can target individuals, but its impact is especially devastating for organizations, as it can halt important day-to-day operations.
- The motivation behind these attacks is primarily financial, but the repercussions for the victim can extend beyond monetary loss to include data breaches and reputational damage.
Sextortion
- Sextortion is a sinister form of blackmail wherein a perpetrator usually threatens to distribute compromising or intimate images or videos of persons affected unless certain demands, typically monetary, are met.
- These images might have been acquired without the plaintiff’s knowledge, via cyberattacks, or from past consensual exchanges.
- Unfortunately, today’s society amplifies digital outreach and speed of these threats on the web, which makes the spread of information on the internet both be swift and often irretrievable.
Doxing Extortion
- Doxing extortion revolves around the threat or act of releasing personal information about someone online without their consent.
- This information can range from addresses and phone numbers to workplace details and family connections.
- By exposing this data, attackers can put the victim at risk of physical harm, harassment, or discrimination.
- The main goal of this type of extortion is often to intimidate or coerce the victim into some form of compliance, whether it’s payment, silence, or another form of submission.
Business Email Compromise (BEC)
- BEC is a more sophisticated scam that targets businesses usually through deceptive emails that appear legitimate.
- In these attacks, cybercriminals may impersonate executives or high-ranking officials to deceive employees into transferring money or sharing sensitive data, like phishing.
- These emails can be highly convincing in some cases which can leverage information about a company and its operations.
- Due to the subterfuge, BEC scams are able to go unnoticed until significant damage has been done.
Threats to Physical Safety
- Online threats to physical safety involve direct or indirect messages of bodily harm to a person, usually accompanied by a demand.
- These threats can manifest on social platforms, through emails, or other digital mediums.
- Often leveraging anonymity, attackers can instill fear in their victims, causing psychological distress and creating a pressing urgency to comply with demands, which may range from financial payments to other forms of retribution.
Reputation Threats
- Reputation threats, in the digital realm, concern the deliberate intent to tarnish an individual’s or organization’s standing, both online and offline.
- Perpetrators might threaten to spread false information, negative reviews, or damaging narratives unless their demands are met.
- In today’s interconnected world, where public perception can make or break opportunities, these threats carry significant weight, pushing victims to desperate measures to safeguard their reputations.
New York Laws:
In New York, online extortion may fall under several statutes:
Penal Law § 135.60 – Coercion in the Second Degree: When a person compels or induces another to engage in conduct or to abstain from engaging in lawful conduct by instilling a fear that, if the demand is not complied with, the actor will:
- Cause physical injury to someone;
- Cause damage to property;
- Engage in other conduct constituting a crime; or
- Expose a secret or publicize an asserted fact.
Penal Law § 135.65 – Coercion in the First Degree: This includes compelling or inducing another to:
- Abstain from engaging in lawful conduct;
- Commit or attempt a felony;
- Cause or attempt to cause physical injury to a third person, or to commit a sexual conduct offense;
- Violate his or her duty as a public servant.
- Cybercrimes: New York also has laws specifically tailored to cybercrimes, such as unauthorized use of a computer, computer trespass, and computer tampering.
Illinois Laws (Including Chicago):
In Illinois, the following laws could be relevant to online extortion:
Criminal Code 720 ILCS 5/12-6 – Intimidation: A person commits intimidation when, with intent to cause another to perform or to omit the performance of any act, he or she communicates to another a threat to perform without lawful authority:
- Inflict physical harm;
- Subject any person to physical confinement or restraint;
- Commit a felony or a Class A misdemeanor; or
- Accuse any person of an offense.
Criminal Code 720 ILCS 5/15-20 – Computer Tampering: This law addresses unauthorized access, causing a computer to malfunction, or inserting or attaching an unauthorized program or virus.
Criminal Code 720 ILCS 5/17-51 – Identity Theft: Using personal identification information or personal identification documents of another for fraudulent purposes.
Criminal Code 720 ILCS 5/17-56 – Deceptive Practices: This includes causing another, by deception or threat, to execute a document disposing of property or a document by which a pecuniary obligation is incurred.
Centurion’s Expertise Against Digital Blackmail
- When facing online extortion, having an authentic legal response with Centurion Law Firm can make all the difference.
- Our attorneys have extensive expertise in digital environments and are well-versed in the legal strategies to combat cyber threats.
- We prioritize the safety and confidentiality of those affected, working diligently to neutralize threats and ease your emotional disposition.
- With Centurion’s compassion and dedicated commitment, individuals and businesses can navigate these digital challenges confidently, assuring that your personal and professional integrity remains uncompromised.
Book an appointment with one of our attorneys today.