{"id":2039,"date":"2024-02-22T00:00:00","date_gmt":"2024-02-22T00:00:00","guid":{"rendered":"https:\/\/digitalinvestigation.com\/blog\/?p=2039"},"modified":"2024-02-22T00:00:00","modified_gmt":"2024-02-22T00:00:00","slug":"cyber-extortion-examples","status":"publish","type":"post","link":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/","title":{"rendered":"Cyber Extortion Examples"},"content":{"rendered":"<p>Cyber extortion is a form of digital piracy that uses online threats to extort money or sensitive information from individuals, organizations, or companies. It has become an increasingly common occurrence, with cybercriminals taking advantage of the anonymous nature of the internet to launch more sophisticated and damaging attacks. \u00a0In this blog, we will look at some widely known cyber extortion examples and discuss how it can be prevented.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1979 size-full\" src=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/11\/cyber-extortion.jpg\" alt=\"cyber extortion\" width=\"1500\" height=\"1001\" srcset=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/11\/cyber-extortion.jpg 1500w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/11\/cyber-extortion-150x100.jpg 150w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/11\/cyber-extortion-300x200.jpg 300w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/11\/cyber-extortion-768x513.jpg 768w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/11\/cyber-extortion-1024x683.jpg 1024w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/11\/cyber-extortion-512x342.jpg 512w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/11\/cyber-extortion-920x614.jpg 920w\" sizes=\"auto, (max-width: 1500px) 100vw, 1500px\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Cyber_Extortion_Case_1_HBO_Hackers_Demand_6_Million_In_Bitcoin_Ransom\"><\/span>Cyber Extortion Case #1: HBO Hackers Demand $6 Million In Bitcoin Ransom<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In 2017, hackers broke into the HBO network and stole 1.5 terabytes of data, including episodes from the popular shows \u201c<a href=\"https:\/\/www.hbo.com\/game-of-thrones\">Game of Thrones<\/a>\u201d and \u201cCurb Your Enthusiasm\u201d. They then sent out an email to HBO executives demanding $6 million in Bitcoin ransom for the stolen data. The hackers also threatened to release more and more information if their demands were not met. Ultimately, HBO refused to pay the ransom and was able to contain most of the damage caused by the hack.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Example_of_Cyber_Extortion_2_Ransomware_Attack_on_San_Francisco_Municipal_Transportation_Agency\"><\/span>Example of Cyber Extortion #2: Ransomware Attack on San Francisco Municipal Transportation Agency<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In 2018, attackers infected hundreds of computers at <a href=\"https:\/\/www.sfmta.com\/\">San Francisco Municipal Transportation Agency<\/a> with ransomware called \u201cRyuk\u201d. The attackers demanded $73,000 in Bitcoin ransom for the release of files encrypted by Ryuk malware. Although they refused to pay, SFMTA was still forced to spend hundreds of thousands of dollars on IT repairs and lost wages due to employees not being able to access their computers while they worked on repairing them. \u00a0This incident highlights just how costly cyber extortion can be even when you don&#8217;t pay up!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Example_3_DDoS_Attack_on_Bank_of_America_Website\"><\/span>Example #3: DDoS Attack on Bank of America Website<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In 2016, a group calling themselves \u201cAnonymous Balkans\u201d launched a distributed denial-of-service (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack\">DDoS<\/a>) attack against Bank of America&#8217;s website in order to extort money from them. Anonymous Balkans threatened to launch larger attacks unless Bank of America paid them 1 million USD in Bitcoin ransom within 72 hours. Fortunately, Bank of America was able to successfully fend off this attack without giving in to the extortionists&#8217; demands but this case serves as an important reminder that companies need to take steps such as having strong cybersecurity measures in place if they want to protect themselves from these kinds of threats!<\/p>\n<p><a href=\"https:\/\/digitalinvestigation.com\/blog\/blackmail\/what-is-online-extortion\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-944 size-full\" src=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/06\/MicrosoftTeams-image-65.jpg\" alt=\"What is Online Extortion\" width=\"736\" height=\"150\" srcset=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/06\/MicrosoftTeams-image-65.jpg 736w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/06\/MicrosoftTeams-image-65-150x31.jpg 150w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/06\/MicrosoftTeams-image-65-300x61.jpg 300w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/06\/MicrosoftTeams-image-65-512x104.jpg 512w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Preventing_Cyber_Extortion\"><\/span>Preventing Cyber Extortion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>It\u2019s critical for organizations and individuals alike to take steps toward preventing cyber extortion. This includes having strong passwords on all accounts, regularly updating software programs with the latest security patches, running anti-virus scans on computers regularly, backing up data frequently, and being aware of any suspicious activity on systems or networks. Additionally, it is also imperative to train your employees on cybersecurity best practices. Organizations should ensure that they have proper procedures in place for responding to cyberattacks quickly and effectively. This includes having a dedicated team that can work together to identify potential threats and respond appropriately. They should be aware of the risks associated with <a href=\"https:\/\/digitalinvestigation.com\/blog\/blackmail\/how-to-report-online-extortion\/\">cyberextortion<\/a> and be able to recognize suspicious activity or emails that could lead to an attack.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusions\"><\/span>Conclusions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Cyber extortion is an increasingly prevalent form of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cybercrime\">cybercrime<\/a> that can cause significant damage to organizations if they are not adequately prepared for these types of attacks. It\u2019s important for everyone \u2014 from individual users up through large enterprises\u2014to understand the different types of cyber extortion threats out there and take steps to protect themselves against them. We hope these cyber extortion examples have influenced you to take proactive measures such as using strong passwords, backing up data regularly, and staying up-to-date on security patches, you can help keep your organization safe from these types of threats.<\/p>\n","protected":false},"excerpt":{"rendered":"Cyber extortion is a form of digital piracy that uses online threats to extort money or sensitive information&hellip;","protected":false},"author":1,"featured_media":2040,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-2039","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-online-harassment","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>3 Cyber Extortion Examples and Ways To Prevent Cyberextortion<\/title>\n<meta name=\"description\" content=\"We will look at some widely known Cyber Extortion Examples and discuss how it can be prevented. Don\u2019t forget to read this to protect yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Cyber Extortion Examples and Ways To Prevent Cyberextortion\" \/>\n<meta property=\"og:description\" content=\"We will look at some widely known Cyber Extortion Examples and discuss how it can be prevented. Don\u2019t forget to read this to protect yourself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/\" \/>\n<meta property=\"og:site_name\" content=\"Articles on Sextortion &amp; Blackmail - Expert Advice on the Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PDInvestigate\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-22T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/11\/cyber-extortion.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1001\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Derek J. Langford\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"3 Cyber Extortion Examples and Ways To Prevent Cyberextortion\" \/>\n<meta name=\"twitter:description\" content=\"We will look at some widely known Cyber Extortion Examples and discuss how it can be prevented. Don\u2019t forget to read this to protect yourself.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/11\/cyber-extortion.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@PDInvestigate\" \/>\n<meta name=\"twitter:site\" content=\"@PDInvestigate\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek J. Langford\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/cyber-extortion-examples\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/cyber-extortion-examples\\\/\"},\"author\":{\"name\":\"Derek J. Langford\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/person\\\/898a7a205c38960db07f9a490d1c3d82\"},\"headline\":\"Cyber Extortion Examples\",\"datePublished\":\"2024-02-22T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/cyber-extortion-examples\\\/\"},\"wordCount\":589,\"publisher\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/cyber-extortion-examples\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/cyber-extortion-examples.jpg\",\"articleSection\":[\"Harassment Prevention\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/cyber-extortion-examples\\\/\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/cyber-extortion-examples\\\/\",\"name\":\"3 Cyber Extortion Examples and Ways To Prevent Cyberextortion\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/cyber-extortion-examples\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/cyber-extortion-examples\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/cyber-extortion-examples.jpg\",\"datePublished\":\"2024-02-22T00:00:00+00:00\",\"description\":\"We will look at some widely known Cyber Extortion Examples and discuss how it can be prevented. Don\u2019t forget to read this to protect yourself.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/cyber-extortion-examples\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/cyber-extortion-examples\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/cyber-extortion-examples\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/cyber-extortion-examples.jpg\",\"contentUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/cyber-extortion-examples.jpg\",\"width\":736,\"height\":150,\"caption\":\"Cyber Extortion Examples\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/cyber-extortion-examples\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Extortion Examples\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\",\"name\":\"Articles on Sextortion & Blackmail - Expert Advice on the Blog\",\"description\":\"Expert Advice on Sextortion &amp; Blackmail in Articles from Digital Investigators. Stop Being a Victim. Learn How To Mitigate The Situation In 24h Or Less\",\"publisher\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\",\"name\":\"Digital Investigations\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/digital-investigation-logo.png\",\"contentUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/digital-investigation-logo.png\",\"width\":216,\"height\":65,\"caption\":\"Digital Investigations\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PDInvestigate\",\"https:\\\/\\\/x.com\\\/PDInvestigate\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/digitalinvestigation\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCc5KctfM3-tMserIsMhWUrg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/person\\\/898a7a205c38960db07f9a490d1c3d82\",\"name\":\"Derek J. Langford\",\"description\":\"Derek J. Langford is the author of the Digital Investigation blog. He is 36 years old and has two children. He advises people on how to protect themselves from blackmail, sextortion, cyberbullying, and online harassment.\",\"sameAs\":[\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"3 Cyber Extortion Examples and Ways To Prevent Cyberextortion","description":"We will look at some widely known Cyber Extortion Examples and discuss how it can be prevented. Don\u2019t forget to read this to protect yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/","og_locale":"en_US","og_type":"article","og_title":"3 Cyber Extortion Examples and Ways To Prevent Cyberextortion","og_description":"We will look at some widely known Cyber Extortion Examples and discuss how it can be prevented. Don\u2019t forget to read this to protect yourself.","og_url":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/","og_site_name":"Articles on Sextortion &amp; Blackmail - Expert Advice on the Blog","article_publisher":"https:\/\/www.facebook.com\/PDInvestigate","article_published_time":"2024-02-22T00:00:00+00:00","og_image":[{"width":1500,"height":1001,"url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/11\/cyber-extortion.jpg","type":"image\/jpeg"}],"author":"Derek J. Langford","twitter_card":"summary_large_image","twitter_title":"3 Cyber Extortion Examples and Ways To Prevent Cyberextortion","twitter_description":"We will look at some widely known Cyber Extortion Examples and discuss how it can be prevented. Don\u2019t forget to read this to protect yourself.","twitter_image":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/11\/cyber-extortion.jpg","twitter_creator":"@PDInvestigate","twitter_site":"@PDInvestigate","twitter_misc":{"Written by":"Derek J. Langford","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/#article","isPartOf":{"@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/"},"author":{"name":"Derek J. Langford","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/person\/898a7a205c38960db07f9a490d1c3d82"},"headline":"Cyber Extortion Examples","datePublished":"2024-02-22T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/"},"wordCount":589,"publisher":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#organization"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/12\/cyber-extortion-examples.jpg","articleSection":["Harassment Prevention"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/","url":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/","name":"3 Cyber Extortion Examples and Ways To Prevent Cyberextortion","isPartOf":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/#primaryimage"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/12\/cyber-extortion-examples.jpg","datePublished":"2024-02-22T00:00:00+00:00","description":"We will look at some widely known Cyber Extortion Examples and discuss how it can be prevented. Don\u2019t forget to read this to protect yourself.","breadcrumb":{"@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/#primaryimage","url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/12\/cyber-extortion-examples.jpg","contentUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/12\/cyber-extortion-examples.jpg","width":736,"height":150,"caption":"Cyber Extortion Examples"},{"@type":"BreadcrumbList","@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/cyber-extortion-examples\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digitalinvestigation.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Extortion Examples"}]},{"@type":"WebSite","@id":"https:\/\/digitalinvestigation.com\/blog\/#website","url":"https:\/\/digitalinvestigation.com\/blog\/","name":"Articles on Sextortion & Blackmail - Expert Advice on the Blog","description":"Expert Advice on Sextortion &amp; Blackmail in Articles from Digital Investigators. Stop Being a Victim. Learn How To Mitigate The Situation In 24h Or Less","publisher":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digitalinvestigation.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/digitalinvestigation.com\/blog\/#organization","name":"Digital Investigations","url":"https:\/\/digitalinvestigation.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/05\/digital-investigation-logo.png","contentUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/05\/digital-investigation-logo.png","width":216,"height":65,"caption":"Digital Investigations"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PDInvestigate","https:\/\/x.com\/PDInvestigate","https:\/\/www.linkedin.com\/company\/digitalinvestigation","https:\/\/www.youtube.com\/channel\/UCc5KctfM3-tMserIsMhWUrg"]},{"@type":"Person","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/person\/898a7a205c38960db07f9a490d1c3d82","name":"Derek J. Langford","description":"Derek J. Langford is the author of the Digital Investigation blog. He is 36 years old and has two children. He advises people on how to protect themselves from blackmail, sextortion, cyberbullying, and online harassment.","sameAs":["https:\/\/digitalinvestigation.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/2039","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/comments?post=2039"}],"version-history":[{"count":0,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/2039\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/media\/2040"}],"wp:attachment":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/media?parent=2039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/categories?post=2039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/tags?post=2039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}