• Extortion

Attack Type: Extortion

Extortion attacks use fear and intimidation to pressure you into paying money or handing over sensitive information. These emails often claim the sender has access to private data, recordings, or control over your systems and threaten to release it unless you comply. The goal is to scare you into acting quickly, usually by demanding payment in cryptocurrency.
Sextortion is a common version, where attackers claim to have recorded you through your webcam and threaten to share the footage unless you pay. To make the threat more believable, they might include a password from an old data breach or refer to a personal detail scraped from the web.
Other versions can be more extreme, such as threats of physical harm, fake hitman contracts, or warnings that your company will be taken offline in a DDoS attack. While most of these messages are completely fake, they’re designed to feel personal and urgent. Even when they’re not real, they can cause real anxiety. That’s why it’s important to report them and avoid responding or paying.
Detection Methods (8):
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Encrypted Microsoft Office Files From Untrusted Senders
14d ago
Jun 4th, 2025 UTC
Sublime Security
BEC/Fraud
Callback Phishing
Credential Phishing
Extortion
Malware/Ransomware
Spam
Encryption
Evasion
File analysis
YARA
Sender analysis
/feeds/core/detection-rules/encrypted-microsoft-office-files-from-untrusted-senders-eb7b26e7
Extortion / Sextortion in Attachment From Untrusted Sender
16d ago
Jun 2nd, 2025 UTC
Sublime Security
Extortion
Social engineering
Spoofing
Computer Vision
Content analysis
File analysis
Natural Language Understanding
Optical Character Recognition
Sender analysis
/feeds/core/detection-rules/extortion-sextortion-in-attachment-from-untrusted-sender-3cb8d32c
Extortion / sextortion (untrusted sender)
16d ago
Jun 2nd, 2025 UTC
Sublime Security
Extortion
Social engineering
Spoofing
Content analysis
Header analysis
Natural Language Understanding
Sender analysis
/feeds/core/detection-rules/extortion-sextortion-untrusted-sender-265913eb
Brand Impersonation: Vanguard
2mo ago
Apr 11th, 2025 UTC
Sublime Security
BEC/Fraud
Callback Phishing
Credential Phishing
Extortion
Malware/Ransomware
Spam
Impersonation: Brand
Natural Language Understanding
Header analysis
Sender analysis
/feeds/core/detection-rules/brand-impersonation-vanguard-3bd048fe
Brand Impersonation: WeTransfer
3mo ago
Mar 12th, 2025 UTC
Sublime Security
BEC/Fraud
Callback Phishing
Credential Phishing
Extortion
Malware/Ransomware
Spam
Impersonation: Brand
Content analysis
Header analysis
Sender analysis
/feeds/core/detection-rules/brand-impersonation-wetransfer-e37885ad