The Lawfare Podcast cover image

Charl van der Walt on Cyber Extortion

The Lawfare Podcast

00:00

The Evolution of Extortion

The typical methodology involved deploying malware to encrypt computers. But when the victim was able to recover independently, that prompted an evolution in the crime into what is generally called double extortion. They not only encrypted the data, but also threatened to leak the data. Another form of extortion might be the threat of a denial of service attack.

Play episode from 25:15
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app