Only a handful of hackers are responsible for all email extortion attacks

Hacker/security
Image Credit: Pixabay (Image credit: TheDigitalArtist / Pixabay)

A remarkably small number of cybercriminals are reportedly responsible for all the world's email extortion attempts, new research has claimed. 

Security firm Barracuda Networks, in partnership with Columbia University, looked at over 300,000 emails in a one-year period that the company's AI detectors had flagged as extortion attacks, and found that the vast majority were the work of only a few attackers, relatively speaking.

The findings were estimated by checking the addresses of the bitcoin wallets written in the emails, as this is the preferred way cybercriminals wish to be paid by their victims, since there are no questions asked about the identities or legality of transactions in the realm of cryptocurrency.

Bitcoin payments

The research found that only 100 bitcoin addresses appeared in about 80% of all the emails. 

The report's author, Columbia Master's student Zixi (Claire) Wang, noted that the number of Bitcoin addresses doesn't necessarily equate to the number of attackers; the real figure is likely, "fewer than 100 attackers, and probably an even smaller number than that, assuming attackers use multiple bitcoin addresses." 

The money requested in these attacks was also quite low, with a quarter of emails asking for less than $1,000 and over 90% less than $2,000. Wang speculated that this is because victims are more likely to payout lower amounts and less likely to investigate the legitimacy of the compromise (often attackers merely talk a good game without hacking anything). The low amounts would also not "raise alarms with the victim’s bank or tax authorities."

Bitcoin was the only cryptocurrency used by the attackers in the dataset, and Wang reckoned that this was because "Bitcoin is largely anonymous, transactions use wallet addresses, and anyone can generate as many wallet addresses as they would like."

The types of scams that the attackers run involve claims that they have ascertained compromising photos or videos of their target, via the hacking of their device's camera, and threaten to release them unless their demands are met. But as aforementioned, the majority are lying and have no such content or infected the target system with any malware.

Wang believes that the small number of perpetrators worldwide is a positive sign, because "if law enforcement is able to track down even a small number of these attackers, they can significantly disrupt this threat."

Also, "since extortion attackers seem to be copying each other and following very similar templates, email security vendors should be able to block a large percentage of these attacks with relatively simple detectors."

Lewis Maddison
Reviews Writer

Lewis Maddison is a Reviews Writer for TechRadar. He previously worked as a Staff Writer for our business section, TechRadar Pro, where he had experience with productivity-enhancing hardware, ranging from keyboards to standing desks. His area of expertise lies in computer peripherals and audio hardware, having spent over a decade exploring the murky depths of both PC building and music production. He also revels in picking up on the finest details and niggles that ultimately make a big difference to the user experience.

Read more
Shopping scams
New wave of sextortion scams uses personal details and images to intimidate targets while bypassing traditional security measures
Shutterstock.com / kanlaya wanon
Microsoft Teams abused in Russian email bombing ransomware campaign
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
A person at a laptop with a cybersecure lock symbol floating above it.
Cybercrime gang targets victims with "triple threat" attacks
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Help! We're drowning in email spam, it's about to get worse and there's nothing we can do to stop it
Image of laptop infected with malware
Ransomware criminals are now sending their demands...by snail mail?
Latest in Pro
cybersecurity
What's the right type of web hosting for me?
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
construction
Building in the digital age: why construction’s future depends on scaling jobsite intelligence
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras