To get back in the swing of things after the summer break, let’s look at a particularly nasty cyber-attack – sextortion. To do this I am going to direct you to a series of articles on SANS Internet Storm by Jan Kopriva, looking at the attacks and how the money works and where it goes.
Sextortion – Follow the Money – SANS Internet Storm Center
Sextortion – Follow the Money Update – SANS ISC
Sextortion: Follow the Money Part 3 – The cashout begins!
Sextortion: Follow the Money – The Final Chapter – SANS ISC
Do sextortion scams still work in 2025? – SANS ISC
A quick look at sextortion at scale: 1,900 messages and 205 Bitcoin addresses spanning four years
Your Takeaway
This type of attack uses many basic weapons from a threat actor’s arsenal – if you read the articles you will start to get some of the underpinning knowledge you will need to create a robust cyber security plan for your organisation.
Or you could call us!
Clive Catton MSc (Cyber Security) – by-line and other articles
Summer Cyber Security Webinars
The summer webinar series has started. It is not too late to sign up for the rest of the series and then you can get access to the recording of the episodes you missed.


