Sextortion

To get back in the swing of things after the summer break, let’s look at a particularly nasty cyber-attack – sextortion. To do this I am going to direct you to a series of articles on SANS Internet Storm by Jan Kopriva, looking at the attacks and how the money works and where it goes.

Sextortion – Follow the Money – SANS Internet Storm Center

Sextortion – Follow the Money Update – SANS ISC

Sextortion: Follow the Money Part 3 – The cashout begins!

Sextortion: Follow the Money – The Final Chapter – SANS ISC

Do sextortion scams still work in 2025? – SANS ISC

A quick look at sextortion at scale: 1,900 messages and 205 Bitcoin addresses spanning four years

Your Takeaway

This type of attack uses many basic weapons from a threat actor’s arsenal – if you read the articles you will start to get some of the underpinning knowledge you will need to create a robust cyber security plan for your organisation.

Or you could call us!

Clive Catton MSc (Cyber Security) – by-line and other articles

Summer Cyber Security Webinars

hack me if you can