![extortion emails extortion emails](https://univista.com/wp-content/uploads/2018/10/Extortion-Email-Ex.png)
Artificial intelligence-based protection can identify attacks based on what normal communication looks like, including the tone of voice used by individuals. There are a number of steps you can take to protect your users against extortion:ĪI-based protection - Attackers are adapting extortion emails to bypass email gateways and spam filters, so a good spear-phishing solution that protects against extortion is a must. Attackers will use reputable email services like Gmail, vary and personalize the content of each message, and avoid including links or attachments - all in an effort to slip through security. These attacks are becoming personalized and get sent out in smaller numbers to avoid detection. However, like with many other types of email fraud, scammers are evolving their techniques to bypass email security and land in users’ inboxes. Most of these emails will be caught in spam filters. Usually, extortion email messages are part of larger spam campaigns and are sent out to thousands at a time. Each email will contain payment demands with Bitcoin wallet details included inside the message. They will either spoof the victim’s email address pretending to have access to it or claim to have personal or compromising information that they will use against the victim.
![extortion emails extortion emails](https://2.bp.blogspot.com/-FkVibQ2zO4Q/XI49fY6pt6I/AAAAAAAAALg/Q1XdCclUB8w1xAKfPU1M0dPa4IFUj8iAgCLcBGAs/s1600/cr.jpg)
Attackers harvest stolen email addresses and passwords from past data breaches and use them in threatening email messages to add to the victims’ fears.