{"id":2436,"date":"2017-02-07T00:00:00","date_gmt":"2017-02-07T00:00:00","guid":{"rendered":"https:\/\/crypto-economy.com\/2017\/02\/07\/rise-in-the-cyber-extortions-for-cryptocurrency\/"},"modified":"2017-02-07T00:00:00","modified_gmt":"2017-02-07T00:00:00","slug":"rise-in-the-cyber-extortions-for-cryptocurrency","status":"publish","type":"post","link":"https:\/\/crypto-economy.com\/rise-in-the-cyber-extortions-for-cryptocurrency\/","title":{"rendered":"Rise in the cyber extortions for cryptocurrency"},"content":{"rendered":"

In the last years, the cryptocurrency has been a way of saving pretty used, not only that, also the use of these cyber currencies in multiple operations inside the Internet had increased. But not only the good things are rising when is about cryptocurrency\u2019s world; there are some negative aspects of these cyber currencies that are significantly rising and we don\u2019t usually listen to in the news. Although we don\u2019t listen or see it, it is happening, and one of the most disturbing examples of this is the rise in the cyber extortions for cryptocurrency<\/strong>.<\/p>\n

Cyber extortions for cryptocurrency<\/h2>\n

The extortions have existed since long time ago; they are an ancient method to take something from someone through threats. However, the extortions for cryptocurrency<\/strong> were not that common, we didn\u2019t even knew of them from the news, until some time ago. While the cases of these extortions haven\u2019t gone to alarming numbers, they had kept increasing; being most of these cases cyber extortion.<\/p>\n

How does these cyber extortion works?<\/h3>\n

The procedure is pretty complicated; firstly because the person that extorts must have access to something the extorted person has and that has a great value for him, this is generally some kind of vital information, and this isn\u2019t something easy to get because you need to have some advanced knowledge in hacking to do this. The next step is to hijack the vital info to then request the \u201creward<\/em>\u201d, which is cryptocurrency in this case. For the extortionist, the cryptocurrency represents a great advantage, because these are pretty hard to track, maybe almost impossible if you don\u2019t know what you are looking for.<\/p>\n

For a better understanding of these procedures, let\u2019s see a practical example, extortion to a medical center. In this case the extortionist, hacker or group of hackers had gotten the vital info of the patients of the targeted medical center. These hackers could then ask for the cryptocurrency as a pay to return the vital info from the patients. And this is just an example of how cyber extortion for cryptocurrency <\/strong>works.<\/p>\n

Physical risks of cyber extortion<\/h2>\n

Most of the times, these extortions are cybernetic; however, there has been cases of extortion for cryptocurrency that had gone physicals in some places around the world. One of these cases is the known case of the poisoned Nutella that occurred in a supermarket in Germany. This is just an example of the rise of the extortions for cryptocurrency<\/strong> in the last years; where some of the extortions get out of the virtual world, bringing with them physical consequences. There isn\u2019t any fatal victim until now, however, the best is to prevent these kind of extortion to keep rising and stop it before it gets out of control.<\/p>\n","protected":false},"excerpt":{"rendered":"

In the last years, the cryptocurrency has been a way of saving pretty used, not only that, also the use of these cyber currencies in multiple operations inside the Internet had increased. But not only the good things are rising when is about cryptocurrency\u2019s world; there are some negative aspects of these cyber currencies that … <\/p>\n

Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":2437,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[84,74],"tags":[],"_links":{"self":[{"href":"https:\/\/crypto-economy.com\/wp-json\/wp\/v2\/posts\/2436"}],"collection":[{"href":"https:\/\/crypto-economy.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/crypto-economy.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/crypto-economy.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/crypto-economy.com\/wp-json\/wp\/v2\/comments?post=2436"}],"version-history":[{"count":0,"href":"https:\/\/crypto-economy.com\/wp-json\/wp\/v2\/posts\/2436\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/crypto-economy.com\/wp-json\/wp\/v2\/media\/2437"}],"wp:attachment":[{"href":"https:\/\/crypto-economy.com\/wp-json\/wp\/v2\/media?parent=2436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/crypto-economy.com\/wp-json\/wp\/v2\/categories?post=2436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/crypto-economy.com\/wp-json\/wp\/v2\/tags?post=2436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}