loader
banner

Sextortion is a new age cyber abuse that threatens reputational loss of the victim. The entire cybercrime is rooted in manipulation and blackmailing for extorting personal favours and money. The issue is more concerning as often victims are too afraid or ashamed of reporting sextortion cases.

With access to high-speed data at cheaper rates and heavy usage of social media platforms, sextortion cases are reporting a steep surge. Organizations may get affected too in case the offenders ask for business information as ransom or try maligning the brand’s name by releasing inappropriate pictures/ videos of an employee. Therefore, it is necessary that both organisations and
employees undertake appropriate precautions and practice due diligence while engaging in online activities.

Modus Operandi-

Four Phases of Victimisation

  • Target Victims – Often those using dating or social media apps without much cybersecurity checks in place.
  • Gather Information – Either by befriending the target or using malpractices like hacking.
  • Convincing Phase – By manipulating and winning the trust of the targets on pretext of being a friend or a well-wisher.
  • Harassment – Blackmailing the victims using sensitive/personal information against them to further draw compromised contents, personal favours or even ransom.

Modes of Victimisation

  • Dating Apps
  • Social Media Platforms (Facebook, Instagram,etc)
  • Instant messaging apps and Emails (WhatsApp, Snapchat,etc)
  • Phishing and Hacking
  • Direct SMS using fraudulent links
  • Gaming Platforms
  • Acquaintance or known contacts

Target Victims

victims

Impacts

impacts
Threats

Safety Tools on Social Media Platforms

Recommendations

For Organizations

  • Advised to regularly update internal cybersecurity mechanism, invest in good antivirus software on office appliances.
  • Ensure strict hygiene checks of online activities of employees using office devices or official email/social media accounts.
  • Host knowledge sessions to generate awareness on cybersecurity and safe social media practices.
Threats1

For Individuals

do does
image 026

Important Contacts and Links in India-

Subscribe Our Newsletter

Book a Demo

Please enable JavaScript in your browser to complete this form.
How long would you like the demo to be?
Are you using any Analysis tool or had used before ?
LinkedIn, Friends of Friend, etc.