Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    cybercriminals turn to threats of violence

    May 14, 2026

    Establishing AI and data sovereignty in the age of autonomous systems

    May 14, 2026

    Mobile Computing Doesn’t Have to Be Bland

    May 14, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»cybercriminals turn to threats of violence
    IT/ Cybersecurity

    cybercriminals turn to threats of violence

    big tee tech hubBy big tee tech hubMay 14, 2026003 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    cybercriminals turn to threats of violence
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    For years, ransomware has been a crime committed at arm’s length. Hackers in one country, victims in another. The only weapon is the hackers’ threat to release stolen data, or leave your systems permanently encrypted.

    But that’s changing.

    As a BBC News report describes, a growing number of online extortionists are no longer content with locking up your files and threatening to leak your data. Instead, they are making threats to hurt their victims. Or their families. Or staff who refuse to pay up.

    A study last year by identity security firm Semperis found that 40% of ransomware attacks saw criminals threatening physical violence against employees who refused to pay.

    In the United States that figure rose to 46%.

    A spokesperson for Semperis, which helps organisations negotiate with ransomware attackers, told BBC News that one gang had left a threatening note on his own doorstep while he was working an incident for a US government agency.

    In another case, Zac Warren of security firm Tanium described how a ransomware-hit hospital had received phone calls, where callers asked for nurses by name, and then recited their home addresses and social security numbers down the line.

    The theory is that hackers themselves are unlikely want to get their own hands dirty in such intimidatory tactics, but instead post on message boards, offer cash, and recruit somebody local to do it for them.

    I guess you can call it violence-as-a-service.

    And the FBI has been taking note. Last summer it issued an alert about the loose-affiliated cybercriminal network known as “The Com”, which is said to have sometimes resorted to violent tactics such as throwing bricks through windows, arson, kidnapping, and even shootings.

    Some of the most disturbing instances of cybercrime spilling out into physical violence can be found where cryptocurrency and organised crime intertwine.

    Last May, French police rescued the father of a cryptocurrency millionaire who had been kidnapped and held for ransom in a Paris suburb. According to reports the victim had one of his fingers cut off. More than 18 similar attacks against holders of large sums of cryptocurrency holders were reported across Europe last year.

    With physical threats seemingly becoming more common than ever before, it’s clearly important for defenders to learn some lessons.

    Firstly, the personal information held by a company about its staff – such as home addresses and family details – must be considered critically important to protect. If hackers break into your network you are not just facing the threat of customer records and intellectual property being stolen, but also the material which could be used for intimidation.

    Secondly, incident response plans must be looked at again. It is one thing to have a plan for restoring your company from backups, but it is quite another to have a plan for what to do when a member of staff takes a phone call from a stranger who knows their home address.



    Source link

    cybercriminals threats turn violence
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    West Pharmaceutical says hackers stole data, encrypted systems

    May 14, 2026

    Android Adds Intrusion Logging for Sophisticated Spyware Forensics

    May 13, 2026

    How Two Hours Felt Bigger Than My To-Do List

    May 12, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    cybercriminals turn to threats of violence

    May 14, 2026

    Establishing AI and data sovereignty in the age of autonomous systems

    May 14, 2026

    Mobile Computing Doesn’t Have to Be Bland

    May 14, 2026

    From commit to cloud: Powering what’s next for PostgreSQL | Microsoft Azure Blog

    May 14, 2026
    Timer Code
    15 Second Timer for Articles
    20
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    cybercriminals turn to threats of violence

    May 14, 2026

    Establishing AI and data sovereignty in the age of autonomous systems

    May 14, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.