Skip to Content

Cybersecurity Knowledge Base

CyberPedia


Your essential guide to cybersecurity threats, attacks, and defenses. Understand the risks. Protect your business.

Extortion Emails


Overview

Extortion emails are blackmail messages sent by criminals who claim to have damaging information about you and demand payment to keep it secret. They often insist they have “hacked your router,” “recorded you,” or “stolen your data,” and threaten to share it with your family, employer, or social media contacts if you do not pay. In most cases, these claims are false or greatly exaggerated, and the attacker is sending the same message to many people hoping some will panic and pay.

What These Emails Usually Claim

Extortion emails follow common patterns. They often say things like:

  • “We have hacked your router / home network / Wi‑Fi and have been watching everything you do online.”

  • “We installed malware on your device and recorded video of you on your camera.”

  • “We copied your contacts, browsing history, and private messages.”

  • “We will send embarrassing information to your contacts or post it publicly if you do not pay.”

Sometimes they include:

  • A password you used in the past (stolen from a data leak, not from your router).

  • Old usernames or email addresses to look more convincing.

  • Technical‑sounding details to scare you, but which don’t quite make sense if you read carefully.

What the Criminals Want

The goal is simple: money through fear.

  • They usually demand payment in cryptocurrency (often Bitcoin) so it’s harder to trace.

  • They may give a deadline (for example, 24–72 hours) and threaten to “release the information” if you do not pay.

  • Some threaten to send the “evidence” to your employer, family, or friends, or to publish it online.

Importantly, these emails are usually mass‑produced: the attacker does not know you personally and often does not actually have anything on you at all.

Typical Tactics and Tricks

Extortion emails try to create maximum fear and urgency with minimal effort:

  • Claiming technical access they probably don’t have

    • “We hacked your router” or “We have full control of your network” is a common bluff.

    • Real attacks of that kind are much rarer, take more work, and are not usually announced like this.

  • Using leaked passwords as “proof”

    • They might show an old password you recognize.

    • That password is usually from a past data breach (for example, a website that was hacked) and doesn’t prove they have access to your router or camera.

  • Pretending to have recordings or screenshots

    • They claim to have videos of you or logs of specific websites, but they don’t provide any real evidence.

    • If they do attach files or links, these can be malicious and should not be opened.

  • Threatening public exposure

    • They may say they will email your contacts, post on social media, or send information to your employer.

    • This is designed to embarrass and scare you, even though they usually don’t have anything real.

Why These Emails Are Effective

Extortion emails work because they target emotions, not technology:

  • Fear and shame

    • People worry “what if it’s true?” even when they haven’t done anything wrong.

  • Confusion about technology

    • Most people are not sure what’s technically possible, so claims about hacked routers or cameras sound plausible.

  • Urgency and isolation

    • Short deadlines and “don’t tell anyone” language push you to act quickly and alone, instead of asking for help.

What to Look For (Red Flags)

Treat any message as suspicious if it includes:

  • Claims they hacked your router, Wi‑Fi, or home network and have “full access” to your devices.

  • Threats to release embarrassing photos, videos, or browsing history unless you pay.

  • Demands for payment in cryptocurrency or untraceable methods.

  • Vague technical details that don’t add up, or generic wording that could apply to anyone.

  • A sense of extreme urgency (“you have 24 hours” or “this is your only warning”).

Often, if you search a line of text from the email (without clicking links), you’ll find it’s part of a common scam template used on many victims.

What You Should Do If You Receive One

If you get an extortion email like this:

  1. Do not pay and do not reply.

    • Paying shows you’re a good target and does not guarantee they will stop or delete anything.

    • Replying confirms your address is active, which can invite more harassment.

  2. Do not click links or open attachments.

    • They may contain malware or lead to phishing sites.

  3. Change your passwords—especially if they showed an old one.

    • If the email includes a password you recognize, change it anywhere you’ve used it.

    • Turn on multi‑factor authentication (MFA) on important accounts (email, banking, social media).

  4. Check your router and devices for basic safety.

    • Make sure your Wi‑Fi has a strong, unique password and uses modern security (WPA2 or WPA3).

    • Update your router’s firmware and your devices’ software.

    • Use reputable security software and run a scan.

  5. Report the email.

    • Mark it as spam or phishing in your email program.

    • Follow your organization’s policy: forward it to your security or IT team if you are at work.

  6. Keep a copy for evidence if needed.

    • If threats are severe or repeated, you may want to keep the message for law enforcement or your security team.

How Businesses Are Affected

For organizations, extortion emails can:

  • Frighten employees into making poor decisions (like paying personally or hiding the incident).

  • Create unnecessary panic and support tickets if many staff receive the same campaign.

  • Be used as a distraction alongside other attacks (for example, phishing or malware).

A clear policy and training help ensure employees:

  • Recognize these emails as scams.

  • Do not pay or engage.

  • Report them quickly so patterns can be tracked and blocked.

Key Prevention and Awareness Tips (Plain‑Language)

For everyday users and employees:

  • Remember that anyone can claim anything in an email; without real evidence, assume it’s a bluff.

  • Never send money, crypto, or gift cards in response to threats in unsolicited messages.

  • Use strong, unique passwords and a password manager; turn on MFA wherever possible.

  • Keep your router and devices updated and use a strong Wi‑Fi password—good security makes real hacks less likely and gives you peace of mind.

  • Talk to someone you trust (or your company’s IT/security team) instead of dealing with it alone.