Select your country

Not finding what you are looking for, select your country from our regional selector:


It's not ransomware, it's extortion!

Watch on demand

Watch the recording of this insightful webinar where we delved into the evolving landscape of Cyber Extortion (Cy-X), a sophisticated form of computer crime targeting the security of digital assets to extort payment. The data and research insights shared are published in our annual Cy-Xplorer 2024 report.

Since early 2020, Orange Cyberdefense has been rigorously tracking the Cy-X threat, amassing a comprehensive dataset of over 11,200 victims and combining it with technical insights from our CERT and CSIRT teams. This webinar will present unique findings on the scale, scope, nature, and trajectory of Cy-X threats based on our extensive research.

Key Highlights:

  • Escalating Threat Landscape: Explore how the number of observable Cy-X victims has surged by 77% in the past 12 months, with 60 distinct threat actors responsible for over 4,374 victims.
  • Undetected Victims: Understand our analysis suggesting the actual number of Cy-X victims may be at least 50% higher than recorded incidents.
  • Global Impact: Discover how Cy-X has affected businesses in 75% of countries worldwide and across all 20 industries classified by NAICS, with small businesses being 4.2 times more frequently impacted than medium and large businesses combined, since 2020.
  • Targeted Industries and IT Systems: Learn why manufacturing businesses are the most impacted globally through attacks on IT systems rather than operational technology (OT).
  • Indiscriminate Harvesting vs. Targeted Attacks: Gain insights into why Cy-X often resembles an indiscriminate "harvest" of victims concentrated in English-speaking countries rather than targeted "Big Game Hunting."
  • Impact of Generative AI: Evaluate the potential influence of Generative AI tools on the Cy-X threat landscape, including credible phishing and the global reach across language barriers.
  • Economic, Sociological, and Cultural Context: Appreciate the broader system factors from which Cy-X emerges, beyond just technological aspects.
  • Law Enforcement Efforts: Review new research documenting the impact of global law enforcement operations like Operation Cronos on disrupting Cy-X activities.
  • Volatility of Cy-X Actor Ecosystem: Examine the high turnover within the Cy-X actor community, with about one-third disappearing annually and over half rebranding within six months.
  • Re-Victimization of Cy-X Victims: Uncover research on the recurring victimization patterns, where victims are repeatedly shamed on Dedicated Leak Sites (DLS).

This webinar is a valuable session for cybersecurity professionals, business leaders, and anyone interested in understanding the complexities of the Cy-X threat landscape.

Watch on-demand now!


Charl van der Walt 

Head of Security Research

Robinson Delaugerre

CSIRT Manager 

Diana Selck-Paulsson 

Lead Security Researcher

Simone Kraus

Security Analyst

Incident Response Hotline

Facing cyber incidents right now?

Contact our 24/7/365 world wide service incident response hotline.