This chapter is from the book
3.8 Conclusion
In this chapter, we stepped through the anatomy of a cyber extortion attack, including each of its components: entry, expansion, appraisal, priming, leverage, and extortion. Along the way, we described the adversary’s activities in depth, and provided indicators of compromise that can help responders identify these activities.
In the next chapter, we will discuss the initial response once an intrusion has metastasized into a cyber extortion attack.