Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Starlink wait set to drag on as Icasa flags legal hurdle

      Starlink wait set to drag on as Icasa flags legal hurdle

      13 May 2026
      Canal+ firms up 3 June JSE listing

      Canal+ firms up 3 June JSE listing

      13 May 2026
      Malatsi opens door to 'some' partial privatisations of SOEs - communications minister Solly Malatsi

      Malatsi opens door to ‘some’ partial privatisations of SOEs

      13 May 2026
      Sam Altman denies betraying Elon Musk. Shelby Tauber/Reuters

      Sam Altman denies betraying Elon Musk

      13 May 2026
      Naked Insurance launches native app in ChatGPT - Alex Thomson

      Naked Insurance launches native app in ChatGPT

      13 May 2026
    • World
      Pop star sues Samsung for $15-million - Dua Lipa

      Pop star sues Samsung for $15-million

      11 May 2026
      OpenAI's new audio APIs aim for conversational voice agents

      OpenAI’s new audio APIs aim for conversational voice agents

      8 May 2026
      'It was my idea': Musk claims paternity of OpenAI - Elon Musk

      ‘It was my idea’: Musk claims paternity of OpenAI

      29 April 2026
      Pivotal week for US tech stocks

      Pivotal week for US tech stocks

      28 April 2026
      Sam Altman denies betraying Elon Musk. Shelby Tauber/Reuters

      Worries over OpenAI’s growth as Anthropic gains ground

      28 April 2026
    • In-depth
      Alfa's electric rebel - Alfa Romeo Junior Elettrica Veloce

      Alfa’s electric rebel

      29 April 2026
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      Datatec is firing on all cylinders - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
    • TCS
      TCS+ | The Up&Up Group on the hidden cost of AI - Jason Harrison

      TCS+ | The Up&Up Group on the hidden cost of AI

      13 May 2026
      Michael Rossouw

      TCS+ | The retirement decision most South Africans get wrong

      6 May 2026
      TCS | The Cape Town start-up listening for TB with AI - Braden van Breda

      TCS | The Cape Town start-up listening for TB with AI

      4 May 2026

      TCS+ | ‘The ISP for ISPs’: Vox’s shift to wholesale aggregator

      20 April 2026
      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      15 April 2026
    • Opinion
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Free calls, dead voice and Shameel Joosub’s Spanish ghost

      22 April 2026
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • Contactable
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Opinion » Ihab Moawad » Data kidnapping the latest cyber threat

    Data kidnapping the latest cyber threat

    By Ihab Moawad20 August 2015
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Ihab-Moawad-180In April, Trend Micro released a research paper about sextortion, the means through which cybercriminals obtain compromising personal images or videos of Internet users, which they then hold hostage until their demands have been met. Fast-forward to July and we have seen the hack of controversial adultery/dating site Ashley Madison, in which cybercriminals wreaked havoc as they threatened to slowly leak the data of the adulterers using the site, until it and its companion site, Established Men, were shut down.

    An article in Time calls this tactic “Hacking 2.0” — this new hacking method is not about the data, but the context. Making money from stolen data, like credit cards, is a lot of work and cybercriminals have latched onto the fact that they have a larger pay cheque to gain from those that stand to lose more than just money. Hence, a hack like Ashley Madison’s, which could — and has — destroyed reputations and families, is a gold mine for the team responsible for the hack, The Impact Team.

    Moral opinions about Ashley Madison aside, no one appreciates their personal information being kidnapped and held for ransom. But cybercriminals are cunning and they know that if they keep the sums low enough, people that stand to lose more than money would rather pay up. In this case, the Ashley Madison hackers offered users the ultimatum of paying US$19 to have all their information wiped off the site or having it leaked. But there is of course, no guarantee that you can trust a cybercriminal.

    According to Time, there is a new reality that’s making matters worse for corporate security teams. This is that in recent years there has been heavy investment in protecting financial data — spending money to fortify the most valuable data. So, while credit cards may be protected, e-mail servers may have been left in the lurch, but this will slowly change as personal data of different contexts becomes a bargaining chip for cybercriminals.

    Ashley Madison
    Ashley Madison

    Ashley Madison is just one example of an enterprise that has been targeted in this manner. Another example is the malware Cryptolocker, which forced victims to pay a sum to unscramble their data. This racket made $27m in just the first two months from small home owners and businesses. And then there was the Sony hack in December 2014, in which cybercriminals stole corporate e-mails and embarrassed the company. In Hacking 2.0, cybercriminals don’t need to steal your money, all they need is any data that is valuable to you.

    This means that executives should be working tirelessly to do an honest assessment about their enterprise’s valuable data really. Then wise investments need to be made in protecting data that might seem inconsequential if stolen in one context, but a disaster if stolen in another. The bottom line? Every company will now have to plan for ransom and extortion scenarios.

    • Ihab Moawad is regional vice-president at Trend Micro
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Ashley Madison Ihab Moawad Trend Micro
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSamsung moves to patch phones quicker
    Next Article Telkom challenges iBurst sale

    Related Posts

    South Africa's patching problem is about to get worse - Zaheer Ebrahim

    South Africa ‘isn’t ready’ for AI-accelerated cyberattacks

    20 April 2026
    TrendAI opens South African data centre, plans Africa expansion - Assad Arabi

    TrendAI plans Africa expansion

    16 April 2026
    Building strong channel partnerships - lessons from CyberStack and Trend Micro

    Building strong channel partnerships – lessons from CyberStack and Trend Micro

    1 July 2025
    Company News
    In crypto, trust is the new currency - Binance South Africa's Sam Mkhize

    In crypto, trust is the new currency

    13 May 2026
    Don't miss the Telviva Tech Insights webinar

    Don’t miss the Telviva Tech Insights webinar

    13 May 2026

    Don’t miss the Pan African DataCentres Exhibition & Conference

    13 May 2026
    Opinion
    Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

    Free calls, dead voice and Shameel Joosub’s Spanish ghost

    22 April 2026
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    In crypto, trust is the new currency - Binance South Africa's Sam Mkhize

    In crypto, trust is the new currency

    13 May 2026
    Starlink wait set to drag on as Icasa flags legal hurdle

    Starlink wait set to drag on as Icasa flags legal hurdle

    13 May 2026
    TCS+ | The Up&Up Group on the hidden cost of AI - Jason Harrison

    TCS+ | The Up&Up Group on the hidden cost of AI

    13 May 2026
    Canal+ firms up 3 June JSE listing

    Canal+ firms up 3 June JSE listing

    13 May 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}