Browse Definitions :
Definition

doxware (extortionware)

Doxware, also known as extortionware, is a software used for an exploit in which a hacker accesses the target's sensitive data and threatens to publish it if the victim does not meet his demands, which are typically for money. The term comes from doxing, hacker-speak that means accessing and publishing private information about an individual or an organization.

Doxware is a variation on ransomware, malware used to access the target's data and then make it impossible for the victim to access that data himself.    Ransomware has become less profitable as more organizations have realized the importance of backing up their data to prevent loss and meet compliance and data governance requirements.

Doxing usually involves researching a target, accessing the target’s data and publishing it. In contrast, doxware uses the ransomware technique of broad-scale phishing attacks. However, doxware attackers take a further step, exfiltrating the data and exploring it to find potential doxing targets. As with ransomware, the hacker typically encrypts the victim’s data and demands payment to relinquish the key, in addition to refraining from broadcasting the sensitive data.

Although the terms doxware and extortionware are used synonymously, a distinction can be made between the two. As in conventional ransom, ransomware takes a hostage (data, in the case of the malware), while extortionware threatens harm of some sort if demands are unmet. In the case of doxware, the type of harm is specified: Exposure of personal data.

This was last updated in January 2017

Continue Reading About doxware (extortionware)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close