Jump to content

Definition:Cyber extortion

From Insurer Brain

🔒 Cyber extortion is a category of cyber risk in which a threat actor demands payment — typically in cryptocurrency — in exchange for not carrying out or continuing a malicious action against an organization, such as deploying ransomware, releasing stolen data, or launching a sustained denial-of-service attack. Within the cyber insurance market, extortion-related losses have become one of the most significant and volatile cost drivers, reshaping how underwriters evaluate risk, set premiums, and structure policy terms. Cyber extortion coverage typically sits within a broader cyber policy as a dedicated insuring agreement, addressing ransom payments, negotiation costs, and associated business disruption.

💻 When a policyholder suffers an extortion event, the cyber policy's incident response mechanism activates. The insurer's designated incident response panel — which usually includes forensic investigators, legal counsel specializing in data privacy, and professional negotiators — works with the insured to assess the credibility of the threat, contain the attack, and determine whether payment is advisable and lawful. Payment legality is a critical consideration: regulations from the U.S. Office of Foreign Assets Control (OFAC) and equivalent bodies elsewhere prohibit transactions with sanctioned entities, meaning insurers must screen threat actors before authorizing any ransom reimbursement. Claims teams also evaluate the downstream costs covered under the policy, including business interruption losses, data restoration expenses, and third-party liability arising from compromised customer information.

⚠️ The surge in extortion attacks has forced the cyber insurance market through several hard cycles of rate increases and tightened underwriting requirements. Carriers now routinely mandate minimum cybersecurity controls — such as multi-factor authentication, endpoint detection and response, and tested backup protocols — as preconditions for coverage. Some reinsurers have introduced sub-limits or co-insurance provisions specifically for extortion losses to manage their aggregation exposure. For insureds, the availability and breadth of extortion coverage has become a litmus test for organizational cyber maturity: businesses that cannot demonstrate baseline security hygiene increasingly find themselves facing exclusions, prohibitive pricing, or outright declinations.

Related concepts: