|Note: Refer to Extortion.
2. Extortion cases are often difficult and harrowing for the victim. As investigators work furiously to validate claims made by the threat actor, the doomsday clock continues to tick. Often, victims are faced with the inevitable decision to give in, or not give in, to threat actor demands as the clock counts down. For this reason, we consider digital extortion as a lethal data breach scenario.
Source: (Verizon, 2016)