ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™Insider Threat Matrix™
  • ID: MT005.005
  • Created: 23rd November 2025
  • Updated: 23rd November 2025
  • Contributor: The ITM Team

Extortion

The subject makes direct or implied threats against the organization to cause material harm unless demands, typically financial, are met. These threats often rely on the subject's access to sensitive data or reputationally damaging information, with the stated intent to release, leak, or misuse that data unless a specific outcome is achieved.

 

Extortion of this nature is typically transactional and opportunistic. Unlike sabotage or ideological coercion, this behavior is rooted in self-enrichment. The subject does not seek systemic disruption, but rather personal advantage through the exploitation of institutional fear, risk aversion, or reputational sensitivity.

 

In many cases, the subject conceals their identity during the extortion, using anonymous communication platforms, burner accounts, or pseudonyms, to increase pressure while delaying attribution. This anonymity may also allow the subject to continue operating within the organization undetected.