Extortion in the Digital Age: From Celebrity Threats to Cyber Blackmail
Extortion is no longer confined to shadowy criminal networks demanding cash in dark alleys. In 2026, the crime has evolved into a complex global phenomenon that touches celebrities, governments, corporations, schools, and ordinary citizens alike. From WhatsApp death threats targeting public figures to cybercriminals holding millions of student records hostage, extortion has become one of the defining criminal challenges of the digital era.
At its core, extortion involves coercing someone into handing over money, influence, access, or concessions through threats, intimidation, or blackmail. But the methods have become increasingly sophisticated. Organized crime syndicates now operate across borders, cybercriminal groups exploit cloud vulnerabilities, and political actors are being accused of using intimidation tactics to influence institutions and procurement systems.
Recent incidents from India, South Africa, and the global cybersecurity sector reveal how widespread and adaptable extortion schemes have become — and why authorities worldwide are struggling to contain them.

Celebrity Culture Meets Criminal Networks
One of the most high-profile recent cases involves Indian YouTuber and “Bigg Boss OTT-2” winner Elvish Yadav, who reportedly received a ₹10 crore extortion demand accompanied by death threats.
According to police reports, Yadav received a WhatsApp call from a foreign number on May 5, 2026. Although he missed the call, he later received threatening messages allegedly sent by someone identifying himself as “Randeep Malik,” who claimed ties to the Lawrence Bishnoi gang. The messages demanded ₹10 crore within two days and allegedly warned that both Yadav and his father would be shot if payment was not made.
Authorities registered a case under Sections 308(2) and 351(2) of the Bharatiya Nyaya Sanhita, covering extortion and criminal intimidation. The matter was later transferred to the Crime Branch for further investigation.
The case reflects a troubling trend in modern extortion: the targeting of celebrities and digital influencers whose visibility and wealth make them attractive targets. Social media personalities often maintain public-facing lifestyles that expose personal information, travel routines, and family details — vulnerabilities that criminal groups can exploit.
For Yadav, the threats were particularly alarming because they came months after armed attackers allegedly fired around two dozen rounds outside his residence in August 2025.
The incident demonstrates how extortion increasingly overlaps with organized crime, online intimidation, and real-world violence.
Political Influence and Institutional Intimidation
Extortion is not limited to entertainment or online fame. In South Africa, allegations surrounding Johannesburg’s City Power utility illustrate how extortion accusations can intersect with politics, governance, and public infrastructure.
A senior Greater Johannesburg ANC regional official has been implicated in a case involving alleged political interference, intimidation, and extortion linked to City Power operations. According to reports, a case opened at the Midrand Police Station was referred to the Director of Public Prosecutions.
The allegations are serious:
- The official allegedly met senior City Power executives in Johannesburg North.
- He reportedly demanded that disciplinary proceedings against a suspended official be dropped.
- He allegedly pushed for the reinstatement of politically connected companies previously blacklisted for inflated pricing practices.
Johannesburg police spokesperson Captain Tintswalo Sibeko confirmed that a case involving extortion and intimidation had been opened and that the investigation had been concluded before referral to prosecutors.
The accused official denied all allegations, stating:
“I categorically deny the allegations. I have never interfered in operations, governance, disciplinary processes or procurement matters of City Power.”
This case highlights another dimension of extortion: the use of pressure, influence, and intimidation within institutions. Unlike traditional ransom-style crimes, these allegations revolve around power dynamics, procurement systems, and governance structures.
Such cases can have far-reaching consequences. Public trust in institutions may erode, whistleblowers may fear retaliation, and corruption investigations can become entangled in political conflict.
The Rise of Cyber Extortion
Perhaps the most dramatic transformation of extortion has occurred online.
Cyber extortion has become one of the fastest-growing forms of organized digital crime, and few recent incidents illustrate this better than the alleged ShinyHunters campaign against Instructure’s Canvas Learning Management System.
According to threat intelligence reporting, ShinyHunters compromised Instructure systems on April 25, 2026, exploiting a vulnerability in Canvas’ Free-For-Teacher service. The group claimed to have stolen 3.65 terabytes of data affecting approximately 275 million records from 8,809 educational institutions worldwide.
The alleged stolen data reportedly included:
- Full names
- Institutional email addresses
- Student ID numbers
- Internal Canvas messages between students, staff, and parents
Unlike traditional ransomware groups that encrypt files, ShinyHunters reportedly operates under a “pay or leak” model. Instead of locking systems, the group threatens to publicly release sensitive data unless victims negotiate payments.
When the initial negotiation deadline passed on May 6, 2026, the attackers escalated their campaign dramatically. Approximately 330 school Canvas login portals were reportedly defaced, and the group shifted to direct extortion attempts targeting individual schools rather than only the parent platform provider.
The incident forced Instructure to temporarily take Canvas offline globally while remediation efforts continued.
Cybersecurity analysts warned that all affected institutions should consider themselves compromised and immediately rotate credentials, API keys, OAuth tokens, and SSO secrets.
Why Extortion Is Expanding Globally
Several factors are fueling the global rise of extortion-related crimes.
1. Digital Connectivity
Modern communication platforms make it easier than ever for criminals to operate anonymously across borders. Messaging apps, encrypted communication tools, and cryptocurrency payment systems allow extortionists to threaten victims from virtually anywhere in the world.
In the Elvish Yadav case, the alleged threats originated from a foreign number, complicating investigative efforts.
2. Data Has Become Currency
Personal information is now one of the most valuable assets criminals can exploit. Educational records, internal messages, financial data, and login credentials can all be weaponized for blackmail or phishing attacks.
The Canvas breach underscores how extortion groups increasingly focus on data theft rather than system destruction.
3. Public Visibility Creates Vulnerability
Celebrities, influencers, politicians, and institutions with large public profiles are prime targets because criminals assume they are more likely to pay to avoid reputational damage or physical threats.
4. Weak Cybersecurity Practices
Organizations often fail to update systems, secure credentials, or monitor vulnerabilities effectively. Attackers exploit these weaknesses to gain leverage.
5. Organized Crime Evolution
Modern criminal groups are highly adaptive. Threat intelligence reports note that ShinyHunters evolved from database theft operations into sophisticated cloud and supply-chain exploitation campaigns.
The Human Cost of Extortion
While financial losses are often highlighted, the emotional and psychological impact of extortion can be devastating.
Victims frequently experience:
- Anxiety and fear
- Damage to personal reputation
- Loss of trust
- Long-term trauma
- Financial instability
For schools caught in cyber extortion campaigns, the stakes are especially high. Students and parents may fear identity theft, while educators worry about disrupted learning systems and reputational damage.
In political or institutional cases, extortion allegations can destabilize organizations, discourage transparency, and deepen public cynicism toward leadership structures.
Law Enforcement Faces Growing Challenges
Authorities worldwide are attempting to adapt to increasingly sophisticated extortion methods.
Traditional policing methods are often insufficient when:
- Criminals operate internationally
- Threats originate through encrypted channels
- Payments use cryptocurrency
- Attacks involve cyber vulnerabilities
- Organized groups maintain decentralized structures
The ShinyHunters case demonstrates this complexity clearly. Threat analysts describe the group as decentralized and highly adaptive, with operational overlaps involving multiple cybercriminal ecosystems.
Similarly, organized crime-linked extortion in celebrity cases often involves transnational communication channels and proxy actors, making prosecutions difficult.
Prevention Is Becoming Essential
Experts increasingly argue that prevention and resilience are more effective than reactive responses.
Recommended anti-extortion measures now include:
Strong Cybersecurity Protocols
Organizations are advised to:
- Rotate credentials regularly
- Implement multi-factor authentication
- Monitor network vulnerabilities
- Deploy anti-ransomware protections
Public Awareness
Victims should report threats immediately rather than attempting private negotiations.
Digital Hygiene
Public figures and influencers are encouraged to limit exposure of sensitive personal details online.
Institutional Transparency
Whistleblower protection and transparent investigations can help prevent intimidation from becoming normalized within organizations.
Phishing Preparedness
Educational institutions affected by breaches have been advised to issue immediate phishing warnings because stolen records can facilitate impersonation attacks.
The Future of Extortion
The future of extortion will likely become even more technologically driven.
Cybercriminals are already leveraging:
- AI-generated voice impersonation
- Credential theft campaigns
- Supply-chain attacks
- Data leak marketplaces
- Social engineering automation
As artificial intelligence tools become more accessible, extortion schemes could become more personalized and convincing. Deepfake audio or video may eventually be used to impersonate executives, celebrities, or government officials in high-pressure scams.
Meanwhile, the boundary between cybercrime, organized crime, and political interference may continue to blur.
Conclusion
Extortion has evolved far beyond conventional criminal stereotypes. Today, it operates simultaneously in the worlds of celebrity culture, politics, corporate systems, and global cyberspace.
The recent cases involving Elvish Yadav, City Power, and the Canvas cyber campaign demonstrate the broad spectrum of modern extortion tactics — from direct threats and intimidation to mass-scale digital blackmail.
What unites these incidents is the use of fear as leverage.
Whether targeting a public figure, a government institution, or an entire educational network, extortion thrives by exploiting vulnerability, uncertainty, and pressure. As digital systems become increasingly interconnected, combating extortion will require stronger cybersecurity, coordinated law enforcement efforts, institutional accountability, and greater public awareness.
Without those safeguards, extortion may continue evolving into one of the defining criminal threats of the modern era.
