Axis Insurance Services, LLC
Like most phishing attempts, it begins with an email. Using social engineering, hackers use the information gathered to send emails to potential victims. This time however, their messages have something more valuable. They send emails claiming that they have your current passwords and state that if you do not reply, they will release this password. This is in fact a trap, because the moment the victim replies, they end up giving the hacker exactly what they want. They then send an email saying that they now have full access to your files and will start sending pornographic material unless the ransom, which in most cases is bitcoin, is paid. This is for certain, a form of cyber extortion.