{"id":356838,"date":"2025-07-25T08:35:00","date_gmt":"2025-07-25T03:05:00","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=356838"},"modified":"2025-07-25T08:35:52","modified_gmt":"2025-07-25T03:05:52","slug":"the-com-theft-extortion-and-violence-are-a-rising-threat-to-youth-online","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/the-com-theft-extortion-and-violence-are-a-rising-threat-to-youth-online\/","title":{"rendered":"The Com: Theft, Extortion, and Violence are a Rising Threat to Youth Online"},"content":{"rendered":"<header>\n<div class=\"fields\">\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt; color: #222222;\">The Federal Bureau of Investigation is warning the public about a growing and evolving online threat group known as <\/span><abbr style=\"font-family: georgia, palatino, serif; font-size: 12pt; color: #222222;\">The Com<\/abbr><span style=\"font-family: georgia, palatino, serif; font-size: 12pt; color: #222222;\">, short for The Community.\u00a0<\/span><dfn style=\"font-family: georgia, palatino, serif; font-size: 12pt; color: #222222;\">The<\/dfn><span style=\"font-family: georgia, palatino, serif; font-size: 12pt; color: #222222;\">\u00a0Com is a primarily English speaking, international, online ecosystem comprised of multiple interconnected networks whose members, many of whom are minors, engage in a variety of criminal violations. The FBI estimates thousands of individuals identify as current or recent members of The Com with varying levels of associated activity. Criminal activity conducted by members of The Com includes, but is not limited to, swatting<\/span><sup id=\"retfn1\" style=\"font-family: georgia, palatino, serif; color: #222222;\"><\/sup><span style=\"font-family: georgia, palatino, serif; font-size: 12pt; color: #222222;\">\/hoax threats, extortion\/sextortion of minors, production and distribution of child sexual abuse material, violent crime, and various types of cyber crimes. The latter category is broad and includes distributed denial-of-service (<\/span><abbr style=\"font-family: georgia, palatino, serif; font-size: 12pt; color: #222222;\">DDoS<\/abbr><span style=\"font-family: georgia, palatino, serif; font-size: 12pt; color: #222222;\">) attacks, subscriber identity module (<\/span><abbr style=\"font-family: georgia, palatino, serif; font-size: 12pt; color: #222222;\">SIM<\/abbr><span style=\"font-family: georgia, palatino, serif; font-size: 12pt; color: #222222;\">) swapping<\/span><sup id=\"retfn2\" style=\"font-family: georgia, palatino, serif; color: #222222;\"><\/sup><span style=\"font-family: georgia, palatino, serif; font-size: 12pt; color: #222222;\">, ransomware, intellectual property theft, extortion, cryptocurrency theft, and money laundering. The motivations behind the criminal activity vary, but often fall within one of the following: financial gain, retaliation, ideology, sexual gratification, and notoriety.<\/span><\/p>\n<\/div>\n<\/header>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">The sophistication of The Com criminal activity has grown over the last four years, with subjects employing increasingly complex methods to mask their identities, hide financial transactions, and launder money. An underlying theme within the entirety of The Com is its members&#8217; interest in and proficiency with cyber related tactics, techniques, and procedures. The Com members have also demonstrated knowledge of the UK and US criminal justice systems. For example, subjects involved with The Com have been known to intentionally recruit juveniles within the United States to perform criminal acts based on their misperception that juveniles cannot be pursued by the US criminal justice system.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">The deployment of swatting and hoax bomb threats to facilitate other illicit criminal activity is an underlying theme across subgroups within The Com. Members of The Com will engage in swatting when conducting cryptocurrency theft to distract from the ongoing crime. Of note, swatting is the most visible violation that occurs within The Com and often acts as the entry point into the larger Com ecosystem. While subgroups of The Com have different recruitment tactics, in general they target young and impressionable individuals using minor-friendly applications such as social media platforms or gaming sites and indoctrinate them into their ideology. Members of The Com typically range between 11 and 25 years old. Young people are often recruited on gaming sites and social media platforms based on shared interests, or through other members of The Com.<\/span><\/p>\n<section>\n<h2><strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Subsets of The Com<\/span><\/strong><\/h2>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">There are currently three known primary subsets within The Com: Hacker Com,<sup id=\"retfn3\"><\/sup>\u00a0In Real Life (<abbr>IRL<\/abbr>) Com,<sup id=\"retfn4\"><\/sup> and Extortion Com.\u00a0<sup id=\"retfn5\"><\/sup>Each subset has a distinct focus; however, members of The Com often participate in criminal activity encompassed in more than one subset and maintain relationships with members in multiple subsets simultaneously, in case their skills are beneficial. The members within these subgroups typically have a shared interest, ideology, or goal and work together, adding others to the group and splintering when necessary, to achieve their mission.<\/span><\/p>\n<\/section>\n<section>\n<h2><strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Recommendations<\/span><\/strong><\/h2>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">The FBI urges the public to exercise caution when posting or messaging personal information, photos, or videos on social media, dating sites, or other online platforms. Posting seemingly innocuous information online may provide threat actors with content to exploit for malicious purposes, including targeting and extortion.<\/span><\/p>\n<p><strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">The FBI recommends the public consider the following when sharing information or engaging online:<\/span><\/strong><\/p>\n<ul>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Monitor children&#8217;s online activity and discuss risks associated with engaging with others in online platforms.<\/span><\/li>\n<li>\n<div><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Exercise discretion when posting personal information, videos, or photos online, especially content that includes minors.<\/span><\/div>\n<ul>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Once information is shared online, it can be very difficult, if not impossible to remove, particularly if it has been shared by other individuals.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Avoid posting personal information online, such as mobile phone number, address, or other personally identifying information.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Apply privacy settings to social media accounts to limit public view of photos, videos, and personal information.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Exercise caution when accepting friend requests, engaging in video calls, and sending images to individuals you do not know personally.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Run searches of your information\/your child&#8217;s personal information to determine the level of exposure and spread of information.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Do not provide money or other valuable items to individuals you do not know online. Complying with extortion or threats does not guarantee sensitive content will not be shared.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Enable multifactor authentication on financial accounts, social media sites, and other applications.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Do not reply to emails, text messages, or calls that request personal information, such as your password, PIN, or One Time Password sent to your email or phone. If someone claiming to be a company &#8220;representative&#8221; contacts you and asks you to provide personal information or to verify your account by providing a code, initiate a new call to the company by dialing the verified customer service line.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Do not post or advertise information about financial assets, including ownership of or investment in cryptocurrency, on social media websites or forums.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/section>\n<section>\n<h2><strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Victim Reporting and Additional Resources<\/span><\/strong><\/h2>\n<p><strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">If you or someone you know may be a victim of a crime using the tactics outlined above, the following resources may help:<\/span><\/strong><\/p>\n<ul>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">If it is an immediate, life threatening emergency, dial 9-1-1.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Consult a health care provider who can provide an initial evaluation or referral to a mental health professional.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Connect to a mental health resource who can help with health coping skills for intense emotions and help reduce the risk of a serious injury.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">The National Center for Missing and Exploited Children (<abbr>NCMEC<\/abbr>) provides a free service known as\u00a0<strong>Take It Down<\/strong>, which helps minor victims, or adults who were victimized as minors, with removing or stopping the online sharing of nude, or sexually explicit content taken while under 18 years old. For more information, visit\u00a0<a href=\"https:\/\/www.ic3.gov\/Egress\/https\/takeitdown.ncmec.org\/443\/B3AB22CC7ACCE981A99C8F787F51BBE6BF1484ADDF7BAF8EBC9B0B541D9F5FCC\" target=\"_blank\" rel=\"noopener\">https:\/\/takeitdown.ncmec.org<\/a>.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Contact your account providers immediately to regain control of your accounts, change passwords, and place alerts on your accounts for suspicious login attempts and\/or transactions.<\/span><\/li>\n<li>\n<div><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Retain all of the information regarding the incident (i.e. usernames, email addresses, monikers, websites, platforms used for communication, names, photos, videos, etc.) and immediately report it to:<\/span><\/div>\n<ul>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">FBI&#8217;s Internet Crime Complaint Center:\u00a0<a href=\"https:\/\/www.ic3.gov\/\" target=\"_blank\" rel=\"noopener\">www.ic3.gov<\/a><\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">FBI Field Office:\u00a0<a href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\" target=\"_blank\" rel=\"noopener\">www.fbi.gov\/contact-us\/field-offices<\/a>\u00a0or\u00a0<a href=\"tel:+1(800)225-5234\">1-800-CALL-FBI<\/a>\u00a0(225-5324)<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">National Center for Missing and Exploited Children (NCMEC):\u00a0<a href=\"tel:+1(800)843-5678\">1-800-THE-LOST<\/a>\u00a0or\u00a0<a href=\"https:\/\/www.ic3.gov\/Egress\/https\/report.cybertip.org\/443\/B144AE1A444A360E687E858B62C3D8913EADD8B1D19AB98AEBD01849ABF34204\" target=\"_blank\" rel=\"noopener\">report.cybertip.org<\/a><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/section>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Federal Bureau of Investigation is warning the public about a growing and evolving online threat group known as The Com, short for The Community.\u00a0The\u00a0Com is a primarily English speaking, international, online ecosystem comprised of multiple interconnected networks whose members, many of whom are minors, engage in a variety of criminal violations. The FBI estimates [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":23572,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":{"0":"post-356838","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/356838","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=356838"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/356838\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media\/23572"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=356838"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=356838"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=356838"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}