Extortion: How attackers double down on threats