(707) 268-8850    Get SUPPORT

Network Management Services Blog

Don’t Be Fooled When Scammers Threaten to Spill a Dirty Little Secret

Don’t Be Fooled When Scammers Threaten to Spill a Dirty Little Secret

What would you do if a stranger claimed to have compromising webcam footage of you and threatened to share it with your contacts? A new, very convincing email scam is making some users very nervous.

The Sextortion Scam
It’s as screwed up as it sounds. A scammer emails you saying that they got access to your passwords, and then started to run amok to see how much trouble they could get you into. They even show you one of your passwords to prove it (the password will likely come from lists found on the dark web from online businesses and services that have been hacked and stolen over the years). Then the scammer admits they’ve been watching what you do on your computer and recording your webcam, and they happened to catch you at a very inopportune time... Well, let’s let the email explain it for us. 

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The reader is then given the address to a Bitcoin wallet, where they are to send the ransom.

The email continues:

“Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

This email comes in a few different versions in the wild, but all of them follow the same pattern and end with the same threat… fork over the cash, or everyone will see you in your most private moments.

Is This a Serious Threat?
This is a very real concern for many people, who will be relieved to hear that, no, there is no indication that these threats are for real. The first clue is the fact that the passwords that the email provides are usually a decade old, indicating that they came from some (relatively) ancient database from some long-forgotten hack.

However, in some ways, this is even worse news, because this threat has made a tidy sum of money: as of the 31st of July, the scam had brought in $250,000, as compared to just over $50,000 by the 19th. Clearly, this scam has been plenty effective for the perpetrators, and this won’t deter others from following its example.

Keeping Yourself Safe from an Actual Attack
Granted, this attack is just an unfair wager, but scams like this are more than possible for a criminal who actually means what they say/threaten. As a result, the security lessons we can take away from this particular attack still apply.

The first thing to remember is also the first rule of passwords - change them frequently. Again, this scam has made quite a bit of money based on a total bluff... a bluff that, paid in increments of $1,400, was worth $250,000 and counting. From this, we can infer that quite a few people who received this message had online activities that they wanted to hide, and more critically, that their passwords had remained the same for all those years.

This is an excellent example of why it is so crucial to regularly update your passwords, without repeating them - if an old database is hacked, as happened here, you won’t have to worry if your password is revealed - it won’t be any good anymore.

The second thing to remember? If you aren’t actively using your webcam, keep its lense covered up.

For more best practices to follow, including those that will improve your business’ security, make sure you keep checking back to this blog - and if you want to take more action, reach out to us at (707) 268-8850.

The Best Way to Approach Data Backup
Tip of the Week: Cloud Software for File Sharing
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, March 24 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup VoIP Mobile Devices Hosted Solutions Innovation Backup Email Google Data Data Recovery Tech Term Outsourced IT IT Support Cloud Computing IT Services Internet Microsoft Software Internet of Things Saving Money Hardware Business Continuity Efficiency Communications BDR Business Smartphones Communication Cybersecurity Small Business Cybercrime Ransomware Android Artificial Intelligence Server Disaster Recovery User Tips Windows Alert How To Avoiding Downtime Network Gadgets Save Money Browser Computers Managed IT Managed IT Services Smartphone Social Media Phishing Firewall Social Engineering Mobile Device Management Law Enforcement Collaboration Two-factor Authentication Router Business Intelligence Computer Passwords BYOD Windows 10 Data Security Data Protection Applications Productivity Business Management Vulnerability Money Workplace Tips Miscellaneous Mobility Chrome Identity Theft Word Private Cloud Spam Blockchain Productivity Document Management Bandwidth Remote Monitoring Operating System Facebook Virtualization Redundancy Connectivity Proactive IT IT Support Budget VPN Flexibility Office 365 Compliance Telephone Systems Managed Service Provider Upgrade Smart Tech Password Information Google Drive Business Owner Unsupported Software Settings File Sharing Data Breach Servers Information Technology Data Storage Windows 10 Quick Tips Credit Cards Work/Life Balance Content Filtering Managed Service Public Cloud Wi-Fi Mobile Computing Employer-Employee Relationship Analysis Spam Blocking Data storage Infrastructure Value Virtual Assistant Networking Apps Data loss Sports Bring Your Own Device OneNote Office Tips Microsoft Office Comparison Hacking Unified Threat Management IT Management Mobile Device CES Big Data Windows 7 Website App Physical Security Solid State Drive IT Plan Automation Encryption Access Control Training Workers Update Government Content Management Paperless Office Holiday Colocation Downtime Relocation Gmail Cache Data Management Frequently Asked Questions Millennials Computer Fan Current Events Skype Theft Streaming Media Computer Care Lifestyle Hiring/Firing Health Strategy Keyboard Remote Worker Evernote Authentication Enterprise Content Management Students Scam Computing Infrastructure Insurance Hosted Solution Root Cause Analysis webinar Botnet Humor Recycling Wireless Internet Excel Workforce FENG Knowledge Start Menu Google Apps Content Filter Samsung Software Tips Business Technology Files Flash Wiring Reputation Internet Exlporer Wireless Charging Nanotechnology Education Charger Emails Google Docs Password Management Apple Human Resources Healthcare Legal Risk Management Fraud Practices Recovery Meetings Conferencing Travel eWaste Wire Augmented Reality Tip of the week Telecommuting Electronic Medical Records Network Congestion Mobile Hybrid Cloud Storage Wireless Technology Save Time Accountants Windows 10s Camera Customer End of Support Fiber-Optic Safety Data Warehousing Voice over Internet Protocol NIST Hard Drives iPhone Staff Electronic Health Records IBM Monitor History Amazon Hosted Computing Marketing Hacker Criminal The Internet of Things HaaS Windows Server 2008 Remote Work IT Consultant Professional Services Password Manager HBO Telephone System Supercomputer Sync Internet exploMicrosoft Cables Devices Multi-Factor Security Cryptocurrency Digital Signature Machine Learning HIPAA Amazon Web Services Inventory Screen Mirroring Software as a Service Smart Office Entertainment Emergency IoT USB CrashOverride Leadership Tools Office Business Mangement Addiction SaaS Outlook Specifications Cortana Audit Telephony Advertising Unified Communications Thought Leadership Cleaning Netflix Trending Safe Mode YouTube MSP User Error Online Shopping PDF Black Market Cast HVAC Patch Management Regulations Instant Messaging Troubleshooting Computer Accessories Domains Two Factor Authentication Wireless Company Culture Video Games Battery Vendor Management WiFi How to Bluetooth Fun Public Speaking Techology Assessment Experience Presentation Managing Stress Remote Computing Transportation Lithium-ion battery Administration Content Books Television Proactive Tech Support Scalability Music 5G Benefits Webinar Best Practice Politics Shadow IT Worker Search Audiobook Public Computer Remote Monitoring and Maintenance Wearable Technology Twitter Loyalty Smart Technology Printers Competition Virtual Reality IT solutions Customer Relationship Management IP Address Rootkit Line of Business Users Employer Employee Relationship Automobile Regulation Worker Commute Customer Service Mobile Office