Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Don’t Be Fooled When Scammers Threaten to Spill a Dirty Little Secret

Don’t Be Fooled When Scammers Threaten to Spill a Dirty Little Secret

What would you do if a stranger claimed to have compromising webcam footage of you and threatened to share it with your contacts? A new, very convincing email scam is making some users very nervous.

The Sextortion Scam
It’s as screwed up as it sounds. A scammer emails you saying that they got access to your passwords, and then started to run amok to see how much trouble they could get you into. They even show you one of your passwords to prove it (the password will likely come from lists found on the dark web from online businesses and services that have been hacked and stolen over the years). Then the scammer admits they’ve been watching what you do on your computer and recording your webcam, and they happened to catch you at a very inopportune time... Well, let’s let the email explain it for us. 

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The reader is then given the address to a Bitcoin wallet, where they are to send the ransom.

The email continues:

“Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

This email comes in a few different versions in the wild, but all of them follow the same pattern and end with the same threat… fork over the cash, or everyone will see you in your most private moments.

Is This a Serious Threat?
This is a very real concern for many people, who will be relieved to hear that, no, there is no indication that these threats are for real. The first clue is the fact that the passwords that the email provides are usually a decade old, indicating that they came from some (relatively) ancient database from some long-forgotten hack.

However, in some ways, this is even worse news, because this threat has made a tidy sum of money: as of the 31st of July, the scam had brought in $250,000, as compared to just over $50,000 by the 19th. Clearly, this scam has been plenty effective for the perpetrators, and this won’t deter others from following its example.

Keeping Yourself Safe from an Actual Attack
Granted, this attack is just an unfair wager, but scams like this are more than possible for a criminal who actually means what they say/threaten. As a result, the security lessons we can take away from this particular attack still apply.

The first thing to remember is also the first rule of passwords - change them frequently. Again, this scam has made quite a bit of money based on a total bluff... a bluff that, paid in increments of $1,400, was worth $250,000 and counting. From this, we can infer that quite a few people who received this message had online activities that they wanted to hide, and more critically, that their passwords had remained the same for all those years.

This is an excellent example of why it is so crucial to regularly update your passwords, without repeating them - if an old database is hacked, as happened here, you won’t have to worry if your password is revealed - it won’t be any good anymore.

The second thing to remember? If you aren’t actively using your webcam, keep its lense covered up.

For more best practices to follow, including those that will improve your business’ security, make sure you keep checking back to this blog - and if you want to take more action, reach out to us at (808) 529-4605.

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Hackers Business Computing Google Malware Backup Network Security Windows 10 Internet Microsoft Software Innovation Hosted Solutions Smartphones Mobile Devices Data Browser Email Hardware Productivity User Tips Efficiency Computer Tech Term VoIP Ransomware Business Continuity Business Workplace Tips Miscellaneous Disaster Recovery IT Services communications Cybercrime Android Business Management Smartphone Data Backup Windows Office Alert Upgrade Network Server Outsourced IT Productivity Computers Managed IT Services Cloud Computing Save Money Automation Telephone Systems Artificial Intelligence Small Business Quick Tips Chrome Communication Virtualization Data Recovery Internet of Things Money Facebook Law Enforcement Collaboration Social Media Managed IT Services Password How To Office Tips Health Passwords Router App Cybersecurity Windows 10 Applications Social Engineering Wi-Fi Operating System Mobile Device Management Spam Two-factor Authentication Office 365 History Remote Computing Bandwidth Bring Your Own Device Gadgets Gmail Work/Life Balance Safety Google Drive Data Protection Connectivity Application Scam Settings Microsoft Office Apps IT Support Recovery Entertainment Marketing Data Security BDR Word Keyboard Private Cloud HaaS Sports Encryption Data Breach Mouse Hacking Managed Service Provider Data Management VPN Vulnerability Information Holiday Phishing Networking Flexibility USB Infrastructure Paperless Office Managed Service Budget Redundancy Virtual Assistant PDF eWaste Mobility The Internet of Things Content Management Training Internet Exlporer BYOD Telephone System Data Storage Fraud Legal DDoS Blockchain Saving Money Best Practice Avoiding Downtime Black Market Comparison Big Data Battery IT Management Spam Blocking Electronic Medical Records User Error Mobile Device Charger IT Plan Website Government Wearable Technology Cleaning Windows 7 Firewall Employer-Employee Relationship Mobile Computing Public Cloud Remote Monitoring Downtime Retail IT Support Business Intelligence Robot Managed IT Unsupported Software Voice over Internet Protocol Hiring/Firing Physical Security Meetings Update Identity Theft Data storage YouTube Patch Management CES End of Support OneNote Running Cable Shadow IT Software Tips Wiring Multi-Factor Security IBM Social Apple Solid State Drive Start Menu Employer Employee Relationship Netflix Hosted Computing Risk Management Assessment Evernote Cache Instant Messaging Streaming Media Two Factor Authentication webinar Programming Biometrics Cast Computer Care Credit Cards Monitor Excel Workforce IT Consultant Enterprise Content Management Customer Relationship Management Internet exploMicrosoft Users Travel Unified Threat Management Trending Troubleshooting Supercomputer Password Manager Machine Learning iPhone Lithium-ion battery Audit Tools Computer Accessories Inventory MSP Politics Television Wireless Charging Wireless Internet Relocation Sync Conferencing Digital Signature Information Technology Environment Devices Reputation NarrowBand Tip of the week Telecommuting Transportation Samsung Password Management Customer Service Advertising Virtual Reality Root Cause Analysis Vendor Management Shortcut Techology Camera Business Mangement Social Networking Computer Fan Bluetooth Access Control File Sharing Google Docs Public Computer Cortana Wire Humor Emails Accountants Going Green Uninterrupted Power Supply Amazon Thought Leadership Customers IT solutions Distributed Denial of Service Wireless Technology Windows Server 2008 Benefits Leadership HIPAA NIST Fax Server Worker Commute People Content Authentication HBO Specifications Books Current Events Recycling Files Education FENG Value Augmented Reality Experience Google Apps Smart Office Search Windows 10s Telephony Save Time Laptop Wireless Audiobook SaaS Amazon Web Services Video Games Chromecast Human Resources Cryptocurrency Mobile Office Data loss Remote Work Nanotechnology Outlook Warranty Emergency Knowledge Criminal Servers Computing Infrastructure Notifications Worker Tech Support Remote Worker Music Automobile Workers Document Management How to Skype Practices Touchpad Maintenance Online Shopping Addiction Scalability Flash Smart Technology Staff Safe Mode Hybrid Cloud Screen Mirroring Smart Tech Frequently Asked Questions Printer Millennials Network Congestion HVAC Botnet Rootkit Administrator CrashOverride WiFi Company Culture Compliance Printers Managing Stress Webinar Regulation Twitter Thank You IT solutions Congratulations
QR-Code