window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Don’t Be Fooled When Scammers Threaten to Spill a Dirty Little Secret

Don’t Be Fooled When Scammers Threaten to Spill a Dirty Little Secret

What would you do if a stranger claimed to have compromising webcam footage of you and threatened to share it with your contacts? A new, very convincing email scam is making some users very nervous.

The Sextortion Scam
It’s as screwed up as it sounds. A scammer emails you saying that they got access to your passwords, and then started to run amok to see how much trouble they could get you into. They even show you one of your passwords to prove it (the password will likely come from lists found on the dark web from online businesses and services that have been hacked and stolen over the years). Then the scammer admits they’ve been watching what you do on your computer and recording your webcam, and they happened to catch you at a very inopportune time... Well, let’s let the email explain it for us. 

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The reader is then given the address to a Bitcoin wallet, where they are to send the ransom.

The email continues:

“Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

This email comes in a few different versions in the wild, but all of them follow the same pattern and end with the same threat… fork over the cash, or everyone will see you in your most private moments.

Is This a Serious Threat?
This is a very real concern for many people, who will be relieved to hear that, no, there is no indication that these threats are for real. The first clue is the fact that the passwords that the email provides are usually a decade old, indicating that they came from some (relatively) ancient database from some long-forgotten hack.

However, in some ways, this is even worse news, because this threat has made a tidy sum of money: as of the 31st of July, the scam had brought in $250,000, as compared to just over $50,000 by the 19th. Clearly, this scam has been plenty effective for the perpetrators, and this won’t deter others from following its example.

Keeping Yourself Safe from an Actual Attack
Granted, this attack is just an unfair wager, but scams like this are more than possible for a criminal who actually means what they say/threaten. As a result, the security lessons we can take away from this particular attack still apply.

The first thing to remember is also the first rule of passwords - change them frequently. Again, this scam has made quite a bit of money based on a total bluff... a bluff that, paid in increments of $1,400, was worth $250,000 and counting. From this, we can infer that quite a few people who received this message had online activities that they wanted to hide, and more critically, that their passwords had remained the same for all those years.

This is an excellent example of why it is so crucial to regularly update your passwords, without repeating them - if an old database is hacked, as happened here, you won’t have to worry if your password is revealed - it won’t be any good anymore.

The second thing to remember? If you aren’t actively using your webcam, keep its lense covered up.

For more best practices to follow, including those that will improve your business’ security, make sure you keep checking back to this blog - and if you want to take more action, reach out to us at 407-478-6600.

A.I. Is Starting to Move Businesses Forward
Tip of the Week: Cloud Software for File Sharing
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, October 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Privacy Managed IT Services Business Computing Hackers Data Backup Email Malware VoIP Mobile Devices Outsourced IT Data Hosted Solutions Data Recovery Tech Term Google Internet Microsoft Innovation Backup Saving Money Software Internet of Things Business Continuity Cloud Computing IT Services Hardware Ransomware Smartphones BDR Cybersecurity Android Communication Small Business IT Support Efficiency User Tips Communications Applications Cybercrime Browser Disaster Recovery Artificial Intelligence Business Productivity Law Enforcement Computer Managed IT Services Managed IT Workplace Tips Network Windows 10 Gadgets Router How To Avoiding Downtime Collaboration Mobile Device Management IT Support Windows Business Intelligence Two-factor Authentication Virtualization Smartphone Business Management Save Money Money Data Security Computers Phishing BYOD Data Protection Chrome Upgrade Mobility Identity Theft Social Media Document Management Spam Word App Remote Monitoring Information Blockchain Facebook Compliance Analysis Proactive IT Bandwidth Passwords Firewall Server Apps Productivity Redundancy IT Management Vulnerability Alert Training Connectivity Office 365 Miscellaneous Social Engineering Telephone Systems Encryption Machine Learning Holiday Data Breach Education Unsupported Software Bring Your Own Device Content Management Data Storage Spam Blocking Employer-Employee Relationship Keyboard Mobile Device Automation Paperless Office Work/Life Balance Servers Credit Cards Access Control Update Wi-Fi Flexibility Smart Tech Value Operating System Solid State Drive Password Information Technology Managed Service Private Cloud Fraud Data loss Scam Mobile Computing VPN Unified Threat Management Infrastructure Networking Workers Virtual Assistant Microsoft Office Budget Settings Big Data OneNote Telephone System IT Plan CES Sports Website Windows 7 File Sharing Business Owner Comparison Multi-Factor Security Emails Printer PDF Telephony Online Shopping Unified Communications Devices Health Office Tips Smart Office Conferencing Camera Data Management Regulations Inventory Technology Tips Recovery Government MSP Wireless HaaS Frequently Asked Questions Specifications IoT Password Management Samsung Root Cause Analysis Gmail Addiction Network Congestion Software Tips Trending Strategy YouTube Charger Windows 10 Mouse Google Drive Skype Evernote Theft Thought Leadership Downtime Computer Fan IT Consultant Remote Worker Save Time Excel Millennials NIST Meetings Botnet Recycling Cache Electronic Medical Records Physical Security Patch Management Lifestyle Hard Drives Risk Management Start Menu Wireless Charging Google Apps Streaming Media Human Resources Students Virtual Private Network Augmented Reality Flash Authentication FENG Business Technology Data Warehousing Leadership Wireless Technology Wiring Computing Infrastructure Tip of the week Workforce Insurance Cryptocurrency Windows 10s Travel eWaste Wireless Internet Virtual Reality Netflix Mobile Content Filter Proactive Staff Healthcare The Internet of Things Project Management Public Cloud Amazon Fiber-Optic Nanotechnology Marketing Hacker Black Market Content Filtering Google Docs Wire GDPR Hacking Windows Server 2008 Telecommuting Practices Safe Mode SaaS Cortana Instant Messaging Screen Mirroring Criminal Worker Commute HBO Accountants HVAC Cleaning HIPAA Professional Services Password Manager Storage Current Events Remote Monitoring and Maintenance Digital Signature Electronic Health Records Warranty Managed Service Provider Legal Entertainment Sync Amazon Web Services Cables Battery Voice over Internet Protocol webinar E-Commerce End of Support Remote Work Hosted Computing Audit Users Cast USB Software as a Service Line of Business Outlook Enterprise Content Management Computer Care Remote Computing Tools Business Mangement Knowledge Vendor Management Best Practice CrashOverride Regulation Mobile Office Bluetooth Domains Fun Internet exploMicrosoft Assessment Quick Tips Troubleshooting Smart Technology Scalability Emergency Webinar Files Public Speaking Printers Advertising Television Office Shadow IT Hosted Solution Presentation Colocation Experience History Company Culture IT solutions Lithium-ion battery Worker Search Content Public Computer Relocation WiFi 5G Loyalty Tech Support Music Techology Managing Stress IBM Politics Safety Rootkit Audiobook Humor Employer Employee Relationship Internet Exlporer Wearable Technology User Error Transportation Customer Relationship Management Video Games Competition Hybrid Cloud IP Address Books Computer Accessories Automobile How to Benefits Customer Service Hiring/Firing Twitter Two Factor Authentication

Mobile? Grab this Article!

QR-Code dieser Seite