facebook linkedin twitter

Computerware Blog

Scam Claims to Have Compromising Video… of You

Scam Claims to Have Compromising Video… of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

For a bit of background, it is important to recognize that a full 30 percent of the Internet is made up of pornographic materials. That 30 percent is not short of visitors, either - websites featuring adult content draw more traffic than Amazon, Twitter, and Netflix do together. This prevalence is one of the reasons that this email scam has been as effective as it has.

How the Scam Works
Like most scams, the purpose of this one is to extort money from its victims. A popular way to do this (among criminal circles, of course) is to blackmail them with some piece of information that they would prefer hidden - the more scandalous, the better. This scam claims that the sender of an email has just that information on you.

This scam starts with an email appearing in an inbox:

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The user is then given an address and case-sensitive alphanumeric code into which they are to deposit the sizable ransom. They are advised to use the copy/paste function to make sure the code is correct. Finally, the email ends with a warning:

“Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

One thing is for sure: this would be an extremely unsettling email to open your inbox to find. Regardless of which of its many versions you may encounter, it will deliver the same ultimatum: deliver the Bitcoin to me, or I deliver this to everyone in your life.

Don’t Get Excited
This would be a really scary threat, if it was real. There was no video filmed of you, and while the password is one that you once used, it comes from a decade-old hacked database. This threat is little more than that - a threat - but there are still lessons to be learned from an attempt like this.

This scam has been considerably successful, netting over $250,000 over the course of a few weeks, which means that scams like this will continue, and that plenty of people don’t change their passwords the way they should. However, it is also legitimately scary to consider what might happen if this threat someday wasn’t a threat - after all, almost every device today comes with a built-in front facing camera. As a result, it will be hard to be sure that there isn’t footage of you - compromising or otherwise - floating around in some cybercriminal’s system someday.

How to Protect Yourself
Proactive measures are key to foiling any attack like this, especially in regard to your passwords. Properly managing your passwords should be a priority - follow best practices and use different ones, changing them often - and if you have difficulty remembering them, use a password manager to remember them for you.

Plus, you may want to strongly consider covering up your webcam when not intentionally using it. That way, it won’t matter so much how you choose to spend your time.

Regardless, we get it. It can be really hard to keep up with each and every threat and attack that’s out there, between sextortion, ransomware, and all the others. That’s part of the reason that Computerware is here. We do everything we can to protect our clients from compromise, including education and practical defenses. Give us a call at (703) 821-8200 to learn more.

5 Business Communications Solutions
Technology Basics: Blue Screen of Death
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, April 21, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Hackers Business Management Data Microsoft Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Email Malware Saving Money Hosted Solutions IT Services Efficiency IT Support Google Small Business User Tips Computer Smartphones Innovation Mobile Devices Quick Tips Gadgets Business Continuity Network Disaster Recovery VoIP Microsoft Office Social Media Android Productivity Data Backup Mobile Office Virtualization Collaboration Communication Server Smartphone Upgrade Data Recovery Mobile Device Management communications Miscellaneous Tech Term Cybersecurity IT Support Ransomware Windows 10 Phishing Unified Threat Management Windows Facebook Holiday Operating System Remote Monitoring Vendor Management Passwords Analytics Automation BYOD Remote Computing Managed IT services Mobile Computing Apps Users WiFi BDR Marketing Outsourced IT Internet of Things Apple The Internet of Things Mobile Device Data Management History Artificial Intelligence Firewall Alert Browser Managed IT Services App Save Money Cloud Computing Encryption Big data IT Consultant Bring Your Own Device Two-factor Authentication Antivirus Gmail Maintenance Bandwidth Printer Office Health Content Filtering Windows 10 Going Green Spam Office 365 Training Windows 8 Hard Drives Outlook Help Desk Budget Wireless Technology Saving Time Search Business Technology Tech Support Managed IT Virus Cybercrime Lithium-ion Battery Best Practice Information Technology Cost Management Hiring/Firing Healthcare Access Control Computers It Management VPN Travel Blockchain Education Recovery Employer-Employee Relationship Update Phone System Hacking IBM Money Document Management PowerPoint SaaS Running Cable Proactive IT File Sharing Customer Service Administration Hard Drive Humor Law Enforcement Applications Twitter Intranet Managed Service Mobility Website Government Compliance Data storage Risk Management iPhone Networking Legal Save Time Information Regulations Augmented Reality Company Culture Sports User Computing Computer Repair Fax Server Disaster End of Support Social Networking Hosted Solution Social Robot Wireless Data Security Securty Google Maps DDoS Patch Management Solid State Drive Social Engineering Avoiding Downtime Data Loss Flexibility Scam Black Market Retail Cryptocurrency Word Data Breach Laptop Business Intelligence Password Cortana Business Growth Value Digital Payment Current Events Project Management Excel Digital Telephony Hacker Websites Router Downtime Management Customer Relationship Management Machine Learning Comparison Tablet Paperless Office Vulnerabilities Telephone Systems Presentation Gaming Console Cooperation Software as a Service Unified Communications Settings Trending Public Cloud Vendor Lifestyle Uninterrupted Power Supply Mouse Specifications Safety Text Messaging Vulnerability Virtual Desktop Webcam Bitcoin Programming Identity Theft Statistics Windows 7 IT service Network Congestion Documents Data Protection Distribution Entertainment Heating/Cooling Politics Storage Virtual Reality Emails Bluetooth Streaming Media Conferencing Automobile Inbound Marketing Chromebook Voice over Internet Protocol Redundancy Computing Infrastructure Hack Pain Points Monitoring How To eWaste Google Docs Net Neutrality Evernote Private Cloud Experience Chrome Download Monitors Virtual Assistant Cleaning Co-managed IT User Error Office Tips Processors Start Menu Tech Terms Computer Accessories Microchip Taxes YouTube Distributed Denial of Service USB Mobile Technology Device security MSP Employer Employee Relationship IP Address Microsoft Excel G Suite Bookmark Computer Care Micrsooft LinkedIn Application Harddrive Google Play Google Drive Windows Server 2008 Nanotechnology Social Network Licensing Human Resources Debate Drones Desktop Finance Hacks Physical Security Spyware Mobile Payment Skype Startup Asset Tracking Relocation Tablets GPS Microsoft 365 Archive Business Cards Service Level Agreement Banking Botnet Processor Username Medical IT Permissions Language Unified Threat Management Backup and Disaster Recovery Sync External Harddrive Browsers Best Practives Electricity Printing CCTV Digital Signature Security Cameras Point of Contact Screen Reader Customer Resource management User Tip Gamification Notifications cache Television switches Writing Smart Tech Reliable Computing 3D Solutions Ebay Microserver Music Piracy Upload Business Metrics Computer Malfunction Teamwork Navigation Thin CLient HTML Professional Services Fiber-Optic Database In Internet of Things Smart Phones Data Analysis WannaCry Downloads Upgrades GDPR Time Management Freedom of Information LiFi Analytic Telephone System PDF Get More Done Corporate Profile Recycling Mobile Security Tech Leadership Printer Server Assessment SharePoint Product Reviews Multi-Factor Security Cost Scalability Adminstration Integration Pirating Information Turn Key Software License Trends Motion Sickness Best Available Keyboard Deep Learning Devices Messenger Tracking Domains Tip of the week Work/Life Balance Read Fraud Tactics Fileless Malware Trojan Google Calendar Rental Service Meetings Public Speaking Modem Organize Touchscreen News Visible Light Communication Memory Proxy Server VoIP UTM Content Term Consultation IT consulting Legislation Error Cabling Electronic Medical Records Knowledge Device Management IT Plan Enterprise Resource Planning Web Server Shortcut Business Managemenet Accountants A.I. Books Workers Troubleshooting Recording Content Management email scam Addiction Wi-Fi Administrator Entrepreneur Directions Technology Tips Multi-factor Authentication Supercomputer HIPAA Upselling SSID Fake News Advertising Flash Environment Dark Web Audit CIO Competition Processing Webinar Data Warehousing Windows XP Wireless Headphones Telephone Worker Electronic Payment Health IT Video Surveillance Staffing Google Wallet online Currency Migration Connected Devices Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Emergency Hard Drive Disposal Society Network Management Managed IT Service Saving ZTime Access Productuvuty Printers Managing Stress Regulation CrashOverride 3D Printing Transportation Capital

toner1