facebook linkedin twitter

Scam Claims to Have Compromising Video… of You

Scam Claims to Have Compromising Video… of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

For a bit of background, it is important to recognize that a full 30 percent of the Internet is made up of pornographic materials. That 30 percent is not short of visitors, either - websites featuring adult content draw more traffic than Amazon, Twitter, and Netflix do together. This prevalence is one of the reasons that this email scam has been as effective as it has.

How the Scam Works
Like most scams, the purpose of this one is to extort money from its victims. A popular way to do this (among criminal circles, of course) is to blackmail them with some piece of information that they would prefer hidden - the more scandalous, the better. This scam claims that the sender of an email has just that information on you.

This scam starts with an email appearing in an inbox:

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The user is then given an address and case-sensitive alphanumeric code into which they are to deposit the sizable ransom. They are advised to use the copy/paste function to make sure the code is correct. Finally, the email ends with a warning:

“Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

One thing is for sure: this would be an extremely unsettling email to open your inbox to find. Regardless of which of its many versions you may encounter, it will deliver the same ultimatum: deliver the Bitcoin to me, or I deliver this to everyone in your life.

Don’t Get Excited
This would be a really scary threat, if it was real. There was no video filmed of you, and while the password is one that you once used, it comes from a decade-old hacked database. This threat is little more than that - a threat - but there are still lessons to be learned from an attempt like this.

This scam has been considerably successful, netting over $250,000 over the course of a few weeks, which means that scams like this will continue, and that plenty of people don’t change their passwords the way they should. However, it is also legitimately scary to consider what might happen if this threat someday wasn’t a threat - after all, almost every device today comes with a built-in front facing camera. As a result, it will be hard to be sure that there isn’t footage of you - compromising or otherwise - floating around in some cybercriminal’s system someday.

How to Protect Yourself
Proactive measures are key to foiling any attack like this, especially in regard to your passwords. Properly managing your passwords should be a priority - follow best practices and use different ones, changing them often - and if you have difficulty remembering them, use a password manager to remember them for you.

Plus, you may want to strongly consider covering up your webcam when not intentionally using it. That way, it won’t matter so much how you choose to spend your time.

Regardless, we get it. It can be really hard to keep up with each and every threat and attack that’s out there, between sextortion, ransomware, and all the others. That’s part of the reason that Computerware is here. We do everything we can to protect our clients from compromise, including education and practical defenses. Give us a call at (703) 821-8200 to learn more.

5 Business Communications Solutions
Technology Basics: Blue Screen of Death
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Hackers Business Computing Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Business Network Security Saving Money Malware Email Hosted Solutions IT Services IT Support Efficiency Google Small Business Computer Quick Tips User Tips Smartphones Mobile Devices Gadgets Business Continuity Innovation Disaster Recovery Social Media Microsoft Office Android Mobile Office Virtualization Network VoIP Data Backup Smartphone Server Mobile Device Management Collaboration Communication Productivity Data Recovery Miscellaneous Upgrade Ransomware Tech Term Windows 10 Unified Threat Management IT Support Windows Passwords Remote Monitoring communications Facebook Operating System Holiday Mobile Computing Apps Managed IT services BYOD Remote Computing Cybersecurity Vendor Management Phishing BDR Users WiFi Marketing The Internet of Things Automation Mobile Device Analytics Firewall History Apple Outsourced IT Data Management Browser Alert Managed IT Services Save Money Internet of Things Artificial Intelligence Big data Encryption App IT Consultant Antivirus Spam Maintenance Printer Content Filtering Gmail Going Green Health Office Bandwidth Bring Your Own Device Wireless Technology Cost Management Managed IT Outlook Windows 8 Search Office 365 Budget Business Technology Hiring/Firing Two-factor Authentication Hard Drives Virus Tech Support Lithium-ion Battery Best Practice Information Technology Saving Time Windows 10 Cybercrime Cloud Computing Help Desk Hacking Access Control Money Training Document Management Blockchain Computers IBM VPN Recovery Employer-Employee Relationship Travel Phone System Update Risk Management Compliance Administration Data storage Save Time It Management Information Humor Legal Customer Service Networking Running Cable Healthcare Proactive IT Regulations Website Hard Drive Government Mobility Intranet Applications SaaS Twitter Education Managed Service Law Enforcement Hacker Solid State Drive Business Intelligence Black Market Fax Server Flexibility Digital Payment Data Security Router Downtime Machine Learning Cryptocurrency Laptop Avoiding Downtime Telephone Systems User Business Growth Patch Management Comparison Tablet iPhone Data Loss Company Culture Social Scam Computer Repair Wireless File Sharing DDoS Social Networking Paperless Office Excel Data Breach Sports Google Maps Disaster Customer Relationship Management Digital Computing Project Management Social Engineering Hosted Solution End of Support Word Augmented Reality Websites PowerPoint Robot Current Events Securty Password Cortana Value Webcam How To Text Messaging Software as a Service Uninterrupted Power Supply Private Cloud Net Neutrality Download Monitoring Processors Chrome Bluetooth Telephony Lifestyle USB Bitcoin Vendor Presentation Data Protection Microchip Taxes Management Google Docs Computer Accessories Distributed Denial of Service Inbound Marketing Experience Specifications Safety Virtual Desktop Cleaning Vulnerabilities Public Cloud Monitors Trending Office Tips Documents Pain Points Mouse Entertainment Identity Theft Heating/Cooling Redundancy Storage Programming YouTube Statistics Network Congestion Evernote Unified Communications Settings Politics Virtual Reality Emails Retail Automobile Start Menu Tech Terms Streaming Media eWaste Gaming Console Chromebook Conferencing User Error Mobile Technology Computing Infrastructure Hack IT service Co-managed IT Cost Rental Service Meetings Music Dark Web Troubleshooting Computer Care Read Software License Trends switches Writing Webinar SSID Entrepreneur GPS Microsoft Excel Multi-Factor Security External Harddrive Fraud Tactics Cabling Upgrades Processing Environment Google Drive Windows Server 2008 Devices Web Server Health IT HIPAA Books Workers Managed IT Service Electronic Payment Spyware Device Management Mobile Payment UTM Content Wi-Fi Administrator LiFi Competition Vulnerability Legislation Error Supercomputer Bookmark Business Owner Thin CLient Electricity Printing Content Management IT Plan Enterprise Resource Planning 3D Ebay Business Managemenet Work/Life Balance IP Address Smart Phones email scam Addiction Worker Deep Learning Google Play Windows 7 Accountants A.I. Reading Samsung Best Practives Processor Human Resources cache Television online Currency Multi-factor Authentication Visible Light Communication Memory Application Wireless Headphones Telephone Employer Employee Relationship Browsers Leadership WannaCry Downloads Migration Connected Devices G Suite IT consulting Adminstration Pirating Information User Tip Microserver Corporate Profile Network Management Licensing Security Cameras Time Management Freedom of Information LinkedIn Equifax Fleet Tracking Hacks Physical Security Relocation CIO Tablets Navigation Assessment SharePoint Device security MSP Banking Botnet Advertising Flash Digital Signature Nanotechnology Social Network Staffing Google Wallet Get More Done Data Analysis Google Calendar Archive Desktop Finance Sync Windows XP Teamwork Tip of the week Skype CCTV Society Turn Key VoIP Business Cards Service Level Agreement Displays Printer Server GDPR Touchscreen News Startup Asset Tracking Notifications Knowledge Point of Contact Unified Threat Management Backup and Disaster Recovery Reliable Computing Micrsooft Trojan Tech PDF Upselling Consultation Username Business Metrics Computer Malfunction Screen Reader Customer Resource management Drones Fileless Malware Technology Tips Gamification In Internet of Things Best Available Organize Keyboard Video Surveillance Virtual Assistant Proxy Server Domains Saving ZTime Audit Piracy Upload Modem Fake News Smart Tech Distribution Analytic Fiber-Optic Database Scalability Term Recycling Data Warehousing HTML Motion Sickness Permissions Language Electronic Medical Records Public Speaking Telephone System Messenger Tracking Directions Harddrive Access Mobile Security Shortcut Debate Emergency Hard Drive Disposal Product Reviews Productuvuty Regulation Cooperation 3D Printing Medical IT CrashOverride Printers Capital Managing Stress

toner1