facebook linkedin twitter

Scam Claims to Have Compromising Video… of You

Scam Claims to Have Compromising Video… of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

For a bit of background, it is important to recognize that a full 30 percent of the Internet is made up of pornographic materials. That 30 percent is not short of visitors, either - websites featuring adult content draw more traffic than Amazon, Twitter, and Netflix do together. This prevalence is one of the reasons that this email scam has been as effective as it has.

How the Scam Works
Like most scams, the purpose of this one is to extort money from its victims. A popular way to do this (among criminal circles, of course) is to blackmail them with some piece of information that they would prefer hidden - the more scandalous, the better. This scam claims that the sender of an email has just that information on you.

This scam starts with an email appearing in an inbox:

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The user is then given an address and case-sensitive alphanumeric code into which they are to deposit the sizable ransom. They are advised to use the copy/paste function to make sure the code is correct. Finally, the email ends with a warning:

“Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

One thing is for sure: this would be an extremely unsettling email to open your inbox to find. Regardless of which of its many versions you may encounter, it will deliver the same ultimatum: deliver the Bitcoin to me, or I deliver this to everyone in your life.

Don’t Get Excited
This would be a really scary threat, if it was real. There was no video filmed of you, and while the password is one that you once used, it comes from a decade-old hacked database. This threat is little more than that - a threat - but there are still lessons to be learned from an attempt like this.

This scam has been considerably successful, netting over $250,000 over the course of a few weeks, which means that scams like this will continue, and that plenty of people don’t change their passwords the way they should. However, it is also legitimately scary to consider what might happen if this threat someday wasn’t a threat - after all, almost every device today comes with a built-in front facing camera. As a result, it will be hard to be sure that there isn’t footage of you - compromising or otherwise - floating around in some cybercriminal’s system someday.

How to Protect Yourself
Proactive measures are key to foiling any attack like this, especially in regard to your passwords. Properly managing your passwords should be a priority - follow best practices and use different ones, changing them often - and if you have difficulty remembering them, use a password manager to remember them for you.

Plus, you may want to strongly consider covering up your webcam when not intentionally using it. That way, it won’t matter so much how you choose to spend your time.

Regardless, we get it. It can be really hard to keep up with each and every threat and attack that’s out there, between sextortion, ransomware, and all the others. That’s part of the reason that Computerware is here. We do everything we can to protect our clients from compromise, including education and practical defenses. Give us a call at (703) 821-8200 to learn more.

5 Business Communications Solutions
Technology Basics: Blue Screen of Death
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, September 21, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Backup Productivity Managed Service Provider Workplace Tips Data Hardware Saving Money Business Email Malware Network Security IT Services IT Support Hosted Solutions Google Small Business Efficiency User Tips Smartphones Quick Tips Computer Gadgets Mobile Devices Business Continuity Disaster Recovery Microsoft Office Mobile Office Virtualization Network Android Social Media Innovation VoIP Mobile Device Management Server Smartphone Miscellaneous Ransomware Windows 10 Communication Upgrade Unified Threat Management Collaboration Windows Remote Monitoring Data Backup Passwords Tech Term Data Recovery Operating System Remote Computing Managed IT services Mobile Computing IT Support Holiday BYOD WiFi Vendor Management communications Apps Cybersecurity Facebook The Internet of Things Marketing Users Apple BDR Analytics Firewall Automation History Managed IT Services Data Management Productivity Phishing Outsourced IT Internet of Things Alert Artificial Intelligence App Save Money IT Consultant Mobile Device Browser Content Filtering Big data Health Going Green Spam Bring Your Own Device Antivirus Gmail Bandwidth Maintenance Office Managed IT Printer Tech Support Virus Cybercrime Encryption Best Practice Information Technology Lithium-ion Battery Cost Management Hiring/Firing Hard Drives Budget Windows 8 Wireless Technology Outlook Two-factor Authentication Search Recovery Update Employer-Employee Relationship Cloud Computing Hacking Phone System IBM Money Document Management Office 365 Training Help Desk Computers Travel Compliance Data storage Risk Management Save Time Windows 10 Networking Legal Regulations Proactive IT Running Cable Access Control SaaS Saving Time Customer Service Administration VPN Law Enforcement Intranet It Management Hard Drive Education Government Humor Website Business Technology Mobility Avoiding Downtime Patch Management Blockchain Solid State Drive Data Loss Social Engineering Black Market Word iPhone Flexibility Data Breach Laptop Business Intelligence Password Cortana Business Growth Excel Digital Payment Hacker Project Management Downtime Current Events Customer Relationship Management Comparison Tablet Machine Learning Augmented Reality Telephone Systems PowerPoint Paperless Office Company Culture Sports User Computer Repair Disaster Social Networking Computing End of Support Fax Server Hosted Solution Wireless Robot File Sharing Data Security Securty Applications Twitter DDoS Virtual Reality Inbound Marketing Managed Service Politics Streaming Media Emails Bluetooth Conferencing Automobile Chromebook Retail Scam Computing Infrastructure Hack eWaste Net Neutrality Pain Points Redundancy Cryptocurrency Google Docs Chrome Value Monitoring How To Experience Download Private Cloud Digital Monitors Cleaning Router Processors Computer Accessories Office Tips Information Telephony Websites Management Start Menu Tech Terms Co-managed IT USB Taxes User Error Vulnerabilities Distributed Denial of Service Mobile Technology YouTube Trending Presentation Gaming Console Mouse Software as a Service Unified Communications Settings Healthcare Uninterrupted Power Supply Virtual Desktop Webcam Public Cloud Specifications Safety Text Messaging Vendor Programming Social Statistics Lifestyle Identity Theft Documents Bitcoin Network Congestion Data Protection Heating/Cooling IT service Storage Google Maps Database In Internet of Things PDF WannaCry Downloads Recycling Upgrades Microserver HTML Analytic Fiber-Optic Adminstration Pirating Information Corporate Profile Mobile Security Best Available Keyboard Leadership Time Management Freedom of Information LiFi Product Reviews Telephone System Read Software License Trends Motion Sickness Assessment SharePoint Get More Done Multi-Factor Security Cost Scalability Domains Fraud Tactics Google Calendar Deep Learning Turn Key Devices Messenger Tracking Public Speaking Tip of the week Work/Life Balance Printer Server VoIP Device Management UTM Content Rental Service Meetings Shortcut Touchscreen News Visible Light Communication Memory Trojan Knowledge Content Management Organize IT Plan Enterprise Resource Planning Web Server Entrepreneur Consultation Evernote IT consulting Business Managemenet Legislation Error Troubleshooting Cabling Electronic Medical Records email scam Addiction Wi-Fi Administrator Environment Technology Tips Accountants A.I. Books HIPAA Workers Upselling Virtual Assistant Video Surveillance Audit CIO online Currency Multi-factor Authentication Supercomputer Competition Fake News Advertising Flash Electronic Payment Staffing Google Wallet Migration Connected Devices Microchip Saving ZTime Data Warehousing Windows XP Wireless Headphones Telephone Business Owner Worker Health IT Webinar Network Management Access Displays LinkedIn Equifax Fleet Tracking Reading Samsung IP Address Emergency Hard Drive Disposal Society G Suite Human Resources Debate Computer Care Micrsooft Device security MSP Employer Employee Relationship Application Harddrive Microsoft Excel Drones Archive Desktop Finance Hacks Physical Security Google Drive Windows Server 2008 Skype Nanotechnology Social Network Licensing GPS Business Cards Service Level Agreement Banking Botnet External Harddrive Spyware Mobile Payment Startup Asset Tracking Relocation Tablets Vulnerability Sync Electricity Printing Username Digital Signature Permissions Point of Contact Language Unified Threat Management Backup and Disaster Recovery Ebay User Tip Gamification Notifications Teamwork CCTV Thin CLient Windows 7 Best Practives Screen Reader Customer Resource management Entertainment 3D Music Piracy Upload Business Metrics Computer Malfunction Smart Phones cache Television switches Writing Smart Tech Distribution Reliable Computing Printers Managing Stress CrashOverride Regulation 3D Printing Capital Productuvuty

toner1