facebook linkedin twitter

Scam Claims to Have Compromising Video… of You

Scam Claims to Have Compromising Video… of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

For a bit of background, it is important to recognize that a full 30 percent of the Internet is made up of pornographic materials. That 30 percent is not short of visitors, either - websites featuring adult content draw more traffic than Amazon, Twitter, and Netflix do together. This prevalence is one of the reasons that this email scam has been as effective as it has.

How the Scam Works
Like most scams, the purpose of this one is to extort money from its victims. A popular way to do this (among criminal circles, of course) is to blackmail them with some piece of information that they would prefer hidden - the more scandalous, the better. This scam claims that the sender of an email has just that information on you.

This scam starts with an email appearing in an inbox:

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The user is then given an address and case-sensitive alphanumeric code into which they are to deposit the sizable ransom. They are advised to use the copy/paste function to make sure the code is correct. Finally, the email ends with a warning:

“Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

One thing is for sure: this would be an extremely unsettling email to open your inbox to find. Regardless of which of its many versions you may encounter, it will deliver the same ultimatum: deliver the Bitcoin to me, or I deliver this to everyone in your life.

Don’t Get Excited
This would be a really scary threat, if it was real. There was no video filmed of you, and while the password is one that you once used, it comes from a decade-old hacked database. This threat is little more than that - a threat - but there are still lessons to be learned from an attempt like this.

This scam has been considerably successful, netting over $250,000 over the course of a few weeks, which means that scams like this will continue, and that plenty of people don’t change their passwords the way they should. However, it is also legitimately scary to consider what might happen if this threat someday wasn’t a threat - after all, almost every device today comes with a built-in front facing camera. As a result, it will be hard to be sure that there isn’t footage of you - compromising or otherwise - floating around in some cybercriminal’s system someday.

How to Protect Yourself
Proactive measures are key to foiling any attack like this, especially in regard to your passwords. Properly managing your passwords should be a priority - follow best practices and use different ones, changing them often - and if you have difficulty remembering them, use a password manager to remember them for you.

Plus, you may want to strongly consider covering up your webcam when not intentionally using it. That way, it won’t matter so much how you choose to spend your time.

Regardless, we get it. It can be really hard to keep up with each and every threat and attack that’s out there, between sextortion, ransomware, and all the others. That’s part of the reason that Computerware is here. We do everything we can to protect our clients from compromise, including education and practical defenses. Give us a call at (703) 821-8200 to learn more.

5 Business Communications Solutions
Technology Basics: Blue Screen of Death
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 13, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Backup Workplace Tips Managed Service Provider Productivity Data Hardware Saving Money Business Email Malware Network Security IT Services IT Support Efficiency Hosted Solutions Google Computer Small Business User Tips Smartphones Quick Tips Gadgets Mobile Devices Business Continuity Disaster Recovery Innovation Android Microsoft Office Mobile Office Virtualization Network Social Media VoIP Mobile Device Management Server Data Backup Smartphone Collaboration Communication Miscellaneous Ransomware Windows 10 Upgrade Data Recovery IT Support Unified Threat Management Tech Term Windows Productivity Remote Monitoring Operating System Passwords Mobile Computing Vendor Management BYOD Remote Computing Managed IT services Holiday WiFi BDR Cybersecurity Apps communications Facebook Analytics The Internet of Things Marketing Users History Firewall Apple Phishing Mobile Device Automation Outsourced IT Internet of Things Data Management Managed IT Services Alert Browser Big data Save Money IT Consultant App Artificial Intelligence Bring Your Own Device Health Antivirus Spam Bandwidth Content Filtering Encryption Going Green Office Maintenance Gmail Virus Tech Support Help Desk Wireless Technology Cybercrime Search Cost Management Hiring/Firing Hard Drives Managed IT Outlook Office 365 Windows 8 Best Practice Information Technology Lithium-ion Battery Budget Two-factor Authentication Printer Update Recovery Employer-Employee Relationship Training Phone System Money Hacking Document Management Business Technology Saving Time Computers Cloud Computing VPN Travel IBM Regulations Website Risk Management Government Administration SaaS Save Time Access Control Law Enforcement Hard Drive It Management Compliance Proactive IT Running Cable Data storage Intranet Humor Customer Service Education Networking Windows 10 Legal Project Management PowerPoint DDoS Websites Machine Learning Paperless Office Telephone Systems Business Intelligence Sports Computing Digital Payment Disaster Word End of Support Information Hosted Solution Downtime Robot Current Events Password Cortana Comparison Tablet Avoiding Downtime File Sharing Securty Hacker Data Security Company Culture Google Maps iPhone Solid State Drive Computer Repair Patch Management Blockchain Social Networking Mobility Flexibility Fax Server Data Loss Social Engineering Black Market User Applications Excel Twitter Laptop Managed Service Data Breach Customer Relationship Management Business Growth Wireless Augmented Reality Heating/Cooling Entertainment Digital Gaming Console Office Tips Storage Telephony YouTube Net Neutrality Start Menu Tech Terms Webcam Microchip Taxes Vendor Monitoring Text Messaging Chrome Distributed Denial of Service Unified Communications Settings Mobile Technology Retail Software as a Service Public Cloud Uninterrupted Power Supply eWaste Management Router Value Computer Accessories Bitcoin Inbound Marketing Identity Theft IT service User Error Vulnerabilities Co-managed IT Trending Data Protection Healthcare Mouse Processors Virtual Reality Bluetooth Pain Points Politics USB Automobile Lifestyle Presentation Statistics Emails Programming Scam Chromebook Cryptocurrency Network Congestion Redundancy Computing Infrastructure Hack Specifications Safety Google Docs Virtual Desktop How To Experience Social Private Cloud Monitors Download Cleaning Documents Conferencing Streaming Media Trends Virtual Assistant Wi-Fi Administrator Advertising Flash Multi-Factor Security Cost Product Reviews Technology Tips Books CIO Workers Teamwork Software License Debate Windows XP Get More Done Devices Audit Harddrive Staffing Supercomputer Google Wallet Bookmark Fraud Tactics Read Fake News Worker Displays UTM Turn Key Content Society Printer Server PDF Data Warehousing GPS Best Available IT Plan Device Management Keyboard Enterprise Resource Planning Emergency Hard Drive Disposal External Harddrive Trojan Legislation Error Access Reading Samsung Micrsooft Processor G Suite Accountants Domains A.I. Business Managemenet Computer Care Employer Employee Relationship Drones Browsers email scam Organize Addiction Content Management Microsoft Excel Licensing Multi-factor Authentication Public Speaking Thin CLient Hacks Physical Security User Tip Google Drive Windows Server 2008 3D Ebay Tablets Migration Shortcut Connected Devices online Currency Vulnerability Smart Phones Banking Botnet Permissions Language Wireless Headphones Telephone Spyware Mobile Payment Relocation Sync Troubleshooting Equifax Fleet Tracking Electricity Printing Data Analysis Entrepreneur Network Management Adminstration Pirating Information switches Writing HIPAA Device security MSP LinkedIn Leadership Notifications CCTV Music Webinar Environment Windows 7 Reliable Computing Upgrades Desktop Competition Finance Business Metrics Computer Malfunction Electronic Payment Nanotechnology Social Network cache Television In Internet of Things LiFi Business Owner Startup Asset Tracking Skype WannaCry Downloads Fileless Malware Business Cards Service Level Agreement Archive IP Address Username Corporate Profile Proxy Server Unified Threat Management Backup and Disaster Recovery Time Management Freedom of Information Scalability Deep Learning Application Gamification Motion Sickness Electronic Medical Records Work/Life Balance Screen Reader Point of Contact Human Resources Customer Resource management Assessment SharePoint Tip of the week Visible Light Communication Memory Best Practives Smart Tech Distribution Google Calendar Upselling Messenger Tracking Directions Piracy Upload Video Surveillance IT consulting HTML VoIP Rental Service Meetings Dark Web Fiber-Optic Database Touchscreen News Cabling Digital Signature Mobile Security Recycling Microserver Knowledge Saving ZTime Web Server Health IT Telephone System Analytic Consultation Evernote Managed IT Service Regulation Capital Productuvuty Navigation Printers CrashOverride 3D Printing Managing Stress

toner1