Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Would You Fall for this Adult Scam if You Saw an Old Password?

Would You Fall for this Adult Scam if You Saw an Old Password?

As you may expect, the average Internet scammer isn’t above resorting to dirty tricks to claim their ill-gotten prize from their victims. A recent scam demonstrates just how dirty these tricks can truly be, and unfortunately, how ill-prepared many are to handle them.

To preface this scam, we need to first appreciate the scope of another Internet vice: pornography. Explicit adult material makes up a full 30 percent of the content on the Internet, and pornographic websites see more traffic than the combined totals for Amazon, Twitter, and Netflix. In short, there’s a lot of porn out there, which may be why this particular scam has been somewhat successful.

How this Scam Plays Out
The majority of scams are run in order to steal money from a victim, and this one is no exception. Also like many others, this scam features some extortion--give us what we want, or we’ll share your dirty little secret with the world.

This time, the secret is particularly dirty, according to the email that kicks off the scam (which starts, by the way, by identifying one of the target’s passwords in the subject line):

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

At this point, the email provides the user with the means to deposit a ransom of $1400 worth of Bitcoin. The email even advises them to copy and paste the required alphanumeric code so there are no mistakes made. The email then ends with a blood-chilling ultimatum:

“Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

Clearly, this is not the kind of news that anyone wants to hear. A few versions of this threat have been circulating, but all share the same essential message: cough up the dough, or your private activities will be made very public.

No Need to Panic… Yet
First, you need to know that this threat is an empty one, as gut-wrenching as it is. The biggest clue? The fact that the passwords this threat shared come from a decade-or-so-old hack of some database. Ideally, you would be able to see the password and think, “Wow, it’s been a while since I used that!” However, there are still lessons to be learned from these scam attempts, especially considering how successful this one has been so far.

By collecting ransoms of $1400, this scam racked up a total of well over a quarter of a million dollars in just over a month. This tells us a few things, the two most important being that people are not changing their passwords nearly often enough, and that threats like these are only going to continue, and may soon be more than just empty threats. Consider how many of your devices have a front-facing camera - there’s a better chance than not that some cybercriminal has some footage of you from some point in time. Whether or not you’re doing anything potentially embarrassing in it… that’s another story.

Protecting Yourself from these Attacks
When avoiding attacks like these, the name of the game is proactivity. This goes double whenever your passwords are a part of the equation, too. Proper password management is not something to procrastinate on. Yes, it can be a pain to remember so many different passwords, and to keep changing them just when you’ve remembered them, but there are password managers and other solutions to make it easier for you without short-changing your security.

Speaking of your security, you may want to take a few seconds to make sure that your webcam is covered up if you don’t need to use it. Whether or not you’re going to do anything private, you’ll be safe from peering eyes.

For more help protecting yourself from cyberthreats and otherwise optimizing your business’ use of the IT at its disposal, reach out to FRS Pros at 561-795-2000.

Tip of the Week: Assigning Default Apps in Windows...
Google’s Inflated Plan to Get the Internet to Bill...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, September 22 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Management Cloud Tech Term Business Computing Google Software User Tips Hackers Malware Hardware Microsoft Computer Cybersecurity Mobile Devices Windows Hosted Solutions Efficiency Data Backup Apps Browser Productivity Smartphone Innovation Cybercrime Operating System Internet of Things Smartphones Data Recovery Android Data Security Outsourced IT Office 365 Data Money Business Email Mobile Device Management Alert Vulnerability Law Enforcement Ransomware Backup Phishing Business Continuity IT Support Saving Money Chrome VoIP Microsoft Office Server IT Services Windows 10 Managed IT Services Best Practice Disaster Recovery Collaboration IT Support Network Employer-Employee Relationship Router Applications Computers Information Google Drive Virtualization Managed Service Provider Upgrade Managed IT Unsupported Software Communications Telephone Systems Blockchain App Gadgets Two-factor Authentication Cloud Computing Spam Tech Support Information Technology Small Business Windows 10 Users Audit Save Money Managed Service Google Docs Data Protection Patch Management Wireless Charging Quick Tips Mobile Security Application Bring Your Own Device Hosted Solution Devices Avoiding Downtime Budget Safety Google Assistant Wireless Technology Data Breach Cost Management Managed IT Services Data Management Augmented Reality Commerce WannaCry Communication Travel Holiday Artificial Intelligence Productivity Excel Risk Management Sports Government Fraud Proactive IT Passwords Wi-Fi SaaS Robot Miscellaneous Password Automation Update User Error The Internet of Things Data Storage Social Media Shortcut Politics Cortana Networking WiFi VPN iPhone BDR Mobile Device OneNote Hacking Facebook Gmail Health Legislation Language Management Adobe Workers Samsung Unified Threat Management Remote Computing Project Management Printing Solid State Drive Files Meetings DDoS Projects Emails Cast Settings Disaster Gifts Computing Root Cause Analysis Wireless Recovery Legal Windows Ink Upgrades Search Encryption Comparison PowerPoint Computer Fan Mobility Licensing Antivirus Updates Vendor Microsoft Excel IT budget Hard Disk Drive Laptop IT Management Outlook Transportation Identity Marketing BYOD Credit Cards App store Hybrid Cloud Private Cloud Administrator Google Maps Spyware Lithium-ion battery Specifications Virus Wireless Internet Streaming Media Microsoft Word Employee-Employer Relationship File Sharing Emergency Value Touchpad IT Solutions Going Green Social Data Privacy Webinar Point of Sale Amazon Access Apple Consultant Sales Proactive Gamification Chromecast Tablets Maintenance Business Technology Telephony Storage Social Engineering Humor Sync Evernote Identity Theft Software as a Service Remote Monitoring Hard Drive IT solutions FAQ Virtual Assistant Internet Exlporer Edge Touchscreen Retail Websites Memory NFL eWaste Testing Uninterrupted Power Supply Identities Computer Forensics iOS WIndows Server 2008 Workplace Tips Vendor Management Bandwidth Data Loss Ciminal Chromebook Windows 10s HBO Charger Alexa for Business Reputation Data storage Screen Mirroring Conferencing Data Theft Financial Computer Care Nanotechnology History Word Device Security Camera Virtual Reality Work/Life Balance Current Events Electronic Medical Records Text Messaging Crowdsourcing Employer Employee Relationship Benefits Phone System Save Time Office tips Computer Accessories Compliance Printers Advertising Battery Smart Technology Flexibility Music Instant Messaging Hacker Thank You es Regulation Cache Scalability Analytics End of Support Keyboard Training Monitors HaaS Entertainment Congratulations Black Market Cleaning Twitter Relocation Automobile Office Television CrashOverride Big Data Managing Stress Company Culture Personal Information USB Worker Books PDF Scam How To Education Hiring/Firing Mobile Computing Video Games Experience