Contact us today!

FRS Pros Blog

Would You Fall for this Adult Scam if You Saw an Old Password?

Would You Fall for this Adult Scam if You Saw an Old Password?

As you may expect, the average Internet scammer isn’t above resorting to dirty tricks to claim their ill-gotten prize from their victims. A recent scam demonstrates just how dirty these tricks can truly be, and unfortunately, how ill-prepared many are to handle them.

To preface this scam, we need to first appreciate the scope of another Internet vice: pornography. Explicit adult material makes up a full 30 percent of the content on the Internet, and pornographic websites see more traffic than the combined totals for Amazon, Twitter, and Netflix. In short, there’s a lot of porn out there, which may be why this particular scam has been somewhat successful.

How this Scam Plays Out
The majority of scams are run in order to steal money from a victim, and this one is no exception. Also like many others, this scam features some extortion--give us what we want, or we’ll share your dirty little secret with the world.

This time, the secret is particularly dirty, according to the email that kicks off the scam (which starts, by the way, by identifying one of the target’s passwords in the subject line):

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

At this point, the email provides the user with the means to deposit a ransom of $1400 worth of Bitcoin. The email even advises them to copy and paste the required alphanumeric code so there are no mistakes made. The email then ends with a blood-chilling ultimatum:


You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

Clearly, this is not the kind of news that anyone wants to hear. A few versions of this threat have been circulating, but all share the same essential message: cough up the dough, or your private activities will be made very public.

No Need to Panic… Yet
First, you need to know that this threat is an empty one, as gut-wrenching as it is. The biggest clue? The fact that the passwords this threat shared come from a decade-or-so-old hack of some database. Ideally, you would be able to see the password and think, “Wow, it’s been a while since I used that!” However, there are still lessons to be learned from these scam attempts, especially considering how successful this one has been so far.

By collecting ransoms of $1400, this scam racked up a total of well over a quarter of a million dollars in just over a month. This tells us a few things, the two most important being that people are not changing their passwords nearly often enough, and that threats like these are only going to continue, and may soon be more than just empty threats. Consider how many of your devices have a front-facing camera - there’s a better chance than not that some cybercriminal has some footage of you from some point in time. Whether or not you’re doing anything potentially embarrassing in it… that’s another story.

Protecting Yourself from these Attacks
When avoiding attacks like these, the name of the game is proactivity. This goes double whenever your passwords are a part of the equation, too. Proper password management is not something to procrastinate on. Yes, it can be a pain to remember so many different passwords, and to keep changing them just when you’ve remembered them, but there are password managers and other solutions to make it easier for you without short-changing your security.

Speaking of your security, you may want to take a few seconds to make sure that your webcam is covered up if you don’t need to use it. Whether or not you’re going to do anything private, you’ll be safe from peering eyes.

For more help protecting yourself from cyberthreats and otherwise optimizing your business’ use of the IT at its disposal, reach out to FRS Pros at 561-795-2000.

Tip of the Week: Assigning Default Apps in Windows...
Google’s Inflated Plan to Get the Internet to Bill...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Google Business Management Cloud Tech Term Business Computing Software User Tips Hackers Hardware Microsoft Computer Malware Browser Productivity Efficiency Cybersecurity Mobile Devices Windows Data Backup Hosted Solutions Innovation Cybercrime Apps Internet of Things Smartphone Windows 10 Office 365 Data Recovery IT Services Data Security Email Smartphones Operating System Outsourced IT Android Backup Mobile Device Management Business Continuity Vulnerability Data Money Business Upgrade Alert VoIP Phishing Law Enforcement IT Support Disaster Recovery Ransomware Chrome Microsoft Office Saving Money Collaboration Managed IT Services Network Server IT Support Best Practice Employer-Employee Relationship Communications Applications Small Business App Google Drive Blockchain Two-factor Authentication Cloud Computing Spam Information Windows 10 Computers Virtualization Information Technology Passwords Miscellaneous Telephone Systems Tech Support Managed Service Provider Gadgets Managed IT Unsupported Software Router Hosted Solution Excel Application Managed Service Hacking Fraud Encryption Avoiding Downtime Mobile Security Safety Gmail Bring Your Own Device Proactive IT Evernote SaaS Save Money Communication Holiday Google Assistant User Error Risk Management Touchscreen Data Storage Artificial Intelligence Government Networking WiFi Cortana Budget Mobile Device OneNote Wireless Technology Wi-Fi Robot Word Data Management Audit Update Patch Management Wireless Charging Politics The Internet of Things Social Media Google Docs Project Management Shortcut Productivity Data Protection Workplace Tips VPN iPhone Devices Sports BDR Data Breach Cost Management Managed IT Services Facebook Automation Augmented Reality Users Password WannaCry Quick Tips Travel Commerce IT Solutions Wireless Legal Uninterrupted Power Supply Management Access Control Settings File Sharing Antivirus Printing Telephone Search Apple Webinar Mobility Projects Transportation Tablets Maintenance Consultant Laptop Sales Proactive Vendor Private Cloud Sync PowerPoint Admin Remote Monitoring Storage Social Engineering FAQ DDoS Hyperlink Edge Files IT solutions Recovery Identity Going Green Social NFL eWaste Emergency Disaster Hybrid Cloud Touchpad Retail Websites Employee-Employer Relationship iOS WIndows Server 2008 Wireless Internet Identities Point of Sale Charger Value Wasting Time Data Loss Ciminal Windows 10s HBO Conferencing Data Theft Identity Theft Administrator Data Privacy Windows 7 Computer Care Nanotechnology Device Security Amazon Screen Mirroring Humor Streaming Media Business Technology Adobe Workers Lithium-ion battery Gamification Unified Threat Management Legislation Language Accessory Meetings Software as a Service Solid State Drive Gifts Computing Vendor Management Access Hard Drive Display Root Cause Analysis Windows Ink Virtual Assistant Emails Cast Chromecast Testing Computer Fan Reputation Licensing Updates Memory Upgrades Comparison Scam Hard Disk Drive IT Management History Outlook Telephony Computer Forensics Peripheral Data storage Microsoft Excel IT budget Bandwidth Credit Cards App store Samsung Internet Exlporer Chromebook Co-Managed Services Remote Computing Health Google Maps Spyware Alexa for Business Marketing BYOD Camera Microsoft Word Financial Specifications Virus es Phone System Cache Benefits Save Time Computer Accessories Training Monitors Office tips Flexibility Music Advertising Battery Smart Technology Television CrashOverride Instant Messaging Hacker Compliance Printers Company Culture Scalability Analytics HaaS Entertainment End of Support Keyboard Regulation Relocation Black Market Cleaning Big Data Automobile Office Personal Information Thank You Twitter Managing Stress USB Worker How To Books PDF Mobile Computing Video Games Experience Congratulations Education Hiring/Firing Work/Life Balance Virtual Reality Current Events Electronic Medical Records Text Messaging Crowdsourcing Employer Employee Relationship