Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Would You Fall for this Adult Scam if You Saw an Old Password?

Would You Fall for this Adult Scam if You Saw an Old Password?

As you may expect, the average Internet scammer isn’t above resorting to dirty tricks to claim their ill-gotten prize from their victims. A recent scam demonstrates just how dirty these tricks can truly be, and unfortunately, how ill-prepared many are to handle them.

To preface this scam, we need to first appreciate the scope of another Internet vice: pornography. Explicit adult material makes up a full 30 percent of the content on the Internet, and pornographic websites see more traffic than the combined totals for Amazon, Twitter, and Netflix. In short, there’s a lot of porn out there, which may be why this particular scam has been somewhat successful.

How this Scam Plays Out
The majority of scams are run in order to steal money from a victim, and this one is no exception. Also like many others, this scam features some extortion--give us what we want, or we’ll share your dirty little secret with the world.

This time, the secret is particularly dirty, according to the email that kicks off the scam (which starts, by the way, by identifying one of the target’s passwords in the subject line):

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

At this point, the email provides the user with the means to deposit a ransom of $1400 worth of Bitcoin. The email even advises them to copy and paste the required alphanumeric code so there are no mistakes made. The email then ends with a blood-chilling ultimatum:

“Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

Clearly, this is not the kind of news that anyone wants to hear. A few versions of this threat have been circulating, but all share the same essential message: cough up the dough, or your private activities will be made very public.

No Need to Panic… Yet
First, you need to know that this threat is an empty one, as gut-wrenching as it is. The biggest clue? The fact that the passwords this threat shared come from a decade-or-so-old hack of some database. Ideally, you would be able to see the password and think, “Wow, it’s been a while since I used that!” However, there are still lessons to be learned from these scam attempts, especially considering how successful this one has been so far.

By collecting ransoms of $1400, this scam racked up a total of well over a quarter of a million dollars in just over a month. This tells us a few things, the two most important being that people are not changing their passwords nearly often enough, and that threats like these are only going to continue, and may soon be more than just empty threats. Consider how many of your devices have a front-facing camera - there’s a better chance than not that some cybercriminal has some footage of you from some point in time. Whether or not you’re doing anything potentially embarrassing in it… that’s another story.

Protecting Yourself from these Attacks
When avoiding attacks like these, the name of the game is proactivity. This goes double whenever your passwords are a part of the equation, too. Proper password management is not something to procrastinate on. Yes, it can be a pain to remember so many different passwords, and to keep changing them just when you’ve remembered them, but there are password managers and other solutions to make it easier for you without short-changing your security.

Speaking of your security, you may want to take a few seconds to make sure that your webcam is covered up if you don’t need to use it. Whether or not you’re going to do anything private, you’ll be safe from peering eyes.

For more help protecting yourself from cyberthreats and otherwise optimizing your business’ use of the IT at its disposal, reach out to Network Solutions Unlimited at 217-428-6449.

Tip of the Week: Assigning Default Apps in Windows...
Google’s Inflated Plan to Get the Internet to Bill...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, November 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Retail Information Technology Business Continuity Touchpad Public Computer The Internet of Things Government Training Money Microsoft Word Employee-Employer Relationship USB Hiring/Firing Remote Monitoring Windows 10s HBO Risk Management iOS Emails Solid State Drive Productivity Phone System Workers Miscellaneous Augmented Reality Remote Computing Browser MSP Backup Android Router Unified Communications IT budget Ransomware IT Support Computer Server Vendor Management Testing Device Security Financial Technology Social Engineering Analysis Internet of Things CrashOverride Automation Network Security Audit Edge Marketing Cybercrime Big Data Artificial Intelligence IT solutions Regulation Quick Tips Monitor Cybersecurity Data Management Privacy Websites Public Cloud Mobile Devices Books Patch Management Cast Conferencing Proactive IT Software as a Service Spyware VoIP Automobile Hard Drives Hosted Solution Social Media Employer-Employee Relationship Advertising Proactive Comparison Malware Dark Web Productivity Gamification Telephone Nanotechnology Antivirus Holiday Identities eWaste Computing Infrastructure Search Microsoft Laptop NFL Lifestyle Spam Private Cloud Gadgets Robot Files IT Services Virtual Reality Encryption Microsoft Office Amazon Politics Innovation Business Intelligence Hard Drive Applications End of Support Managing Stress Sales Content Upgrade Alexa for Business Wireless Internet Tech Support Cleaning Managed IT Service Small Business Emergency Communication Work/Life Balance Data Breach Network Outsourced IT Hackers Microsoft Excel Updates Data Storage Monitoring Project Management OneNote Business Management Communications Upgrades Congratulations Storage Physical Security Save Money Bandwidth Memory Experience Thank You Word Entertainment Gifts Best Practices Personal Information Fraud How to Document Management Transportation Shortcut Ciminal Credit Cards Google Drive Shadow IT Legal Chromecast Tip of the Week Telephone Systems Reputation Monitors Windows Saving Time SaaS Disaster Recovery Humor HIPAA Administration Smartphones Business Computing Tablets Commerce Devices Twitter Data Compliance Wasting Money Information Application Efficiency Users Google Maps IT Solutions Managed IT Services Facebook Mobile Device Wireless Audiobook Connectivity Black Market Content Filter Colocation Redundancy Networking Financial How To Sync Computer Forensics Best Practice Display Worker Commute Language IT Support Phishing Google Assistant App store Update Maintenance History User Error Collaboration Outlook Workplace Tips Technology Blockchain iPhone WannaCry Touchscreen FAQ Scalability App WiFi Evernote Avoiding Downtime Adobe Access Control Troubleshooting Passwords Wi-Fi Bluetooth Smartphone Windows 10 Benefits Identity Theft PowerPoint Going Green Windows 7 Webinar Hyperlink Excel Screen Mirroring Management Content Filtering Printers Managed IT Admin Students Wasting Time Data Recovery Assessment Samsung Internet intranet Office Tips Data Privacy Mobile Security Google Docs Relocation Business Value Chrome Recovery VPN Electronic Medical Records Internet exploMicrosoft Video Games Hacking Television Cloud Computing hacker Unified Threat Management Data Theft Health Hosted Solutions Settings Wireless Technology Virtual Assistant Data storage Root Cause Analysis Mobile Device Management User Tips Alert Managed Service Provider Computer Fan Virtualization Chromebook Safety Law Enforcement Camera Worker Spam Blocking Smart Tech Windows Ink File Storage Managed IT Services Internet Exlporer Cloud File Sharing Identity Legislation Printing Peripheral Software Scam Wireless Charging Data Security Computers Specifications Budget IT Management Licensing Windows 10 Keyboard Shortcuts Battery Co-Managed Services Operating System Hybrid Cloud Computing Password Bring Your Own Device Save Time Customer PDF Email Google Office Company Culture Vulnerability Apps Hardware HaaS Rootkit Office 365 Utility Computing BDR Downtime Accessory Education Projects Tech Term Virus Computer Care Consultant Business Technology Two Factor Authentication Professional Services Gmail IoT WIndows Server 2008 Instant Messaging Cortana Mobile Firewall Managed Service Saving Money Sports Data Loss Employer Employee Relationship Business Owner Unsupported Software Keyboard Loyalty Vendor Two-factor Authentication Data Backup Data Protection WPA3 Mobility Cost Management Hard Disk Drive Apple Techology Charger Smart Technology Security Streaming Media Travel Computer Accessories Cache Meetings BYOD Flexibility