Sextortion come with ransomware and trojans in 2019. So how would you feel if you’d get a mail that would tell you someone has been recording you while you had fun surfing on porn pages? By now you should now already that it is all a scam though: those pesky mails that want to make you believe that you’ve been watched are a lie from beginning to end. So what is sextortion?
Sextortion is defined as blackmail in which sexual information or images are used to extort sexual favors and/or money from the victim. This online blackmail is often conducted by sophisticated organized criminal networks operating out of business-like locations similar to call centers.
Though there is no one method by which criminal target their victims, many individuals are targeted through websites including social media, dating, webcam or adult pornography sites.Criminals often target hundreds of individuals around the world simultaneously, in an attempt to increase their chances of finding a victim.
One receives a mail that claims you have been watched and recorded and that tells you to pay up in bitcoins so that the video will not be released. The scheme was rather successful, with the scammers making around 50 000 dollars a week.
Now they are trying something new though – to get even more money out of their unsuspecting and panicking victims. The mail starts as usual and tries to trick the recipient into believing that there was actually someone recording him. This is being achieved by including a password associated with an account and mail address (both most likely obtained from earlier breaches), and random other information.
So if u are the next victim immediately cease all contact with the individual and report the matter to your local police and online service provider. If the blackmail is occurring through a social network, also alert the administrator. Do not pay the money which is being demanded.
Feel free to contact E-SPIN for the assistance for solution capable to allow your enterprise to reverse engineering suspect malware, so your can perform malware analysis to protect your nation or enterprise, as well as end to proactive network, server, endpoint, mobile device malware, antivirus protection for latest threat and challenges.