By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    What is a rootkit and how to remove it
    12 months ago
    The Mask – Unveiling the World’s Most Sophisticated APT Campaign
    12 months ago
    Regin APT Attacks Among the Most Sophisticated Ever Analyzed
    12 months ago
    Latest News
    Beware of scammers! Dangerous apps in the App Store
    2 days ago
    How To Limit Login Attempts on WordPress (+ Should You?)
    3 days ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (September 18, 2023 to September 24, 2023)
    3 days ago
    Two privilege escalation vulnerability in Simple Membership Plugin
    4 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    For 0-day vulnerabilities in Windows, temporary patches
    12 months ago
    Windows 11 22H2 (build 22621.317) outs in the Release Preview Channel
    12 months ago
    How to avoid problems installing Windows 11 22H2
    12 months ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    8 months ago
    Now you can speed up any video in your browser
    8 months ago
    How to restore access to a file after EFS or view it on another computer?
    8 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    9 months ago
  • How To
    How ToShow More
    Detecting zero-days before zero-day
    Detecting zero-days before zero-day
    23 hours ago
    See what threats are lurking in your Office 365 with Cloudflare Email Retro Scan
    See what threats are lurking in your Office 365 with Cloudflare Email Retro Scan
    23 hours ago
    Network performance update: Birthday Week 2023
    Network performance update: Birthday Week 2023
    23 hours ago
    Cloudflare now uses post-quantum cryptography to talk to your origin server
    Cloudflare now uses post-quantum cryptography to talk to your origin server
    2 days ago
    Privacy-preserving measurement and machine learning
    Privacy-preserving measurement and machine learning
    2 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    How to compress an image in Microsoft Word?
    12 months ago
    How to enable the new PDF-Viewer in Chrome?
    12 months ago
    How to enable automatic disk cleanup in Windows 10?
    12 months ago
    Latest News
    How to enable extensions for Google Bard AI
    2 days ago
    Window 11 Copilot: 10 Best tips and tricks
    2 days ago
    How to create AI images with Cocreator on Paint for Windows 11
    3 days ago
    How to install September 2023 update with 23H2 features for Windows 11
    4 days ago
  • Glossary
  • My Bookmarks
Reading: Blackmail demand claims to have nailed you watching porn
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Threats

Blackmail demand claims to have nailed you watching porn

Tom Grant
Last updated: 13 October
Tom Grant 12 months ago
Share
6 Min Read

One fine (or not so fine) day, you check your inbox and discover a message that starts like this:

Contents
Calm down, no one’s filmed youRansom message — with a bonus Trojan encryptorHow to stay safe

“I’m aware, ********** is your password. You don’t know me and you are probably thinking why you are getting this email, right? Well, I actually placed a malware on the adult video clips (porn) web site…”

Or like this:

“I hacked this mailbox and infected your operating system with a virus…”

Or even:

“I’m part of an international hacker group. As you can guess, your account was hacked…”

All sorts of variants exist, but the message boils down to a claim that the sender infected your computer by hacking your account or placing malware on a porn site you visited. They appear to have harvested your e-mail contacts, social networks, instant messengers, and phone book. They appear to have total access to your device, and they’ve also, it appears, hijacked your webcam to make a video of you watching something.

This is what a porn-extortion message might look like

The cybercriminals threaten to send the video to all of your friends and colleagues. The only way to stop them, they say, is to transfer a specified sum of cryptocurrency to an anonymous wallet.

Some scammers give you only a few days, claiming to know exactly when you opened the e-mail, which supposedly contains a tracking pixel that lets them monitor the message’s status. In some cases, as part of their effort to convince you of the existence of a compromising video, you are asked to reply to the message, whereupon the scammers say they will send the video to a selection of your contacts.

Of course, they say if payment is made, they’ll immediately destroy the video and the database of your contacts.

Calm down, no one’s filmed you

In reality, there is no omnipotent “virus” or shameful video. How does someone know your password? Simple: The blackmailer has got hold of one of the many databases of user accounts and passwords available on the darknet, leaked from a variety of online services. Alas, such leaks are not uncommon — in the United States alone, no fewer than 163 million user records were compromised in just the first three quarters of 2017.

As for “knowing” that you’ve been viewing adult content, it’s a shot in the dark. The e-mail you received was sent to thousands, perhaps millions of people, with the addressee’s password (and other personal details) automatically merged into the message from the database. Even if only a few dozen recipients pay up, that will be more than enough for the scammer.

The same goes for the promise to send a video to some of your friends as proof. Few people would want to verify the existence of such delicate material in this manner. Most would prefer not to risk even a limited disclosure of this kind of secret.

Ransom message — with a bonus Trojan encryptor

Recently, scammers have come up with an even more effective way to make victims pay up: In early December, researchers at Proofpoint found a spam wave offering victims to personally verify the existence of an embarrassing video without involving family and friends. All they had to do was follow the link in the message.

Naturally, no video appeared. Instead, users were prompted to download a ZIP archive, which if unpacked and run really did infect the system — big time.

Don’t worry, cybercriminals still won’t be filming you watching porn. What they do, however, is encrypt your files with the GandCrab malware, and demand more ransom — this time, to recover your data.

How to stay safe

To avoid falling victim to ransomware scammers, we advise being cautious and following a few simple steps. Here’s what you don’t want to do:

  • Don’t panic.
  • Don’t pay the ransom.
  • Don’t respond to ransom e-mails — you will only validate your address and attract more.
  • Don’t follow links in such messages. At best, you’ll get bombarded with shady ads, and you might even infect your machine with a virus, now for real.

What to do:

  • Note the password sent in the ransom e-mail, and change it immediately on any websites where you use it. While you’re at it, choose a stronger password.
  • Use a reliable password manager, such as Kaspersky Password Manager, to store your strong, hard-to-remember passwords.
  • Install a trusty antivirus to keep malware off your system and set to rest any worries about webcam hijacking.

Source: kaspersky.com

Translate this article

TAGGED: Malware, RC4, Split tunneling, Threats, Trojan
Tom Grant October 13, 2022 October 7, 2022
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Detecting zero-days before zero-day
Detecting zero-days before zero-day
Apps 23 hours ago
See what threats are lurking in your Office 365 with Cloudflare Email Retro Scan
See what threats are lurking in your Office 365 with Cloudflare Email Retro Scan
Apps 23 hours ago
Network performance update: Birthday Week 2023
Network performance update: Birthday Week 2023
Apps 23 hours ago
Cloudflare now uses post-quantum cryptography to talk to your origin server
Cloudflare now uses post-quantum cryptography to talk to your origin server
Apps 2 days ago
Privacy-preserving measurement and machine learning
Privacy-preserving measurement and machine learning
Apps 2 days ago

You Might Also Like

See what threats are lurking in your Office 365 with Cloudflare Email Retro Scan
Apps

See what threats are lurking in your Office 365 with Cloudflare Email Retro Scan

23 hours ago
Threats

Beware of scammers! Dangerous apps in the App Store

2 days ago
How To Limit Login Attempts on WordPress (+ Should You?)
Wordpress Threats

How To Limit Login Attempts on WordPress (+ Should You?)

3 days ago
How To

Where Linux is in your home, and how to protect Linux devices from hacking

3 days ago
Show More

Related stories

How to upgrade to Windows 11 23H2 with Installation Assistant
How to install September 2023 update with 23H2 features for Windows 11
How to get the latest Windows 11 innovations
How to blur image background in Photos for Windows 11
How to download official Windows 11 23H2 ISO file
PHP Object Injection Vulnerability in Flatsome Theme

10 New Stories

Encrypted Client Hello – the last puzzle piece to privacy
Beware of scammers! Dangerous apps in the App Store
How to enable extensions for Google Bard AI
Reminder: Enable two-factor authentication wherever you have it. This business
​​Know exactly when your data is transferred to GoogleIn a world where our data is permanent
​​Fake correspondence with the iPhone interfaceIn a world where digital communication is
Previous Next
Hot News
Detecting zero-days before zero-day
See what threats are lurking in your Office 365 with Cloudflare Email Retro Scan
Network performance update: Birthday Week 2023
Cloudflare now uses post-quantum cryptography to talk to your origin server
Privacy-preserving measurement and machine learning
10alert.com10alert.com
Follow US
© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?