Infracore LLC Blog

Don’t Be Fooled When Scammers Threaten to Spill a Dirty Little Secret

Don’t Be Fooled When Scammers Threaten to Spill a Dirty Little Secret

What would you do if a stranger claimed to have compromising webcam footage of you and threatened to share it with your contacts? A new, very convincing email scam is making some users very nervous.

The Sextortion Scam
It’s as screwed up as it sounds. A scammer emails you saying that they got access to your passwords, and then started to run amok to see how much trouble they could get you into. They even show you one of your passwords to prove it (the password will likely come from lists found on the dark web from online businesses and services that have been hacked and stolen over the years). Then the scammer admits they’ve been watching what you do on your computer and recording your webcam, and they happened to catch you at a very inopportune time... Well, let’s let the email explain it for us. 

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The reader is then given the address to a Bitcoin wallet, where they are to send the ransom.

The email continues:


You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

This email comes in a few different versions in the wild, but all of them follow the same pattern and end with the same threat… fork over the cash, or everyone will see you in your most private moments.

Is This a Serious Threat?
This is a very real concern for many people, who will be relieved to hear that, no, there is no indication that these threats are for real. The first clue is the fact that the passwords that the email provides are usually a decade old, indicating that they came from some (relatively) ancient database from some long-forgotten hack.

However, in some ways, this is even worse news, because this threat has made a tidy sum of money: as of the 31st of July, the scam had brought in $250,000, as compared to just over $50,000 by the 19th. Clearly, this scam has been plenty effective for the perpetrators, and this won’t deter others from following its example.

Keeping Yourself Safe from an Actual Attack
Granted, this attack is just an unfair wager, but scams like this are more than possible for a criminal who actually means what they say/threaten. As a result, the security lessons we can take away from this particular attack still apply.

The first thing to remember is also the first rule of passwords - change them frequently. Again, this scam has made quite a bit of money based on a total bluff... a bluff that, paid in increments of $1,400, was worth $250,000 and counting. From this, we can infer that quite a few people who received this message had online activities that they wanted to hide, and more critically, that their passwords had remained the same for all those years.

This is an excellent example of why it is so crucial to regularly update your passwords, without repeating them - if an old database is hacked, as happened here, you won’t have to worry if your password is revealed - it won’t be any good anymore.

The second thing to remember? If you aren’t actively using your webcam, keep its lense covered up.

For more best practices to follow, including those that will improve your business’ security, make sure you keep checking back to this blog - and if you want to take more action, reach out to us at (858) 509-1970.

The Best Way to Approach Data Backup
Tip of the Week: Cloud Software for File Sharing


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, February 19 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Network Security Hosted Solutions User Tips Hackers Microsoft Data Malware Innovation Software Productivity Business Hardware Tech Term Mobile Devices Backup Internet Smartphones Business Continuity Smartphone VoIP Email Communications Windows 10 IT Services Browser Data Backup Computer Android Cloud Computing Data Recovery Alert Workplace Tips Efficiency Business Management Outsourced IT Disaster Recovery Small Business Managed IT Services Miscellaneous Communication Office Managed IT Services Artificial Intelligence Router Chrome Computers Ransomware Cybercrime IT Support Internet of Things Network Windows 10 Cybersecurity Law Enforcement Password Applications Facebook Virtualization Windows Productivity Money Mobile Device Passwords Health Telephone Systems Holiday Social Media Collaboration How To Gadgets Office 365 Upgrade Word Work/Life Balance Information Spam Server Private Cloud Social Engineering App Google Drive Wi-Fi Automation Quick Tips Saving Money Data Security BDR Apps Bring Your Own Device Save Money Vulnerability HaaS Data Protection Settings Office Tips Voice over Internet Protocol Keyboard IT Support Managed Service Mobile Device Management Microsoft Office Two-factor Authentication Hacking Encryption Scam Data Breach Connectivity Phishing Mobility Software as a Service VPN End of Support Operating System Human Resources History Unsupported Software Fraud Access Control Samsung Data Management Google Docs Electronic Medical Records Training Bandwidth Remote Monitoring Comparison Entertainment Managed IT Marketing PDF USB Value Telephony Website CES Servers Windows 7 Firewall Networking Battery Botnet Paperless Office Save Time Employer-Employee Relationship BYOD Managed Service Provider Content Management Data Storage Government Charger Business Intelligence Patch Management Remote Computing Machine Learning Virtual Assistant OneNote Blockchain IT Management Identity Theft Public Cloud Cleaning Redundancy Flexibility Update Worker Spam Blocking Infrastructure Avoiding Downtime Telephone System Big Data Legal Sports IT Plan Computer Care Automobile Workforce Politics Rootkit Tip of the week File Sharing Password Manager Transportation Safety Data loss Employer Employee Relationship Proactive IT Wireless Charging Devices Books Assessment Downtime Best Practice Smart Office Administrator Trending IT Consultant webinar NIST Hacker Apple Wearable Technology The Internet of Things Camera Shortcuts Accountants Internet exploMicrosoft Windows 10s Windows Server 2008 Techology Users Augmented Reality Business Mangement Benefits Screen Mirroring Information Technology Staff Computer Accessories HBO Cortana Thought Leadership Television Root Cause Analysis Content Document Management Microchip Leadership Conferencing Software Tips Search Cryptocurrency Smartwatch Amazon Authentication iPhone FENG Instant Messaging Social Telecommuting Advertising Vendor Management Virtual Reality Remote Worker Gmail Cast Specifications Relocation User Error Bluetooth Outlook Google Apps Emergency Public Computer Video Games Audiobook Search Engine Emails How to Safe Mode Employee Amazon Web Services Nanotechnology Troubleshooting Loyalty Skype Wireless Internet Warranty HVAC Vendor Remote Work Practices Solid State Drive Flash Worker Commute Wiring Recovery Recycling Monitor Smart Technology Current Events Digital Signature Frequently Asked Questions Education Workers Addiction Meetings Travel Bing Black Market Digital Signage Online Shopping Smart Tech SaaS Start Menu Wire Printer Enterprise Content Management Display Hosted Computing Experience Audit Unified Threat Management eWaste Two Factor Authentication Knowledge YouTube Help Desk Millennials Humor Internet Exlporer Risk Management Excel Computing Infrastructure MSP Cache Scalability Files Hiring/Firing IT solutions Physical Security Google Search Evernote Tools Mouse Multi-Factor Security HIPAA Wireless Password Management Security Cameras Credit Cards Inventory Hybrid Cloud Music Computer Fan Sync Mobile Computing WiFi Criminal Data storage Network Congestion Company Culture Compliance Managing Stress Regulation Net Neutrality Thank You Printers ISP Twitter Congratulations Webinar CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

JordaBale Tip of the Week: 10 Technology Practices To Improve Business As Usual
11 February 2019
Just to make your business more progressive you have to follow some techniques and tips. In this reg...
Gabrielle Kolios Microsoft Moves to Get a Piece of the Technology as a Service Market Share
08 February 2019
The company of the Microsoft has been really now understood the technology which have to be supposed...
AngusCousens Tip of the Week: How To Enable Flash In Google Chrome
06 February 2019
Google is another popular makeup brand. Ladies can get products for eye makeup also. They can use ht...
Cannedguds These 3 Industries are Being Fundamentally Changed by Smart Technology
29 January 2019
While I support the idea of automated or driverless cars in theory, at the moment they just simply m...
Joan Cameron Tip of the Week: 4 Tools that Provide Your Employees With Greater Flexibility
21 January 2019
These are very helpful tools with we can get rid from lots of unwanted efforts of work. Best essay w...