Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Symmetric Engineering Group Blogs

Want to Keep Your “Personal” Browsing a Secret? Scam Says: Pay Up!

Want to Keep Your “Personal” Browsing a Secret? Scam Says: Pay Up!

A new email scam is making its rounds and it has a lot of people concerned with just how much a hacker can peer into one’s private life. How would you react if a stranger emailed you saying they had inappropriate webcam footage of you?

This Scam is a Dirty Trick
This is going to be a taboo subject for many, but it’s a real scam that is quickly getting passed around to users and to some, the risk is so high they might be willing to fall for it. Essentially, an email comes in stating that a hacker got access to your passwords (likely pulled from a list on the dark web from any one of the dozens of web services and businesses that have been hacked over the years). They show off the password to you as proof, right in the email, and mention they have incriminating webcam footage of you, and they’ll share it to your contacts if you don’t pay up.

How It Works
The target of this scam will open their email to find a message that opens by identifying an actual password of the targeted user. The rest of the email reads as one would expect an email of this nature to:

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The email then provides an address for the recipient to send their Bitcoin to, with the recommendation to copy-paste the case-sensitive alphanumeric sequence. The email ends with a warning:

“Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

This is not the only version of the email that is out there, but they all follow the same thread and end with the same threat - pay up, or everyone will see what you do behind closed doors.

Is This For Real?
For many people, this is a fair question - and fortunately for many, no, the threats are not legitimate. First of all, the passwords that these attacks are citing are often 10 years old, which means that the criminals likely got their information from an outdated database from some hack from a decade ago.

However, that doesn’t mean that this threat hasn’t been comfortably effective. As of July 19th, a mere 42 Bitcoin addresses had net over $50,000 from 30 victims. While these returns certainly aren’t breaking any records, they are enough to encourage more cybercriminals to leverage similar attacks.

How to Protect Yourself from the Real Deal
Even if this particular threat is little more than an underhanded bluff, that doesn’t mean a legitimate password scam isn’t still well within the realm of possibility. Therefore, the security lessons that can be learned from this particular trend are still extremely applicable.

First and foremost, passwords are like the underwear this probably automated scam claims to have seen its users potentially without - they need to be changed regularly. The fact that 30 people were willing to pay a combined $50,000 tells us two things: they had something they wanted to hide, and they hadn’t changed their passwords in years. Changing your passwords on a regular basis, without repeating them, means that you are safe if one of your past passwords is hacked. After all, the old key to a door won’t work anymore of you’ve changed the lock.

Secondly, and more personally, make sure your webcam is covered up while you aren’t actively using it.

For more best practices, including ones to help preserve your security, keep reading our blog. Reach out to us at (813) 749-0895 to ask about the solutions we can provide to keep messages like these out of your business in the first place.

Security Threats and Defensive Measures You Can Ta...
How Technology Could Change the Classroom
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Search

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Best Practices Technology Managed IT Services Cloud Business Computing Privacy Email Malware IT Infrastructure Management Business Continuity Hackers IT Companies in Tampa Hosted Solutions Internet Business Business Mobility IT Support Services Data Software Data Backup Business IT Solutions Outsourced IT Microsoft I.T. Management Network Security Productivity IT Professional Services Managed Service Provider Computer Custom Business Solutions IT Management Mobile Devices Tech Term Productivity IT Business Solutions Business Applications Data Recovery Ransomware Technology Consultants Managed IT Service in Florida Business IT Support Managed IT Service Managed IT Android Innovation Windows 10 Windows Disaster Recovery Cloud Computing Managed Services in Florida I.T. Support Google User Tips Internet of Things Workplace Tips I.T. Services Dynamic Solutions Hardware IT Support Services in Tampa IT Risk Management Remote Monitoring Communication Browser Backup Encryption Smartphone Upgrade IT Outsourcing in Tampa IT Support IT Services in Florida Collaboration Data Management Server Artificial Intelligence Network IT Service Gmail Small Business Social Media IT Support in Tampa Smartphones Managed Services Microsoft Office Phishing Efficiency BYOD Business Management App Mobile Device IT Managed Services Mobile Device Management Cybersecurity Save Money Holiday Managed Services in Tampa Bay Vendor Management VoIP Antivirus Tech Companies in Tampa Operating System BDR Passwords Website Applications Unified Threat Management IT Services in Tampa Office 365 Firewall Customer Relationship Management Paperless Office Managed IT Services Tampa IT Support Bandwidth Windows 10 Risk Management Infrastructure Managed Service in Tampa Healthcare Computer Networking Tip of the week IT Outsourcing in Florida Government Wi-Fi Chrome Data Computer Services IT Service Management IT Company Business Plan Word Two-factor Authentication Compliance IT Vendor Management Bring Your Own Device Project Management Content Filtering IT Outsourcing Vulnerability Business IT Support Services Apple Small Business IT Solutions Facebook Blockchain Robot Wireless Analytics Mobile Computing Money Wireless Technology SaaS Employer-Employee Relationship Router Computer Hardware Repair Retail WiFi Customer Service Managed Service Information Hosted Solution Automation Document Management Office Data loss communications IT solutions Data storage Storage Regulations Unified Communications Help Desk Miscellaneous Telephone Systems IT Management Services Settings The Internet of Things Big Data Maintenance IT Company Data Security Saving Money Remote Computing VPN IT Management Service Remote Monitoring and Management IBM Laptop Remote Workers Administration Quick Tips End of Support Google Drive Uninterrupted Power Supply Computer Support Downtime Machine Learning Computer Network Services Mouse Licensing Training Outlook I.T. Company Business Application Virtual Desktop Flexibility Net Neutrality Computer Networking Services Redundancy IoT How To YouTube HIPAA Patch Management Office Tips File Sharing Computing Digital Payment Server Management Search Scam Internet Exlporer Virtualization Network Management Users Monitors Spam Budget User Error Alert Files Tablet IT Consulting Mobile Security Apps Solid State Drive Managed IT Outsourcing Assessment Virtual Private Network Network Congestion Recovery IT Support Helpdesk LiFi Smart Technology Presentation Business Technology Virtual Reality Politics Information Technology Mobility Microsoft Virtual Server Hosting in Tampa and Florida Augmented Reality IT Companies in Florida Business Continuity Services Alt Codes Top IT Outsourcing Company Management Consultation Multi-Factor Security Migration Help Desk Support in Tampa IT Consulting Services Cost Management Mail Merge Careers IT Managed Service Provider Tech Support E-Commerce Spyware Consulting Services Unified Threat Management Operations Managed Service in Florida Wires Human Error Health Care IT Services Knowledge Distributed Denial of Service Smart Tech Health Corporate Profile Buisness Techology Language Printing Vulnerabilities Authentication Outsourced Computer Support Fun Cyber Monday G Suite IT Consulting Service Jobs Typing Lenovo Permissions Server Hosting in Tampa Enterprise Resource Planning Password Bookmarks Google Calendar Chatbots Help Desk Support Automobile WPA3 Address IT Service in Tampa Connectivity Point of Sale Hard Drive Features Service IT Hacker Printer Wearable Technology Hacking Permission Shortcut Computers Business IT Solutions Experience Deep Learning Break Fix WannaCry Trending Disaster Resistance Computing Infrastructure Geography Authorization Servers Modem Electronic Medical Records Halloween Superfish Fraud Social Mobile Favorites Time Management Co-managed IT Legislation Identity Google Docs Fleet Tracking Undo Hard Disk Drive Dark Web Samsung Healthcare IT Cache Electronic Health Records IT Solutions for Small Business Access Control IT Support Companies in Tampa Save Time Test Software Tips Display Full Service IT Humor Monitoring Domains CIO Proactive IT Alerts Chromebook History High-Speed Internet User Employees Software as a Service Cookies Managed it Services in Tampa Travel Application Cryptocurrency Data Technology Scary Stories Server Hosting IT Tech Support Hacks Company Culture Best Practice Conferencing Identity Theft Comparison IT Vendor Management in Tampa Sync Business Growth Asset Tracking Competition Data Warehousing Intranet Recycling Cyberattacks Computer Care Firefox Microsoft Affiliate Program SharePoint IT Technicians IT Support and Solutions Backups Digital Signature MSP Hard Drives RMM Identities Bitcoin Star Wars Consulting Public Speaking VoIP Data Breach Cooperation Managed Services in Floirda Google Wallet Disaster Development Avoiding Downtime Zero-Day Threat Statistics Technology Tips Nanotechnology Managed Service Providers Writing Sports Computer Repair Networking Technology Consulting Firms Current Events Managing Stress Heating/Cooling Instant Messaging Touchscreen Server Hosting in Florida Specifications Social Networking Network Support in Florida USB Mobile Device Managment Business Continuity Service Providers OneNote Microsoft Excel eWaste Read Only Microsoft Business Solutions Safety Marketing Downloads Mirgation IT Managed Service in Tampa Information Technology Consulting Legal Proactive Tech Terms Cabling Meetings Windows 8 Professional Service Utility Computing Programming Managed Services Provider Digital Dark Data Technology Laws Staff IT Company in Tampa Websites Drones Gadgets Cables Backup and Disaster Recovery Google Maps Bluetooth Cortana Screen Reader Tech Company in Tampa Social Engineering Hotspot Going Green Enterprise Content Management Finance Tampa IT Services Education Black Friday Motherboard Employee-Employer Relationship Cybercrime Thank You Crowdsourcing Printers GPS Public Cloud Theft Twitter Webcam Taxes Upgrades Botnet Telephony Supercomputer Running Cable Congratulations I.T. Managament Tracking Saving Time Financial Processors Virus CrashOverride 3D Printing Emoji Update IT Budget Black Market Managed Servers Work/Life Balance 5G Business Appplications Administrator Procurement Web Server Cleaning IP Address Relocation Regulation Law Enforcement Notifications Unsupported Software Mobile Office Private Cloud Cameras Physical Security Hiring/Firing Motion Sickness Emergency Gadget Lithium-ion Battery Staffing Mobile Data Error IT Consultant Refrigeration Personal Information CCTV How To

Latest Blog Entry

While smartphones and tablets can help businesses quite a bit, they can also be quite detrimental to their success. If you can get past the issues related to employees bringing their own devices to the workplace, then you’ll be able to save a considerable amount of time and ...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login