Network Synergy Blog

Want to Keep Your “Personal” Browsing a Secret? Scam Says: Pay Up!

Want to Keep Your “Personal” Browsing a Secret? Scam Says: Pay Up!

A new email scam is making its rounds and it has a lot of people concerned with just how much a hacker can peer into one’s private life. How would you react if a stranger emailed you saying they had inappropriate webcam footage of you?

This Scam is a Dirty Trick
This is going to be a taboo subject for many, but it’s a real scam that is quickly getting passed around to users and to some, the risk is so high they might be willing to fall for it. Essentially, an email comes in stating that a hacker got access to your passwords (likely pulled from a list on the dark web from any one of the dozens of web services and businesses that have been hacked over the years). They show off the password to you as proof, right in the email, and mention they have incriminating webcam footage of you, and they’ll share it to your contacts if you don’t pay up.

How It Works
The target of this scam will open their email to find a message that opens by identifying an actual password of the targeted user. The rest of the email reads as one would expect an email of this nature to:

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The email then provides an address for the recipient to send their Bitcoin to, with the recommendation to copy-paste the case-sensitive alphanumeric sequence. The email ends with a warning:


You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

This is not the only version of the email that is out there, but they all follow the same thread and end with the same threat - pay up, or everyone will see what you do behind closed doors.

Is This For Real?
For many people, this is a fair question - and fortunately for many, no, the threats are not legitimate. First of all, the passwords that these attacks are citing are often 10 years old, which means that the criminals likely got their information from an outdated database from some hack from a decade ago.

However, that doesn’t mean that this threat hasn’t been comfortably effective. As of July 19th, a mere 42 Bitcoin addresses had net over $50,000 from 30 victims. While these returns certainly aren’t breaking any records, they are enough to encourage more cybercriminals to leverage similar attacks.

How to Protect Yourself from the Real Deal
Even if this particular threat is little more than an underhanded bluff, that doesn’t mean a legitimate password scam isn’t still well within the realm of possibility. Therefore, the security lessons that can be learned from this particular trend are still extremely applicable.

First and foremost, passwords are like the underwear this probably automated scam claims to have seen its users potentially without - they need to be changed regularly. The fact that 30 people were willing to pay a combined $50,000 tells us two things: they had something they wanted to hide, and they hadn’t changed their passwords in years. Changing your passwords on a regular basis, without repeating them, means that you are safe if one of your past passwords is hacked. After all, the old key to a door won’t work anymore of you’ve changed the lock.

Secondly, and more personally, make sure your webcam is covered up while you aren’t actively using it.

For more best practices, including ones to help preserve your security, keep reading our blog. Reach out to us at 203.261.2201 to ask about the solutions we can provide to keep messages like these out of your business in the first place.

Security Threats and Defensive Measures You Can Ta...
How Technology Could Change the Classroom

Comments 1

Mark Hess on Tuesday, 21 August 2018 17:22

My 'personal' browsing has been a secret, and that's because I keep it that way. I have a method given to me by the write my research paper people, and that method works perfectly for me. I won't tell you about that method soon.

My 'personal' browsing has been a secret, and that's because I keep it that way. I have a method given to me by the [url=]write my research paper[/url] people, and that method works perfectly for me. I won't tell you about that method soon.
Already Registered? Login Here
Tuesday, October 23, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Connectivity Smartphone Charger Information Technology Disaster Recovery Sync Conferencing Application Machine Learning Internet Exlporer Automation Augmented Reality Hard Drive Cookies Laptop Gadget Language Black Friday People Automobile Remote Monitoring and Management Tech Term Statistics Money Utility Computing Battery Webinar IT Technicians Taxes Business Owner Time Management Motherboard Avoiding Downtime Cryptocurrency HIPAA Saving Time Wearable Technology Printing Migration Comparison CrashOverride Cost Management Crowdsourcing VPN Internet of Things Analyitcs PDF Gmail Managed Services Provider Telephone Systems Knowledge Scheduling Consumers Artificial Intelligence Law Enforcement Tip of the Work Printers History Computer Repair Windows 10 Trainging Environment Android Dark Web Security Break Fix Legal Undo Internet Cache Social Encryption Tablet Humor Company Culture Hosted Solutions Windows 8.1 Update Virtual Desktop Staff Communication Vulnerability Computers Phishing Risk Management Cloud Computing Applications Hard Drives How To Collaboration Hackers Printer Electronic Health Records Network Security Upgrade Mobile Computing Microsoft Excel Efficiency IT Solutions Unified Communications Operations Maintenance Relocation Work Station 5G Downloads Modem Business Continuity Access Control Piracy Innovation Apple Content Filtering App Apps Screen Reader Best Practices Mobile Data Hiring/Firing Business Computing Software Servers Macro Retail Wires Tutorials PC Care Search Deep Learning Emoji Point of Sale Service-based Business Fax Server Holiday Permissions IT Support Trending Lenovo Password Consulting communications Address Bitcoin IT Management Office Fraud Meetings Sports Hacks Data storage MSP Monitoring Chromebook Data Current Events Star Wars Refrigeration Personal Information Unified Threat Management Cyber Monday Cables Websites Work/Life Balance Samsung Specifications Windows 8 Help Desk eWaste Value Workplace Tips IoT Lithium-ion Battery Presentation Cortana Business Management Going Green 3D Outsourced IT Google Maps Vendor Management USB Google Wallet Public Cloud Employee-Employer Relationship Data Security Microsoft Mobility Computer Accessories Backups Travel Telephony IT Consulting Business Technology OneNote Electronic Medical Records Word Congratulations User Cleaning Network Congestion Writing Skype Phone System Scary Stories Mobile Devices Law Firm IT Chatbots Managing Stress 3D Printing Google Analytics E-Commerce Regulations Nanotechnology Private Cloud Managed IT Service Read Only Heating/Cooling Facebook Buisness The Internet of Things Firewall Text Messaging Education IBM Disaster Tech Support Twitter Software Tips Notifications Cabling SharePoint Unified Threat Management Alert Downtime Solid State Drive Social Media Identity Theft Google Drive Cyberattacks Net Neutrality Settings Favorites Bookmarks Tip of the week Hacker Vulnerabilities Upgrades Customer Relationship Management Alerts Assessment Mirgation Training Save Money Users Managed Service Provider Logs Wi-Fi Microsoft Office Finance Flexibility Data Management Drones Hacking Ransomware Blockchain Data Warehousing Business Windows 10 Mobile Security Identities Geography Productivity Shortcut Chrome Technology Tips Best Practice Inbound Marketing Save Time Touchscreen Office 365 Tracking Cybersecurity Social Engineering Alt Codes Files Superfish Compliance Black Market Competition SaaS Management Hotspot Router LiFi Documents Computer Care Public Speaking Politics Excel Programming Digital Payment Passwords Recycling Managed Service Uninterrupted Power Supply Wireless Technology Scam Spam Intranet Managed IT Patch Management Privacy Virtual Private Network CCTV Cloud Miscellaneous Disaster Resistance Hardware Staffing GPS Regulation Processors Digital Signature Running Cable Spyware Google Docs Bring Your Own Device Web Server Mobile Office Paperless Office Development Safety Hosted Solution Licensing Saving Money IT budget WiFi Start Menu Robot Smartphones Mouse Firefox Distributed Denial of Service Project Management IP Address How To Data Backup Email Halloween Marketing Software as a Service Cybercrime Techology Office Tips Government Entrepreneur Document Management Enterprise Content Management Server IT Consultant Mobile Technology Operating System LinkedIn Streaming Media Fleet Tracking Thank You Computer VoIP Remote Workers Health Virtualization Mobile Device Management Virus Malware Technology Laws Physical Security IT Services Memory Managed IT services Identity WPA3 Computing Windows Instant Messaging User Tips IT service Smart Technology Redundancy Small Business Proactive Healthcare Online Currency Legislation Google Motion sickness Bandwidth Tip of the Week Remote Support Supercomputer BDR Monitors Google Calendar Mail Merge Features eBay iPhone Network Management Server Management Remote Computing Display Recovery Typing Administration Botnet Hard Disk Drive Browser Business Growth Error Social Networking Digital Domains Customer Service High-Speed Internet Business Intelligence IT Support Backup Corporate Profile Wireless Secruity Crowdfunding Troubleshooting Two-factor Authentication Network Mobile Device Quick Tips Managed IT Services User Error Leadership Outlook Infrastructure Antivirus G Suite Multi-Factor Security Big Data File Sharing Computing Infrastructure Best Available Website Technology Enterprise Resource Planning Food Webcam PowerPoint BYOD Productivity Smart Tech Data Recovery Virtual Reality Information Cooperation End of Support Storage Employer-Employee Relationship Debate Fun Remote Monitoring CIO Mobile Unsupported Software Experience Video Surveillance Gadgets Budget Cameras YouTube Asset Tracking Print Server Data Breach Co-managed IT Bluetooth Data Loss Administrator Proactive IT Gaming Console Consultation Networking

      Latest Blogs

      Once thought to just be a cool feature of the Internet--or the entirety of the Internet to your Great Aunt Maddie--instant messaging has a long history on the web. In fact, one cou...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube