Network Synergy Blog

Want to Keep Your “Personal” Browsing a Secret? Scam Says: Pay Up!

Want to Keep Your “Personal” Browsing a Secret? Scam Says: Pay Up!

A new email scam is making its rounds and it has a lot of people concerned with just how much a hacker can peer into one’s private life. How would you react if a stranger emailed you saying they had inappropriate webcam footage of you?

This Scam is a Dirty Trick
This is going to be a taboo subject for many, but it’s a real scam that is quickly getting passed around to users and to some, the risk is so high they might be willing to fall for it. Essentially, an email comes in stating that a hacker got access to your passwords (likely pulled from a list on the dark web from any one of the dozens of web services and businesses that have been hacked over the years). They show off the password to you as proof, right in the email, and mention they have incriminating webcam footage of you, and they’ll share it to your contacts if you don’t pay up.

How It Works
The target of this scam will open their email to find a message that opens by identifying an actual password of the targeted user. The rest of the email reads as one would expect an email of this nature to:

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The email then provides an address for the recipient to send their Bitcoin to, with the recommendation to copy-paste the case-sensitive alphanumeric sequence. The email ends with a warning:

“Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

This is not the only version of the email that is out there, but they all follow the same thread and end with the same threat - pay up, or everyone will see what you do behind closed doors.

Is This For Real?
For many people, this is a fair question - and fortunately for many, no, the threats are not legitimate. First of all, the passwords that these attacks are citing are often 10 years old, which means that the criminals likely got their information from an outdated database from some hack from a decade ago.

However, that doesn’t mean that this threat hasn’t been comfortably effective. As of July 19th, a mere 42 Bitcoin addresses had net over $50,000 from 30 victims. While these returns certainly aren’t breaking any records, they are enough to encourage more cybercriminals to leverage similar attacks.

How to Protect Yourself from the Real Deal
Even if this particular threat is little more than an underhanded bluff, that doesn’t mean a legitimate password scam isn’t still well within the realm of possibility. Therefore, the security lessons that can be learned from this particular trend are still extremely applicable.

First and foremost, passwords are like the underwear this probably automated scam claims to have seen its users potentially without - they need to be changed regularly. The fact that 30 people were willing to pay a combined $50,000 tells us two things: they had something they wanted to hide, and they hadn’t changed their passwords in years. Changing your passwords on a regular basis, without repeating them, means that you are safe if one of your past passwords is hacked. After all, the old key to a door won’t work anymore of you’ve changed the lock.

Secondly, and more personally, make sure your webcam is covered up while you aren’t actively using it.

For more best practices, including ones to help preserve your security, keep reading our blog. Reach out to us at 203.261.2201 to ask about the solutions we can provide to keep messages like these out of your business in the first place.

Security Threats and Defensive Measures You Can Ta...
How Technology Could Change the Classroom
 

Comments 1

Mark Hess on Tuesday, 21 August 2018 17:22

My 'personal' browsing has been a secret, and that's because I keep it that way. I have a method given to me by the write my research paper people, and that method works perfectly for me. I won't tell you about that method soon.

My 'personal' browsing has been a secret, and that's because I keep it that way. I have a method given to me by the [url=https://www.bestessayservicereviews.com/write-my-paper/]write my research paper[/url] people, and that method works perfectly for me. I won't tell you about that method soon.
Already Registered? Login Here
Guest
Saturday, December 15, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Tutorials IT Support IP Address Tech Support Data storage Presentation Administrator Downtime Document Management Browser Meetings Modem Employee-Employer Relationship Troubleshooting Relocation Encryption Hackers Documents G Suite Lenovo Favorites Privacy IT budget Mirgation CrashOverride Business Management Video Surveillance Ransomware Disaster Productivity MSP Instant Messaging 3D Printing Battery Chatbots Printer Gaming Console Enterprise Resource Planning Content Filtering communications Software Tips Mobile Security How To IBM Managed Services Provider Computing Infrastructure Business Technology Current Events Shortcut Collaboration Digital Signature Fraud Artificial Intelligence Data Security Augmented Reality Save Time Network PowerPoint Help Desk Time Management Mobile 3D Mobile Computing Software Government Remote Support GPS BDR Trainging Information Automobile Mobile Devices Small Business Word Streaming Media Disaster Resistance Co-managed IT Computer Care Proactive Retail Assessment Scary Stories Communication Consumers App Analyitcs Upgrade Mail Merge Phishing Legal Electronic Health Records Risk Management IT Solutions PDF Social Networking Macro Secruity Avoiding Downtime Network Security PC Care Google Education Identity Gadget Network Congestion iPhone Computers Virus Outsourced IT Data Warehousing E-Commerce Saving Time Storage Comparison Regulations Procurement Black Market Cables Money IoT Data Breach Hard Drives Security Apps Virtual Private Network Mobile Device Management Bluetooth Computer Password End of Support Fun Writing Business Owner Unified Threat Management Licensing Distributed Denial of Service Excel Healthcare IT Support Buisness Taxes Access Control Applications Internet of Things Work Station Experience Fleet Tracking Permission Cortana Law Enforcement Technology Maintenance Law Firm IT Debate Internet VPN Remote Computing eBay Cybersecurity Bitcoin Software as a Service Online Currency Mobile Data Antivirus Supercomputer Sync Cache Office Malware Hacks Bandwidth Techology Smartphones Staffing Scam Physical Security Mobile Technology Congratulations Corporate Profile Scheduling CIO HIPAA Office 365 Hacker Domains Business Growth Test Company Culture Emoji Monitors High-Speed Internet Settings Productivity Management Passwords Printers Server Public Cloud Hiring/Firing Chrome Data Backup Windows 8 Best Practice Android Features Social Media Google Drive Memory Net Neutrality Mobility Monitoring Managed Service Virtual Desktop Display Cameras Trending Firewall Windows Drones Wi-Fi Solid State Drive Mobile Device Firefox Internet Exlporer Safety Authentication Employer-Employee Relationship User Heating/Cooling Saving Money Windows 10 Finance USB Data Management Dark Web Managed IT services Tech Term Connectivity Vendor Management SharePoint Email Data Loss Managed IT Service Office Tips Alerts Work/Life Balance Multi-Factor Security 5G Vulnerability Computer Accessories Specifications Bring Your Own Device Servers VoIP Laptop Samsung Botnet WiFi Tip of the Work Infrastructure Social Engineering Alt Codes Hotspot Service-based Business Workplace Tips Piracy Wearable Technology Spam Skype Outlook Blockchain Staff The Internet of Things Humor Uninterrupted Power Supply Google Docs Business Computing Superfish Webcam Data Recovery Microsoft Recycling Legislation CCTV LinkedIn Cybercrime Employees Cookies Users Two-factor Authentication Start Menu Facebook Geography Flexibility eWaste Sports Hardware Managed IT Authorization Budget History Save Money Technology Laws Utility Computing Point of Sale Hard Drive Files Travel WPA3 Business Continuity Electronic Medical Records Consultation Proactive IT Competition Undo Asset Tracking Application Efficiency Cleaning Zero-Day Threat IT service Star Wars Financial Wires Server Management Value Remote Monitoring Spyware Development Best Available Holiday Unified Communications Backup and Disaster Recovery Text Messaging Personal Information Telephony Smart Technology Administration Refrigeration Error Running Cable Quick Tips Printing Tablet Cloud Computing Remote Workers Managed IT Services Inbound Marketing Upgrades Downloads Language Google Analytics IT Technicians OneNote Notifications IT Management Deep Learning Backups Marketing Hosted Solution Virtual Reality Health Phone System Technology Tips Managing Stress YouTube Google Maps IT Consulting Public Speaking Processors BYOD Operations Environment Cyber Monday Screen Reader Cryptocurrency Miscellaneous Computer Repair Innovation Router Unsupported Software Fax Server File Sharing Search Training Microsoft Office Hosted Solutions Entrepreneur Big Data Backup Cloud Business Intelligence Hacking Programming Apple Print Server Websites Vulnerabilities Read Only Managed Service Provider Human Error RMM Network Management Information Technology Logs Smart Tech Statistics Digital Machine Learning Remote Monitoring and Management Networking Politics Gadgets Paperless Office Bookmarks Lithium-ion Battery Theft Google Wallet Smartphone Conferencing Private Cloud Website Project Management LiFi Microsoft Excel Break Fix Windows 8.1 Update Leadership Tip of the Week Identities Telephone Systems Black Friday Identity Theft Web Server Tech Terms Halloween Automation Motion sickness Typing Google Calendar Chromebook Tracking Business Webinar Windows 10 Compliance Going Green Thank You Customer Service Cyberattacks How To Disaster Recovery Mouse Data Cooperation Operating System Digital Payment Unified Threat Management User Error SaaS Mobile Office Nanotechnology Redundancy Intranet Regulation People Crowdfunding Robot Hard Disk Drive Wireless Technology Crowdsourcing Consulting Social Food Patch Management Alert User Tips Twitter Migration Gmail Touchscreen Recovery Wireless IT Consultant Enterprise Content Management Charger Address Permissions IT Services Knowledge Computing Tip of the week Best Practices Virtualization Cabling Customer Relationship Management Cost Management Motherboard

      Latest Blogs

      As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. W...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube