Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Be Fooled When Scammers Threaten to Spill a Dirty Little Secret

Don’t Be Fooled When Scammers Threaten to Spill a Dirty Little Secret

What would you do if a stranger claimed to have compromising webcam footage of you and threatened to share it with your contacts? A new, very convincing email scam is making some users very nervous.

The Sextortion Scam
It’s as screwed up as it sounds. A scammer emails you saying that they got access to your passwords, and then started to run amok to see how much trouble they could get you into. They even show you one of your passwords to prove it (the password will likely come from lists found on the dark web from online businesses and services that have been hacked and stolen over the years). Then the scammer admits they’ve been watching what you do on your computer and recording your webcam, and they happened to catch you at a very inopportune time... Well, let’s let the email explain it for us. 

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The reader is then given the address to a Bitcoin wallet, where they are to send the ransom.

The email continues:

“Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

This email comes in a few different versions in the wild, but all of them follow the same pattern and end with the same threat… fork over the cash, or everyone will see you in your most private moments.

Is This a Serious Threat?
This is a very real concern for many people, who will be relieved to hear that, no, there is no indication that these threats are for real. The first clue is the fact that the passwords that the email provides are usually a decade old, indicating that they came from some (relatively) ancient database from some long-forgotten hack.

However, in some ways, this is even worse news, because this threat has made a tidy sum of money: as of the 31st of July, the scam had brought in $250,000, as compared to just over $50,000 by the 19th. Clearly, this scam has been plenty effective for the perpetrators, and this won’t deter others from following its example.

Keeping Yourself Safe from an Actual Attack
Granted, this attack is just an unfair wager, but scams like this are more than possible for a criminal who actually means what they say/threaten. As a result, the security lessons we can take away from this particular attack still apply.

The first thing to remember is also the first rule of passwords - change them frequently. Again, this scam has made quite a bit of money based on a total bluff... a bluff that, paid in increments of $1,400, was worth $250,000 and counting. From this, we can infer that quite a few people who received this message had online activities that they wanted to hide, and more critically, that their passwords had remained the same for all those years.

This is an excellent example of why it is so crucial to regularly update your passwords, without repeating them - if an old database is hacked, as happened here, you won’t have to worry if your password is revealed - it won’t be any good anymore.

The second thing to remember? If you aren’t actively using your webcam, keep its lense covered up.

For more best practices to follow, including those that will improve your business’ security, make sure you keep checking back to this blog - and if you want to take more action, reach out to us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Communication Business Continuity IT Support Smartphones Miscellaneous Smartphone Mobile Device Small Business Network Browser Collaboration Productivity Quick Tips Cybersecurity Users Business Management Phishing Windows Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Windows 10 Passwords Virtualization Tech Term Social Media Saving Money Holiday Gadgets Chrome Managed Service Automation Managed IT Services Microsoft Office Artificial Intelligence Facebook Computers Cybercrime Operating System Wi-Fi BYOD Health Mobile Device Management Networking IT Support Internet of Things Hacking Covid-19 Information Technology Remote Managed Service Provider Spam Office 365 Alert Information Telephone Systems Recovery Employer-Employee Relationship Bandwidth Router BDR Social Engineering Mobility App History Password Mobile Computing Money Encryption Application Applications Human Resources Remote Monitoring Law Enforcement Big Data Data Breach Office Tips Training Apps VPN How To Remote Computing Data Storage Patch Management Government Mobile Office Blockchain Private Cloud Paperless Office Managed IT Bring Your Own Device Flexibility Wireless Data Management Work/Life Balance Marketing Infrastructure Data Security WiFi Voice over Internet Protocol IT solutions Gmail Entertainment Website Budget Settings Google Drive Two-factor Authentication Mouse Avoiding Downtime HaaS Vulnerability Windows 7 Word Servers Cleaning The Internet of Things Lithium-ion battery Employee/Employer Relationship RMM End of Support USB Education Physical Security Firewall Safety Data Protection Sports HIPAA Virtual Reality Redundancy Apple Keyboard Conferencing Social User Error Scam Meetings Staff Software as a Service Telephone System Vendor Save Time Machine Learning Vendor Management Risk Management Managed Services Display Connectivity Remote Work Hacker Computer Accessories Charger Google Docs Processor DDoS Identity Theft Compliance Computing Infrastructure Going Green OneNote Computer Care SharePoint Current Events Hard Drive Telephony Samsung Printer Augmented Reality Bluetooth Battery Shadow IT Computing Customer Service Fraud Value Environment Legal Remote Worker Internet Exlporer Spam Blocking Fax Server Electronic Medical Records Cryptocurrency IT Consultant PDF SaaS Digital Signage Hiring/Firing Humor Comparison Proactive IT Network Congestion CES Best Practice Procurement eWaste Workplace Strategy YouTube Net Neutrality Content Management Black Market Business Technology Business Intelligence Help Desk Access Control Printing Audit Worker Virtual Assistant IT Management Wearable Technology Authentication Document Management Hard Drives Solid State Drive Wireless Technology Botnet Retail Instant Messaging How to Downtime Managed Services Provider IT Plan Robot Excel Virus Database Biometrics Update Data storage Unsupported Software Remote Workers Virtual Desktop Automobile Unified Threat Management Email Best Practices IT Assessment Manufacturing HVAC Google Apps Managing Stress Analysis Supercomputer Monitor Software Tips Managed IT Service Administrator Sync Security Cameras Devices Emails Science Computer Tips Cameras Virtual CIO OneDrive Biometric Security Enterprise Content Management Accountants Reputation Peripheral Streaming Media MSP Digital Security Cameras Tech Support Using Data Microchip Distributed Denial of Service Thought Leadership Netflix Customer Relationship Management Content Credit Cards Two Factor Authentication Analyitcs Techology Laptop Copiers 5G Password Management Root Cause Analysis Password Manager HBO Knowledge Programming Multi-Factor Security Music Customers Quick Tip Ergonomics Search Engine Skype Smartwatch Twitter Audiobook Business Mangement Printer Server Touchpad Development OLED NIST Data loss Virtual Machine Outlook Antivirus Smart Tech Leadership Trending Troubleshooting PCI DSS 2FA Fiber Optics Start Menu Employee Addiction Politics Amazon Windows 8 Advertising Recycling Loyalty Messaging Cabling Screen Mirroring IT service Hypervisor Wiring Frequently Asked Questions Practices Books Policy Notifications Dark mode Trend Micro Mobile Cache Windows 10s Amazon Web Services Tablet Criminal SMS Default App Safe Mode Cast Domains Saving Time GDPR Tip of the week Hosted Computing webinar Emergency Relocation Procedure dark theme Shopping Professional Services IaaS Google Search Wireless Internet Public Cloud Maintenance Online Shopping Employer Employee Relationship Assessment Bloatware Video Games AI IT Infrastructure File Sharing Camera Windows Server 2008 Bing Inventory Worker Commute Specifications FinTech Tablets Social Network Tools Wire Consultant Experience Evernote Television Analytics Entrepreneur Scalability Travel Investment Employee/Employer Relationships Printers Business Owner Millennials Employees Windows 365 NarrowBand ISP Smart Office Best Available Shortcut Wireless Charging Public Computer Cost Management Search Video Conferencing ROI WIndows 7 Bitcoin Virtual Private Network Regulations Shortcuts Social Networking Workforce Transportation iPhone Sales Point of Sale Personal Cryptomining Computer Fan Cables Rootkit Supply Chain Management Batteries Project Management Running Cable Nanotechnology Workers Telecommuting Benefits Files Monitoring Memory Windows 8.1 Chromecast Digitize FENG Cortana User Digital Signature IBM PowerPoint Windows Media Player Windows Server 2008 R2 Uninterrupted Power Supply Warranty Flash Smart Technology Colocation Customer relationships

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code