Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Be Fooled When Scammers Threaten to Spill a Dirty Little Secret

Don’t Be Fooled When Scammers Threaten to Spill a Dirty Little Secret

What would you do if a stranger claimed to have compromising webcam footage of you and threatened to share it with your contacts? A new, very convincing email scam is making some users very nervous.

The Sextortion Scam
It’s as screwed up as it sounds. A scammer emails you saying that they got access to your passwords, and then started to run amok to see how much trouble they could get you into. They even show you one of your passwords to prove it (the password will likely come from lists found on the dark web from online businesses and services that have been hacked and stolen over the years). Then the scammer admits they’ve been watching what you do on your computer and recording your webcam, and they happened to catch you at a very inopportune time... Well, let’s let the email explain it for us. 

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The reader is then given the address to a Bitcoin wallet, where they are to send the ransom.

The email continues:

“Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

This email comes in a few different versions in the wild, but all of them follow the same pattern and end with the same threat… fork over the cash, or everyone will see you in your most private moments.

Is This a Serious Threat?
This is a very real concern for many people, who will be relieved to hear that, no, there is no indication that these threats are for real. The first clue is the fact that the passwords that the email provides are usually a decade old, indicating that they came from some (relatively) ancient database from some long-forgotten hack.

However, in some ways, this is even worse news, because this threat has made a tidy sum of money: as of the 31st of July, the scam had brought in $250,000, as compared to just over $50,000 by the 19th. Clearly, this scam has been plenty effective for the perpetrators, and this won’t deter others from following its example.

Keeping Yourself Safe from an Actual Attack
Granted, this attack is just an unfair wager, but scams like this are more than possible for a criminal who actually means what they say/threaten. As a result, the security lessons we can take away from this particular attack still apply.

The first thing to remember is also the first rule of passwords - change them frequently. Again, this scam has made quite a bit of money based on a total bluff... a bluff that, paid in increments of $1,400, was worth $250,000 and counting. From this, we can infer that quite a few people who received this message had online activities that they wanted to hide, and more critically, that their passwords had remained the same for all those years.

This is an excellent example of why it is so crucial to regularly update your passwords, without repeating them - if an old database is hacked, as happened here, you won’t have to worry if your password is revealed - it won’t be any good anymore.

The second thing to remember? If you aren’t actively using your webcam, keep its lense covered up.

For more best practices to follow, including those that will improve your business’ security, make sure you keep checking back to this blog - and if you want to take more action, reach out to us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Communication IT Support Business Continuity Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Windows Upgrade Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Cloud Computing Office Server Save Money Passwords Windows 10 Chrome Social Media Virtualization Tech Term Saving Money Holiday Gadgets Microsoft Office Automation Managed Service Managed IT Services Operating System Artificial Intelligence Facebook Computers Cybercrime Hacking Wi-Fi Health BYOD Mobile Device Management Networking Internet of Things IT Support Information Technology Covid-19 Information Spam Remote Office 365 Managed Service Provider Telephone Systems Alert Social Engineering Mobility Recovery Employer-Employee Relationship Router Bandwidth BDR App Big Data History Password Money Encryption Human Resources Mobile Computing Applications Data Breach Application Remote Monitoring Law Enforcement Office Tips Managed IT Training Blockchain Paperless Office Apps VPN Data Storage Patch Management Remote Computing Government Mobile Office Private Cloud How To Wireless Bring Your Own Device Data Management Work/Life Balance Gmail Flexibility Settings Marketing Vulnerability Windows 7 WiFi Word Infrastructure Voice over Internet Protocol Two-factor Authentication IT solutions Entertainment Google Drive Website Budget Servers Mouse HaaS Avoiding Downtime Data Security Vendor The Internet of Things Lithium-ion battery Managed Services Cleaning Software as a Service Display Telephone System Staff Machine Learning Connectivity Conferencing Remote Work End of Support Firewall Employee/Employer Relationship Education Physical Security Scam RMM Safety Virtual Reality HIPAA Sports Apple Redundancy USB Social Keyboard Vendor Management User Error Data Protection Meetings Save Time Risk Management Hacker Access Control Data storage Automobile Spam Blocking Managed Services Provider Electronic Medical Records DDoS Virtual Assistant Authentication Database Computing Infrastructure Hiring/Firing SharePoint Virus Remote Workers Going Green Unified Threat Management Processor Update Customer Service Computer Accessories Battery Environment Hard Drive Shadow IT Google Docs Fax Server Legal Business Intelligence Identity Theft Audit Internet Exlporer Worker SaaS Printer IT Management Computing Bluetooth Botnet PDF Augmented Reality IT Plan Fraud Network Congestion Proactive IT eWaste Digital Signage Remote Worker Unsupported Software Best Practice IT Consultant Cryptocurrency YouTube Charger Black Market Compliance Humor OneNote Procurement Computer Care Wearable Technology Current Events Comparison Net Neutrality Retail Hard Drives Workplace Strategy Document Management Telephony Instant Messaging Help Desk Robot Excel Solid State Drive CES Wireless Technology Samsung Printing Downtime How to Biometrics Virtual Desktop Business Technology Content Management Value Personal Leadership Millennials Cryptomining Troubleshooting WIndows 7 Printers Point of Sale Outlook Start Menu Smart Office Supply Chain Management Colocation Wireless Charging Uninterrupted Power Supply Science Monitoring Screen Mirroring Batteries Loyalty Digitize Monitor Workforce Books Virtual Private Network Windows 8.1 Frequently Asked Questions Mobile Windows 10s Cables Windows Server 2008 R2 Distributed Denial of Service Customer Relationship Management Customer relationships Cast Windows Media Player Nanotechnology IT Assessment Reputation webinar Telecommuting Manufacturing Streaming Media Emergency User Analyitcs PowerPoint Project Management Email Best Practices Tip of the week Programming Content Professional Services Public Cloud Cortana Tech Support Employer Employee Relationship Security Cameras Computer Tips Techology Digital Signature Managed IT Service Laptop Assessment Windows Server 2008 OneDrive Customers Biometric Security Managing Stress Warranty Virtual CIO Audiobook Tools HVAC Peripheral Google Apps Antivirus Touchpad Television Windows 8 Cameras Digital Security Cameras Analysis Using Data Devices Copiers 5G IT service Administrator Politics Enterprise Content Management Quick Tip Advertising Public Computer Smartwatch Tablet MSP Ergonomics Accountants Microchip Regulations Thought Leadership Development Credit Cards OLED Notifications Transportation Domains Password Management PCI DSS Computer Fan Password Manager Virtual Machine Rootkit Fiber Optics IaaS Multi-Factor Security Employee Maintenance Printer Server 2FA Search Engine Twitter Messaging Relocation Workers Cabling Benefits Bloatware NIST Policy FENG Business Mangement Hypervisor Smart Tech Trend Micro IBM Trending Tablets Dark mode Video Games Worker Commute Flash Addiction SMS Amazon Default App Smart Technology Entrepreneur Experience Procedure Recycling Saving Time Practices Shopping Supercomputer Google Search Shortcut Wiring dark theme Scalability Software Tips Business Owner Sync Cache AI Emails Amazon Web Services IT Infrastructure Cost Management Bing Social Networking Safe Mode FinTech Criminal NarrowBand Hosted Computing Social Network GDPR Search Wireless Internet iPhone Netflix Online Shopping Investment Two Factor Authentication Running Cable Consultant File Sharing Employees Root Cause Analysis Employee/Employer Relationships Inventory Knowledge Specifications ISP Music Memory Analytics Camera Windows 365 HBO Skype Wire Video Conferencing Files Evernote ROI Travel Shortcuts Best Available Sales Data loss Bitcoin Chromecast

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code