croom new

Eclipse Integrated Systems Blog

Sexy Scam Relies on Your Belief that Someone Was Watching

Sexy Scam Relies on Your Belief that Someone Was Watching

Internet scams are major threats to individuals and business because all it takes is one wrong click of the mouse and a user is embroiled in an unenviable situation. One such scam that is happening today is designed to catch users with their pants down, so to speak.

You should know, before we get into the scam that 30 percent of the Internet is pornography; and, this enormous supply is, regrettably, not hurting for demand. In fact, these adult websites attract more visitors than Amazon, Netflix, and Twitter combined. It is due to this overwhelming usage that the scam in question works.

The Scam
One of the first rules of extortion is: To get over on a mark, it helps to have some piece of information to blackmail him/her with. That’s how this scam works. Basically, you’ll get an email from an unknown sender. It will read:

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

As the user reads on, they are provided an address to send the $1400 in cryptocurrency, recommending that the recipient copy and past the alphanumeric code attached, as it is case sensitive. The correspondence ends with this:

“Important:

You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

Good grief. It doesn’t look too good for you. Of course, in the enormity of the Internet, there are several different iterations of this email going around, but their message is the same: pay up, or you’ll be publicly humiliated.

Don’t Panic, But Be Worried
No matter what you do in your personal time, you should know right off the bat that this is a scam, as in, the scam is total bull. There is no video of you, and if there was, there is no person that is going to release that information. The password, which was yours at some time, was gained in some hack some time ago. You can go ahead and ignore this particular threat, but take heed.

This scam may not have much traction, but since victims have so far paid out a whopping $250,000 as a result of this scam, those payments gives the scam a modicum of legitimacy. Due to the success of this, more attacks like it will inevitably pop up. This also means that there were open opportunities for real hackers to make off with some pretty compromising information about people. For one, there was definitely an opportunity to get video of you as most laptops today come with front-facing webcams.

What You Need to Do
To protect yourself, you have to take precautions. First, password management is key. Know what your passwords are, and if you’re like the millions of us who can’t remember them all, use a password manager. That way, you only have to remember one. Additionally, it may be a good idea to keep your webcam covered up when you aren’t actively using it. That way, if you were to do questionable things in front of your computer’s camera, you won’t have to pay for it later.

At Eclipse Integrated Systems, we know it’s increasingly difficult to keep up with all the threats going around. From this threat to ransomware, and everything in between, our staff keeps a close eye on emerging threats so that we can help keep our clients from being compromised. Have you received this email, or some other that attempted to extort you online? Comment below to join the conversation.

Tip of the Week: Don’t Waste Capital In the Cloud
How Exactly Is the GDPR Working to Incorporate Blo...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, February 24 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Network Security Internet Google User Tips Hackers Productivity Software Malware Microsoft Business Management Innovation Tech Term Efficiency Hosted Solutions Computer Backup Email Business Windows 10 Browser Cybersecurity Smartphones Mobile Devices Apps Productivity Managed IT Services Hardware Collaboration Data Backup Windows Passwords Small Business Data Recovery Saving Money Smartphone Internet of Things Communication Holiday communications VoIP Android Virtualization Cybercrime Data Security Wireless Workplace Tips Ransomware Disaster Recovery Network Business Continuity Mobility Mobile Device IT Support Microsoft Office Data Operating System Law Enforcement Miscellaneous Office 365 Cloud Computing Windows 10 IT Services Users IT Support Phishing Server Update BDR Quick Tips Password Gadgets Money Social Media Mobile Device Management Telephone Systems Chrome Outsourced IT Wi-Fi Application Information Technology Health App Risk Management Upgrade Best Practice Vulnerability Unsupported Software Cost Management Google Drive Employer-Employee Relationship Social Government Facebook Personal Information Blockchain USB Artificial Intelligence Antivirus Alert Streaming Media Spam Patch Management Computers Bandwidth Managed Service Provider User Error Information Hacking Marketing Identity Theft Two-factor Authentication Politics Shortcut Data Management Networking Save Money Sports Work/Life Balance Managed IT Services Proactive IT Managed IT Office tips Automation Current Events Gmail eWaste Tech Support Automobile Mobile Computing DDoS Wireless Charging WiFi Google Docs SaaS Commerce Transportation Remote Monitoring and Management Fraud Computer Care Legal Internet Exlporer Access Control Data Storage Analytics The Internet of Things Medical IT Search Wireless Technology G Suite Data Protection Hosted Solution Mobile Security Word Television Applications Maintenance Flexibility Outlook Office Router VPN Managed Service Encryption Business Intelligence Social Engineering Cleaning History Telephony Connectivity Humor Samsung OneNote Excel Storage End of Support Battery Remote Computing Compliance Instant Messaging Meetings Private Cloud Devices Training BYOD Touchscreen Going Green Recovery Cortana HaaS Audit Apple iPhone Managing Stress Save Time Company Culture Chromecast Cables Electronic Medical Records Healthcare Updates Video Games Internet Explorer Microsoft Office 365 Computer Accessories Augmented Reality Legislation Advertising WIndows Server 2008 Music Chromebook Reporting Smart Technology Computer Fan Files Microsoft Teams Security Cameras HBO Gifts App store Hacker Hard Disk Drive NFL Reputation A.I. Profitability Running Cable Virus Voice over Internet Protocol Safety Emails SharePoint E-Commerce Adobe Microsoft Word Threat Laptop Comparison Bluetooth Distributed Denial of Service Data Breach Printing WannaCry Microsoft Excel Identities Virtual Reality Wearables Unified Threat Management Credit Cards Entertainment Robot Analysis Keyboard Edge Black Market Movies Eliminating Downtime Proactive Webinar Payment PowerPoint Touchpad Authentication Vendor Management Screen Mirroring Specifications Fax Server Evernote Big Data Google Assistant Data storage GDPR File Sharing Language Education Trending Bring Your Own Device Upgrades IT Management Lithium-ion battery Identity Windows Ink Ciminal Wireless Internet Websites Administrator Amazon IT solutions Teamwork Vulnerabilities Licensing Device Security Scalability Authorization Cast Sales PDF Worker Commute Consultant Books Value Dark Web Scam Nanotechnology Hybrid Cloud IT Solutions FAQ Experience Data Privacy Hiring/Firing iOS Google Maps Project Management Unified Communications Help Desk Retail Text Messaging Data Theft Access Virtual Assistant Windows 10s Cryptocurrency Travel How To Uninterrupted Power Supply Downloads Operating Sysytem Wearable Technology Budget Managed IT Service Sync Workers Error Employer Employee Relationship Root Cause Analysis Point of Sale Charger Phone System Hard Drive Benefits Data Loss IT budget RAM Certification Conferencing Computing Plug-In Solid State Drive Tablets Spyware Trends Avoiding Downtime Troubleshooting Settings Cache Disaster Remote Monitoring Emergency CrashOverride Monitors Relocation Worker Printers Twitter Regulation Paperless Office

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login