Skip to content
Tuesday, October 21, 2025
Latest:
  • Hackers Dox ICE, DHS, DOJ, and FBI Officials
  • Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks
  • One Republican Now Controls a Huge Chunk of US Election Infrastructure
  • When Face Recognition Doesn’t Know Your Face Is a Face
  • A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

    Computer Security Articles

    RSS Reader for Computer Security Articles

    • Home
      • Fortinet
      • MalwareBytes
      • Sophos
      • TrendMicro
      • Kaspersky
      • QuickHeal
    • Independent
      • Krebs
      • Securiteam
      • ComputerWorld
    • ScadaICS
      • Schneider
    • Security Videos
    • ThreatMap Fortinet

    ChaosCC

    MalwareBytesSecurity
    September 4, 2019 admin

    The lucrative business of Bitcoin sextortion scams (updated)

    Credit to Author: Threat Intelligence Team| Date: Thu, 22 Aug 2019 15:00:00 +0000

    Sextortion scams are back on the radar, and many say they’re on the uptick. We investigate an email campaign to see how lucrative the business of sextortion can be.

    Categories:

    • Scams

    Tags: 163qcNngcPxk7njkBGU3GGtxdhi74ycqzk1KE1EqyKLPzLWQ3BhRz2g1MHh5nws2TRk3HXdb3HAw1wVzU9b7ZSigvGaStd8KoZ3zJbitcoinBitcoin sextortionblackmailCCCChaos Computer ClubChaosCCDigital ShadowsEFFElectronic Frontier Foundationscamssextortion emailsextortion scams

    (Read more…)

    The post The lucrative business of Bitcoin sextortion scams (updated) appeared first on Malwarebytes Labs.

    Read More

    Connect with:

    Recent Posts

    • Hackers Dox ICE, DHS, DOJ, and FBI Officials
    • Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks
    • One Republican Now Controls a Huge Chunk of US Election Infrastructure
    • When Face Recognition Doesn’t Know Your Face Is a Face
    • A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

    Categories

    • ComputerWorld (1,732)
    • Fortinet (660)
    • Independent (3,639)
    • Kaspersky (1,498)
    • Krebs (831)
    • Magazine (81)
    • MalwareBytes (3,204)
    • Microsoft (907)
    • MotherBoard (849)
    • QuickHeal (455)
    • ScadaICS (2,845)
    • Schneider (2,845)
    • Securiteam (217)
    • Security (14,134)
    • Sophos (1,618)
    • TrendMicro (1,367)
    • VirusBulletin (81)
    • Wired (3,485)
      Copyright © 2025 Computer Security Articles. All rights reserved.
      Theme: ColorMag by ThemeGrill. Powered by WordPress.