{"id":14569,"date":"2019-02-11T11:10:06","date_gmt":"2019-02-11T19:10:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/02\/11\/news-8319\/"},"modified":"2019-02-11T11:10:06","modified_gmt":"2019-02-11T19:10:06","slug":"news-8319","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/02\/11\/news-8319\/","title":{"rendered":"Sextortion Bitcoin scam makes unwelcome return"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Mon, 11 Feb 2019 18:38:53 +0000<\/strong><\/p>\n<p>Heads up: a particularly nasty <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/sextortion\/\" target=\"_blank\" rel=\"noopener\">sextortion<\/a>\u00a0Bitcoin scam from at least the middle of 2018 is making the rounds once again.<\/p>\n<p>The scam involves making use of old breach dumps, then emailing someone from the list and reminding them of their old password.<\/p>\n<p>When something lands in your mailbox with \u201cHey, remember this?\u201d it\u2019s a surefire way to focus the reader&#8217;s attention. Pressure is then applied to start sending over some Bitcoin\u2026or else.<\/p>\n<h3>What is the threat being made?<\/h3>\n<p>The generally accepted theory is that the scammer digs up personally identifiable information from\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/101\/2019\/01\/collection-1-data-breach-what-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">old data breaches<\/a>, including email addresses and passwords, plugs it into some sort of automated script, and then fires out thousands of emails.<\/p>\n<p>Those mails <a href=\"https:\/\/krebsonsecurity.com\/2018\/07\/sextortion-scam-uses-recipients-hacked-passwords\/comment-page-13\/\" target=\"_blank\" rel=\"noopener\">reach people from said breach<\/a>, and they then see talk of somebody \u201cknowing\u201d their login details. That\u2019s then used as leverage to claim the attacker has access to their PC, files, folders, webcams, browsing history\u2014in a nutshell, anything personal and sensitive. The scarier they can make it sound, the better. In fact, one of the more <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/beware-of-extortion-scams-stating-they-have-video-of-you-on-adult-sites\/\" target=\"_blank\" rel=\"noopener\">eye-popping claims<\/a> is that the scammer has video of the user viewing adult websites, and they will share this video with all the user&#8217;s contacts unless they pony up and pay a Bitcoin ransom.<\/p>\n<p>And in classic ransomware fashion, there\u2019s typically a ticking clock. Giving users a short time limit to deliver the payment<em>\u00a0<\/em>is\u00a0social engineering at its finest.<\/p>\n<h3>What next?<\/h3>\n<p>The recipient may well have a panic attack, that\u2019s what. To be suddenly confronted with an ancient (but potentially still active) password is certainly going to give a bit of a shock to the system. It\u2019s at this point the confusion sets in, as they start to wonder what on Earth the attacker has. Did they really see what they claimed to see? Do they actually have video footage? What other potentially embarrassing (or worse) content could they use to extort and blackmail?<\/p>\n<h3>What do they really have?<\/h3>\n<p>A large throne of lies, is what.<\/p>\n<p>Yes, they have your password from a long time ago.<\/p>\n<p>No, they do not have access to your computer. And no, even if you were checking out adult sites, they don&#8217;t have video of you doing so.<\/p>\n<p>What they might have is access to your email account associated with the breach, if you haven\u2019t changed the password since it took place. They could also potentially start trying to log into other accounts you have with the same password. If this is the case, you should fire up a password manager and get to work changing things.<\/p>\n<p>In fact, you should do that if you <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/05\/dont-need-27-different-passwords\/\" target=\"_blank\" rel=\"noopener\">share passwords across accounts<\/a> in any case.<\/p>\n<p>Okay, back to the scam.<\/p>\n<h3>What does the email say?<\/h3>\n<p>It\u2019s a fairly standard template, and hunting for portions of the below mail will throw up any number of hits in Google and other search engines.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/email.jpg\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27144\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/02\/sextortion-bitcoin-scam-makes-unwelcome-return\/attachment\/email-11\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/email.jpg\" data-orig-size=\"1449,750\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Sextortion email\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/email-300x155.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/email-600x311.jpg\" class=\"aligncenter size-medium wp-image-27144\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/email-300x155.jpg\" alt=\"\" width=\"300\" height=\"155\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/email-300x155.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/email-600x311.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/email.jpg 1449w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Click to enlarge<\/p>\n<p>The email reads as follows:<\/p>\n<blockquote>\n<p><em>I am well aware [REDACTED] is your pass words. Lets get right to point. Neither anyone has paid me to investigate you. You may not know me and you are probably thinking why you&#8217;re getting this e-mail?<span class=\"Apple-converted-space\">\u00a0<\/span><\/em><\/p>\n<p><em>actually, i installed a software on the adult videos (pornographic material) web-site and do you know what, you visited this website to have fun (you know what i mean). While you were viewing videos, your web browser began working as a Remote Desktop that has a keylogger which gave me accessibility to your display and also cam. Just after that, my software gathered every one of your contacts from your Messenger, Facebook, as well as email . after that i created a double video. 1st part displays the video you were viewing (you&#8217;ve got a nice taste haha), and next part shows the recording of your cam, yeah its you.<span class=\"Apple-converted-space\">\u00a0<\/span><\/em><\/p>\n<p><em>You have not one but two choices. Shall we read up on these options in aspects:<span class=\"Apple-converted-space\">\u00a0<\/span><\/em><\/p>\n<p><em>First alternative is to just ignore this message. in such a case, i am going to send out your actual video to every single one of your personal contacts and think regarding the awkwardness you will definitely get. and definitely if you happen to be in a loving relationship, how it would affect?<span class=\"Apple-converted-space\">\u00a0<\/span><\/em><\/p>\n<p><em>Number 2 solution is to pay me $889. Lets name it as a donation. in this situation, i most certainly will asap remove your video footage. You could carry on daily life like this never occurred and you surely will never hear back again from me.<\/em><\/p>\n<p><em>You&#8217;ll make the payment through Bi\u200ctco\u200cin (if you don&#8217;t know this, search for &#8216;how to buy b\u200citcoi\u200cn&#8217; in Google).<span class=\"Apple-converted-space\">\u00a0<\/span><\/em><\/p>\n<p><em>B\u200cT\u200cC\u200c ad\u200cdre\u200css to send to:\u00a0[REDACTED]<\/em><\/p>\n<p><em>[CaSe sensitive, copy &amp; paste it]<span class=\"Apple-converted-space\">\u00a0<\/span><\/em><\/p>\n<p><em>if you are wondering about going to the law enforcement officials, well, this message can not be traced back to me. I have dealt with my actions. i am also not attempting to demand a huge amount, i would like to be compensated. within this%} emaiQUNdkpeC [SIC] if i do not receive the \u200cbi\u200ctco\u200cin\u200c, i will send your video recording to all of your contacts including family members, coworkers, and so forth. Having said that, if i receive the payment, i will erase the recording immediately. If you really want proof, reply Yup then i will send out your video to your 9 friends. This is a non-negotiable offer, so don&#8217;t waste mine time and yours by replying to this e mail.<\/em><\/p>\n<\/blockquote>\n<h3>That\u2019s pretty sneaky<\/h3>\n<p>It is, and I\u2019d be surprised if there aren\u2019t many others waking up to emails identical to the above. Should you receive one yourself, do the following:<\/p>\n<ol>\n<li>Don\u2019t panic. They absolutely do not have the keys to your computer.<\/li>\n<li>See if the email in question pops up over on <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener\">Haveibeenpwned<\/a>.<\/li>\n<li>See if your <a href=\"https:\/\/haveibeenpwned.com\/Passwords\" target=\"_blank\" rel=\"noopener\">password<\/a> does the same thing.<\/li>\n<li>At this point, you may have a fairly good idea which breach they grabbed your old login from, which is always useful information to have.<\/li>\n<li>Delete the email you were sent, and under no circumstances pay them a penny\/dime\/insert currency of choice here.<\/li>\n<\/ol>\n<h3>Scare tactics: an evil practice<\/h3>\n<p>The anonymous sender of these mails doesn\u2019t care about the trauma they could cause at the other end. These missives would be particularly traumatic for anyone involved in (say) a revenge porn case previously. And make no mistake, <a href=\"https:\/\/www.theregister.co.uk\/2014\/03\/18\/romania_ransomware_murder_suicide\/\" target=\"_blank\" rel=\"noopener\">generic Internet blackmail threats can kill<\/a>.<\/p>\n<p>If you\u2019re able to report these mails for spam\/abuse before deleting, do so. There\u2019s a remote chance you could actually save someone\u2019s life while making the Internet a little safer into the bargain.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/02\/sextortion-bitcoin-scam-makes-unwelcome-return\/\">Sextortion Bitcoin scam makes unwelcome return<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/02\/sextortion-bitcoin-scam-makes-unwelcome-return\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Mon, 11 Feb 2019 18:38:53 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/02\/sextortion-bitcoin-scam-makes-unwelcome-return\/' title='Sextortion Bitcoin scam makes unwelcome return'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/02\/shutterstock_497882629.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A well-worn sextortion scam is back in user&#8217;s inboxes. We explain what to look for and why recipients shouldn&#8217;t panic.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/email\/\" rel=\"tag\">email<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fake\/\" rel=\"tag\">fake<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pressure\/\" rel=\"tag\">pressure<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/scam\/\" rel=\"tag\">scam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sextortion\/\" rel=\"tag\">sextortion<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spam\/\" rel=\"tag\">spam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/threat\/\" rel=\"tag\">threat<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/02\/sextortion-bitcoin-scam-makes-unwelcome-return\/' title='Sextortion Bitcoin scam makes unwelcome return'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/02\/sextortion-bitcoin-scam-makes-unwelcome-return\/\">Sextortion Bitcoin scam makes unwelcome return<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503,11222,11539,20892,3985,18952,10510,10518,6351],"class_list":["post-14569","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime","tag-email","tag-fake","tag-pressure","tag-scam","tag-sextortion","tag-social-engineering","tag-spam","tag-threat"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14569"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14569\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14569"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14569"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}