{"id":16141,"date":"2019-08-22T08:10:05","date_gmt":"2019-08-22T16:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/08\/22\/news-9884\/"},"modified":"2019-08-22T08:10:05","modified_gmt":"2019-08-22T16:10:05","slug":"news-9884","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/08\/22\/news-9884\/","title":{"rendered":"The lucrative business of Bitcoin sextortion scams"},"content":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Thu, 22 Aug 2019 15:00:00 +0000<\/strong><\/p>\n<p>After a quiet period following a surge in late 2018 to <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/02\/sextortion-bitcoin-scam-makes-unwelcome-return\/\" target=\"_blank\">early 2019<\/a>, the online blackmail scheme known as <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/glossary\/sextortion\/\" target=\"_blank\">sextortion scams<\/a> are back on the radar and <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/eu.usatoday.com\/story\/money\/2019\/06\/17\/email-sextortion-scams-rise-heres-what-do\/1477871001\/\" target=\"_blank\">on the uptick<\/a>.<\/p>\n<p>According to <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/resources.digitalshadows.com\/whitepapers-and-reports\/a-tale-of-epic-extortions-how-cybercriminals-monetize-our-online-exposure\" target=\"_blank\">a report from Digital Shadows<\/a>, a leading UK-based cybersecurity company that monitors potential threats against businesses, there are several resources available to embolden novice criminals to a life of extortion. These resources include: access to credentials leaked from past breaches, tools and technologies that aid in creating campaigns, training from online extortionists, and a trove of DIY extortion guides that exist on the dark web. <\/p>\n<p>The report also finds that these fledgling extortionists and accomplices are incentivized with high salaries if they are able to hook high-earning targets, such as doctors, lawyers, or company executives\u2014information that can be gleaned by scouring LinkedIn profiles or other social media accounts.<\/p>\n<p>With a number of creative ways to wring money out of Internet users, the high potential of a hefty payout, and many helping hands from professional criminals, we shouldn\u2019t expect online sextortion scams to stop (permanently) any time soon. Just ask the <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/01\/of-princes-and-perpetrators\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Nigerian Prince (opens in a new tab)\">Nigerian Prince<\/a> how well his retirement is going.<\/p>\n<p>To look at what motivates threat actors to adopt sextortion scams as part of their criminal repertoire, we did what all good detectives do when trying to break open a case: We followed the money. Find out what we discovered on the trail begun by a single sextortion campaign.<\/p>\n<h3>The spam<\/h3>\n<p>We were able to determine several Bitcoin sextortion schemes being implemented in the wild, but for this post, we looked at its most common distribution form: email spam.<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/01-bitcoin-sextortion.png\" data-rel=\"lightbox-0\" title=\"\"><img decoding=\"async\" data-attachment-id=\"39341\" data-permalink=\"https:\/\/blog.malwarebytes.com\/scams\/2019\/08\/the-lucrative-business-of-bitcoin-sextortion-scams\/attachment\/01-bitcoin-sextortion\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/01-bitcoin-sextortion.png\" data-orig-size=\"974,608\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"01-bitcoin-sextortion\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/01-bitcoin-sextortion-300x187.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/01-bitcoin-sextortion-600x375.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/01-bitcoin-sextortion.png\" alt=\"\" class=\"wp-image-39341\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/01-bitcoin-sextortion.png 974w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/01-bitcoin-sextortion-300x187.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/01-bitcoin-sextortion-600x375.png 600w\" sizes=\"(max-width: 974px) 100vw, 974px\" \/><\/a><figcaption>The sextortion email, with its message embedded as an image file\u2014a common tactic to avoid spam filters.<\/figcaption><\/figure>\n<p>The full text of this email reads:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p><em>Hi, this account is now hacked! Change your password right now!<\/em><br \/><em>You do not heard about me and you may not be most likely surprised for what reason you are reading this letter, is it right?<\/em><br \/><em>I\u2019mhacker who crackedyour email boxand devicesnot so long ago.<\/em><br \/><em>You should not make an attempt to contact me or try to find me, it\u2019s hopeless, since I sent you this message using YOUR account that I\u2019ve hacked.<\/em><br \/><em>I set up special program on the adult videos (porn) site and guess that you enjoyed this site to have a good time (you understand what I mean).<\/em><br \/><em>When you have been taking a look at vids, your internet browser started out to act like a RDP (Remote Control) that have a keylogger that granted me ability to access your desktop and web camera.<\/em><br \/><em>Consequently, my softwareobtainedall info.<\/em><br \/><em>You have typed passwords on the online resources you visited, I already caught them.<\/em><br \/><em>Of course, you could possibly change them, or perhaps already changed them.<\/em><br \/><em>But it doesn\u2019t matter, my malware updates needed data every time.<\/em><br \/><em>What actually I have done?<\/em><br \/><em>I generated a backup of your every system. Of all files and personal contacts.<\/em><br \/><em>I formed a dual-screen video recording. The first screen demonstrates the film you were watching (you\u2019ve got a very good taste, haha\u2026), and the 2nd screen shows the movie from your webcam.<\/em><br \/><em>What should you do?<\/em><br \/><em>Great, in my opinion, 1000 USD will be a reasonable price for your little secret. You\u2019ll make your deposit by bitcoins (if you don\u2019t recognize this, search \u201chow to purchase bitcoin\u201d in Google).<\/em><br \/><em>My bitcoin wallet address:<\/em><br \/><em>163qcNngcPxk7njkBGU3GGtxdhi74ycqzk<\/em><br \/><em>(It is cAsE sensitive, so just copy and paste it).<\/em><br \/><em>Warning:<\/em><br \/><em>You have 2 days to perform the payment. (I have an exclusive pixel to this e-mail, and right now I understand that you\u2019ve read this email).<\/em><br \/><em>To monitorthe reading of a letterhead the actionsin it, I installeda Facebook pixel. Thanks to them. (Anything thatis usedfor the authorities may helpus.)<\/em><br \/> <em>&nbsp;<\/em><br \/><em>In the event I do not get bitcoins, I shall undoubtedly offer your video files to each of your contacts, including relatives, colleagues, etcetera?<\/em> <\/p>\n<\/blockquote>\n<p>There are many variations of this spam content, but they all follow a similar template: We&#8217;ve hacked your account, we have video proof of you visiting porn sites and watching sexual content, and we now demand payment or we&#8217;ll release the video of you to the public. In fact, Cisco\u2019s Talos Security Intelligence &amp; Research Group was able to retrieve <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.talosintelligence.com\/2018\/10\/anatomy-of-sextortion-scam.html\" target=\"_blank\">an email spam template<\/a>, which they said the extortionists mistakenly sent out to their targets.<\/p>\n<p>The <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.eff.org\/about\" target=\"_blank\">Electronic Frontier Foundation (EFF)<\/a> also keeps an updated record of variants of Bitcoin sextortion messages that you can look up in <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.eff.org\/deeplinks\/2018\/07\/sextortion-scam-what-do-if-you-get-latest-phishing-spam-demanding-bitcoin\" target=\"_blank\">this blog post<\/a>.<\/p>\n<p>As we followed the money in this investigation, the only relevant piece of information we needed from the sextortion email was the Bitcoin address, which in this case is <em>163qcNngcPxk7njkBGU3GGtxdhi74ycqzk<\/em>. This is our starting point.<\/p>\n<h3>The investigation<\/h3>\n<p>To better understand the next steps in our investigation, readers should first grasp the basics of <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/11\/cryptocurrency-works-cybercriminals-love\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"how cryptocurrency (opens in a new tab)\">how cryptocurrency<\/a> and the <a rel=\"noreferrer noopener\" aria-label=\"blockchain work. (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/technology\/2017\/12\/blockchain-technology-not-just-for-cryptocurrency\/\" target=\"_blank\">blockchain work.<\/a><\/p>\n<p>Paper money and coins are to the real, material world as digital currency is to the online, electronic world.<\/p>\n<p>Bitcoin is one of thousands of digital currencies available online to date. Specifically, it is a virtual currency\u2014because it is controlled by its creators and used and embraced by a virtual community\u2014and at the same time a cryptocurrency\u2014because it uses strong encryption algorithms and cryptographic schemes to ensure its resistant to forgery and cryptanalysis.<\/p>\n<p>The blockchain, as the name suggests, is a collection of data blocks that are linked together to form a chain. This system, commonly likened to a ledger, is used by several cryptocurrencies\u2014Bitcoin is one of them. Each block in a chain contains information on multiple transactions. And each transaction has a transaction ID, or TXID. Because of the way cryptocurrency wallets and sites record Bitcoin inputs to addresses, a single TXID may contain multiple entries in its record.<\/p>\n<p>While real-world ledgers are private and exclusive only to organizations and individuals that keep financial records, the blockchain Bitcoin operates in is not. This makes it easy for anyone, including security researchers, to look up cryptocurrency transactions online using publicly available tools, such as a block explorer.<\/p>\n<p>In a Bitcoin block, transaction information includes the sender and receiver\u2014all identified by Bitcoin addresses\u2014and the amount paid in Bitcoin.<\/p>\n<p>Keep these concepts in mind as we go back to the sextortion campaign at hand and navigate the trenches of Bitcoin transactions.<\/p>\n<h3>Going with the (Bitcoin through the blockchain) flow<\/h3>\n<p> The Bitcoin address in our sextortion email, <em>163qcNngcPxk7njkBGU3GGtxdhi74ycqzk<\/em>, actually has a small transaction history.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"39651\" data-permalink=\"https:\/\/blog.malwarebytes.com\/scams\/2019\/08\/the-lucrative-business-of-bitcoin-sextortion-scams\/attachment\/07-bitcoin-sextortion\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/07-bitcoin-sextortion.png\" data-orig-size=\"836,209\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"07-bitcoin-sextortion\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/07-bitcoin-sextortion-300x75.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/07-bitcoin-sextortion-600x150.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/07-bitcoin-sextortion-600x150.png\" alt=\"\" class=\"wp-image-39651\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/07-bitcoin-sextortion-600x150.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/07-bitcoin-sextortion-300x75.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/07-bitcoin-sextortion.png 836w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>The brief transaction history of 163qcNngcPxk7njkBGU3GGtxdhi74ycqzk <\/figcaption><\/figure>\n<p>However, we were able to take a closer look at these transactions and uncover additional addresses, giving us further insight into this particular campaign.<\/p>\n<p>According to TXID <em>94c86a55bb3081312d6020e67202e8c93a43d897f4a289cc655c0e9e6d9e31b4<\/em>, the balance of 0.25924622 BTC was sent to another Bitcoin address, <em>3HXdb3HAw1wVzU9b7ZSigvGaStd8KoZ3zJ<\/em> on March 13, 2019. During that time, this BTC value was worth approximately US$1,000, which is the amount demanded in the ransom email.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"39652\" data-permalink=\"https:\/\/blog.malwarebytes.com\/scams\/2019\/08\/the-lucrative-business-of-bitcoin-sextortion-scams\/attachment\/08-bitcoin-sextortion\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/08-bitcoin-sextortion.png\" data-orig-size=\"611,158\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"08-bitcoin-sextortion\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/08-bitcoin-sextortion-300x78.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/08-bitcoin-sextortion-600x155.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/08-bitcoin-sextortion-600x155.png\" alt=\"\" class=\"wp-image-39652\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/08-bitcoin-sextortion-600x155.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/08-bitcoin-sextortion-300x78.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/08-bitcoin-sextortion.png 611w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p>This TXID also contains 23 additional inputs from other Bitcoin addresses, which are likely also under the control of the same actor(s) behind the sextortion campaign, to <em>3HXdb3HAw1wVzU9b7ZSigvGaStd8KoZ3zJ<\/em>. Naturally, all BTC values from these inputs were combined, totaling 4.16039634 BTC (approximately US$16,100 at time of investigation).<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"39653\" data-permalink=\"https:\/\/blog.malwarebytes.com\/scams\/2019\/08\/the-lucrative-business-of-bitcoin-sextortion-scams\/attachment\/09-bitcoin-sextortion\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/09-bitcoin-sextortion.png\" data-orig-size=\"1112,764\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"09-bitcoin-sextortion\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/09-bitcoin-sextortion-300x206.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/09-bitcoin-sextortion-600x412.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/09-bitcoin-sextortion-600x412.png\" alt=\"\" class=\"wp-image-39653\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/09-bitcoin-sextortion-600x412.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/09-bitcoin-sextortion-300x206.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/09-bitcoin-sextortion.png 1112w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption><em>2<\/em>The 24 total inputs from other Bitcoin addresses in one TXID. Notice that most input values are similar to the ransom demand actors extorted from targets.<\/figcaption><\/figure>\n<p>Looking closely at <em>3HXdb3HAw1wVzU9b7ZSigvGaStd8KoZ3zJ<\/em>, we found it has 11 other transactions that follow a similar pattern to from the transaction we just reviewed<em>.<\/em><\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"39654\" data-permalink=\"https:\/\/blog.malwarebytes.com\/scams\/2019\/08\/the-lucrative-business-of-bitcoin-sextortion-scams\/attachment\/10-bitcoin-sextortion\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/10-bitcoin-sextortion.png\" data-orig-size=\"847,315\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"10-bitcoin-sextortion\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/10-bitcoin-sextortion-300x112.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/10-bitcoin-sextortion-600x223.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/10-bitcoin-sextortion-600x223.png\" alt=\"\" class=\"wp-image-39654\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/10-bitcoin-sextortion-600x223.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/10-bitcoin-sextortion-300x112.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/10-bitcoin-sextortion.png 847w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>3HXdb3HAw1wVzU9b7ZSigvGaStd8KoZ3zJ and its transaction history. Highlighted here is the aforementioned TXID 94c86a55bb3081312d6020e67202e8c93a43d897f4a289cc655c0e9e6d9e31b4.  <\/figcaption><\/figure>\n<p>We can confirm that that each of these transactions contains extorted funds. Take, for example, TXID <em>b8ae16d604947f67d2b27774e6cfa7afcdb7ede651bdd539b5a5dc555be302aa<\/em>:<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"39655\" data-permalink=\"https:\/\/blog.malwarebytes.com\/scams\/2019\/08\/the-lucrative-business-of-bitcoin-sextortion-scams\/attachment\/11-bitcoin-sextortion\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/11-bitcoin-sextortion.png\" data-orig-size=\"1112,544\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"11-bitcoin-sextortion\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/11-bitcoin-sextortion-300x147.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/11-bitcoin-sextortion-600x294.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/11-bitcoin-sextortion-600x294.png\" alt=\"\" class=\"wp-image-39655\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/11-bitcoin-sextortion-600x294.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/11-bitcoin-sextortion-300x147.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/11-bitcoin-sextortion.png 1112w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>Inputs within TXID b8ae16d604947f67d2b27774e6cfa7afcdb7ede651bdd539b5a5dc555be302aa  <\/figcaption><\/figure>\n<p>All Bitcoin addresses in this TXID have been reported as associated with criminal activity on <a rel=\"noreferrer noopener\" aria-label=\"Bitcoin-Spam (opens in a new tab)\" href=\"https:\/\/www.bitcoin-spam.com\/\" target=\"_blank\">Bitcoin-Spam<\/a>, a public database of crypto-addresses used by hackers and criminals. Here are links to their respective scam reports and the amount of money they received based on the Bitcoin price as of this writing:<\/p>\n<ul>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.bitcoin-spam.com\/abuse\/bitcoin\/12We6HFUr6GmxrHu2GFKfPSLD16ki31Msf\" target=\"_blank\">12We6HFUr6GmxrHu2GFKfPSLD16ki31Msf<\/a> (made three inputs):  received a total of US$5,297.32 <\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.bitcoin-spam.com\/abuse\/bitcoin\/1KiY2X9tww3zDgZmuoFRvZ7ssWx1b4moC9\" target=\"_blank\">1KiY2X9tww3zDgZmuoFRvZ7ssWx1b4moC9<\/a> (made two inputs):  received a total of US$993.54<\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.bitcoin-spam.com\/abuse\/bitcoin\/1CjZhStjKz95xqDEQ1PESygR2gKve8Yf7U\" target=\"_blank\">1CjZhStjKz95xqDEQ1PESygR2gKve8Yf7U<\/a> (made two inputs): received a total of 7,748.92 USD<\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.bitcoin-spam.com\/abuse\/bitcoin\/17QU3bzgqQZCs8wRCAmLqiRL4yytRKqVs3\" target=\"_blank\">17QU3bzgqQZCs8wRCAmLqiRL4yytRKqVs3<\/a>: received a total of US$4,672.65<\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.bitcoin-spam.com\/abuse\/bitcoin\/12bYqKzCRJPhu75dP3NPtf6C2NX3dHAXiU\" target=\"_blank\">12bYqKzCRJPhu75dP3NPtf6C2NX3dHAXiU<\/a>: received a total of US$2,516.05<\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.bitcoin-spam.com\/abuse\/bitcoin\/1FcCacS5pebEKMR6wtz7k98JEqbhfhCkDw\" target=\"_blank\">1FcCacS5pebEKMR6wtz7k98JEqbhfhCkDw<\/a>: received a total of US$3,752.34 <\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.bitcoin-spam.com\/abuse\/bitcoin\/12i8q8K7apATJworX48SqQzNgiVmPpWGpz\" target=\"_blank\">12i8q8K7apATJworX48SqQzNgiVmPpWGpz<\/a>: received a total of US$2,490.25<\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.bitcoin-spam.com\/abuse\/bitcoin\/1BDaStcRvbM3QJei5ZT1FxLRy7M7Jk3j1c\" target=\"_blank\">1BDaStcRvbM3QJei5ZT1FxLRy7M7Jk3j1c<\/a>: received a total of US$2,531.09 <\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.bitcoin-spam.com\/abuse\/bitcoin\/136NawuGLkuJwAWYwkCkCnBdE9U1e1fJhx\" target=\"_blank\">136NawuGLkuJwAWYwkCkCnBdE9U1e1fJhx<\/a>: received a total of US$2,343.33<\/li>\n<\/ul>\n<p>Further analysis past the consolidation address becomes difficult as the thieves begin a laundering process to hide their illicit gains by splitting and mixing the stolen funds.<\/p>\n<p>This particular scam campaign appears to have been most active between February 1, 2019 until March 13, 2019, collecting a total of 21.6847451 BTC, which is a little over US$220,000 at current exchange rates.<\/p>\n<h3>Money, money, money<\/h3>\n<p>When it comes to email sextortion scams, suffice to say, business is unfortunately <em>incredibly good<\/em>. While the simplicity and profitability of the scam may serve an invitation for would-be criminals, the more users become aware of the scheme, the less we&#8217;ll be lining the bad guys&#8217; pockets with our cryptocash. <\/p>\n<p>But more importantly, this should be a wake-up call for users. A lot of people, even those who consider themselves Internet-savvy, are falling for or are rattled by the extortion messaging, especially those emails that make use of old passwords to scare innocent people into parting with their money.<\/p>\n<p>If you or someone you know may have received sextortion emails, know that <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/10\/sextortion-emails-theyre-probably-not-watching\/\" target=\"_blank\">it\u2019s highly likely they\u2019re not watching you<\/a>. What threat actors describe in their emails is not actually taking place. <\/p>\n<p>Furthermore, don\u2019t panic. <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/02\/sextortion-bitcoin-scam-makes-unwelcome-return\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Do your due diligence<\/a> and secure accounts that have been affected by massive breaches in the past (if you haven\u2019t already). And lastly, if you want to do as little hoop-jumping as possible, just delete the email and file them away in your mind as harmless spam.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/scams\/2019\/08\/the-lucrative-business-of-bitcoin-sextortion-scams\/\">The lucrative business of Bitcoin sextortion scams<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/scams\/2019\/08\/the-lucrative-business-of-bitcoin-sextortion-scams\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Thu, 22 Aug 2019 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/scams\/2019\/08\/the-lucrative-business-of-bitcoin-sextortion-scams\/' title='The lucrative business of Bitcoin sextortion scams'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/shutterstock_181197875.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Sextortion scams are back on the radar, and many say they\u2019re on the uptick. We investigate an email campaign to see how lucrative the business of sextortion can be.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/scams\/\" rel=\"category tag\">Scams<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/163qcnngcpxk7njkbgu3ggtxdhi74ycqzk\/\" rel=\"tag\">163qcNngcPxk7njkBGU3GGtxdhi74ycqzk<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/3hxdb3haw1wvzu9b7zsigvgastd8koz3zj\/\" rel=\"tag\">3HXdb3HAw1wVzU9b7ZSigvGaStd8KoZ3zJ<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bitcoin\/\" rel=\"tag\">bitcoin<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bitcoin-sextortion\/\" rel=\"tag\">Bitcoin sextortion<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/blackmail\/\" rel=\"tag\">blackmail<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/digital-shadows\/\" rel=\"tag\">Digital Shadows<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eff\/\" rel=\"tag\">EFF<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/electronic-frontier-foundation\/\" rel=\"tag\">Electronic Frontier Foundation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/scams\/\" rel=\"tag\">scams<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sextortion-email\/\" rel=\"tag\">sextortion email<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sextortion-scams\/\" rel=\"tag\">sextortion scams<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/scams\/2019\/08\/the-lucrative-business-of-bitcoin-sextortion-scams\/' title='The lucrative business of Bitcoin sextortion scams'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/scams\/2019\/08\/the-lucrative-business-of-bitcoin-sextortion-scams\/\">The lucrative business of Bitcoin sextortion scams<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[22713,22714,10490,22715,8539,22716,11245,11247,10574,22717,21560],"class_list":["post-16141","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-163qcnngcpxk7njkbgu3ggtxdhi74ycqzk","tag-3hxdb3haw1wvzu9b7zsigvgastd8koz3zj","tag-bitcoin","tag-bitcoin-sextortion","tag-blackmail","tag-digital-shadows","tag-eff","tag-electronic-frontier-foundation","tag-scams","tag-sextortion-email","tag-sextortion-scams"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16141"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16141\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}