This Internet Scam Is Getting Very Personal

This Internet Scam Is Getting Very Personal

Seemingly every day you read of a new Internet threat affecting users. As a result, people are more cognizant than ever. What they do fall for time and again are scams that are seemingly person-to-person. The latest one is especially rubbing people the wrong way.

A lot of people view pornographic material. In fact, it makes up about 30 percent of the content on the Internet, and draws more attention than Amazon, Twitter, and Netflix do, combined. While this may be a bit unsavory, if it’s that popular, there is a place for it on the Internet. The problem is that one ingenious hacker has developed a scam that uses people’s clandestine use of adult material against them.

How the Scam Works
Like many of today’s most prevalent Internet scams, extortion is the endgame. This is the case with this particular scam, which uses the purported possession of private information to blackmail the victim. In this case, the scammer claims to have captured footage of both the adult material that the victim was watching, and footage of the victim as they watched said materials.

The target of the scam is first sent an email that details their current situation, as the scammer wants them to believe it. It should also be mentioned that this email includes a password that the user has once used in the subject line. The rest of the email continues:

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

At this point in the email, the user is given the address to which the Bitcoin is to be transferred, with a threat of what will happen if payment isn’t delivered promptly.


You have 24 hours in order to make the payment. (I have an [sic] unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

Naturally, this isn’t the kind of message that anyone would want to find in their inbox, in any of the versions currently making their rounds online. Regardless of which one you see, the threat is the same: pay me, or I spread your dirty laundry to everyone you know.

Before You Go and Buy Bitcoin…
... you should know that this scam is just that, a scam. The hacker has no video of you, “doing nasty things” or otherwise, and the password they use as evidence is actually sourced from a hacked, decade-old database. However, while there is no danger to a security-minded user, this scam still provides some important lessons.

First, scams like this are not going to go away anytime soon, if the relative success of this one is any indication. Remember, this scam demanded a ransom of $1400. In just a few weeks, this scam had brought the perpetrator over $250,000 in ill-gotten money. On a related note, that means that at least 179 people (likely more, by now) were taken by this scam, which suggests that these people may not have changed their passwords in the 10 years since the database was hacked. Clearly, these people could have benefitted from subscribing to some password best practices.

Regardless, these events should make us all consider the reality that this scam isn’t totally a scam, as there is plenty of potential for this kind of intrusive footage to be taken. When more or less every device comes with some kind of front-facing camera, it is hard to guarantee that some footage of you doesn’t exist somewhere without your knowledge or consent - whether you’re fully dressed or not.

How to Keep Yourself Safe
With attacks like these, your best bet is to be proactive in your protections, notably, your passwords. By simply subscribing to best practices and frequently changing your passwords to something brand new, scams like these have the wind taken out of their sails. After all, an old password won’t work if you’re using a new one. If you have a hard time keeping track of so many, you may want to consider utilizing a password manager.

Furthermore, it may not be a bad idea to cover up your webcam when you aren’t actively using it… just in case.

Whether or not a threat like this is actively trying to victimize you, just trying to keep track of all of the potential threats out there can be exhausting. Let BNMC do the busy and stressful work for you. We have the means to keep you protected with both practical defenses and improved education. For more information, give us a call at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, September 23 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Hackers Business Computing Microsoft Software Network Security Internet Google Computer Tech Term Hosted Solutions Business Mobile Devices IT Services Ransomware Small Business Managed IT Services Android Backup User Tips Smartphone Windows IT Support Internet of Things Innovation Efficiency Saving Money Cloud Computing Data Management Business Continuity Hardware Data Recovery Data Communication Browser Data Backup App Productivity Cybersecurity Windows 10 Encryption Passwords Gmail Artificial Intelligence Managed IT Services Facebook Business Management Server Remote Monitoring communications Smartphones Productivity Network Chrome Infrastructure Windows 10 Managed Service Provider Office 365 Phishing Money IT Support Tip of the week Applications Microsoft Office Outsourced IT Word Vulnerability Employer-Employee Relationship Disaster Recovery Analytics Big Data Settings Data storage Government Maintenance Antivirus YouTube BYOD Risk Management Google Drive Social Media Website Content Filtering Bandwidth Upgrade Office Tips Save Money IT Management Robot Business Technology The Internet of Things Paperless Office Storage Server Management Managing Stress Automation Virtual Private Network Touchscreen End of Support VoIP Virtual Reality Data loss Unified Threat Management Telephone Systems HIPAA SaaS desktop Spam Computing Mobile Security Workplace Tips Outlook Two-factor Authentication WiFi Holiday Firewall Avoiding Downtime LiFi Scam Alert Hosted Solution Business Intelligence Administration Information Wireless Mouse Miscellaneous Company Culture Monitors VPN Vendor Management Mobile Device Apple Data Security Laptop Social Engineering Google Wallet Computing Infrastructure Professional Services Dell Bitcoin Social Networking Legislation Digital Signage WannaCry Printing Star Wars Microsoft Excel Websites Cabling Business Growth Chatbots SharePoint Monitoring eWaste Password Managed IT Nanotechnology Smart Technology Development Google Maps Legal Quick Tips Wearable Technology Techology Network upgrade Downtime Safety Unified Communications Drones How To Alerts Lenovo USB Cybercrime Windows 8 Statistics Motherboard Tablet Troubleshooting Cables Remote Computing Fraud Mail Merge Cost Management Blockchain Hacker Identity Downloads Spying Continuity Marketing Network Congestion Shortcut Screen Reader Distributed Denial of Service Charging Deep Learning VoIP Unified Threat Management Analysis Smart Office Gadgets Comparison Wires Digital Payment Firefox Licensing Superfish Dongle Bluetooth Writing Digital Address Assessment Permissions Wi-Fi Disaster Alt Codes Employee-Employer Relationship Solar Computers Patch Management Smart Tech Managed IT Service Collaboration Bring Your Own Device Operating System User Error Managed Service Work Users Halloween Router Specifications Voice over Internet Protocol Budget Customer Relationship Management Cooperation Service Level Agreement Dark Data Social Retail Document Management Spyware Information Technology Hotspot Internet Exlporer Uninterrupted Power Supply Typing Humor Heating/Cooling Compliance Multi-Factor Security PowerPoint Display Computer Care IBM Current Events Connectivity Break Fix Politics File Sharing Best Practice Time Management IT Technicians Printer Optimization Scary Stories Solid State Drive Search Modem Black Friday FinTech Staff Networking Leominster Running Cable Customer Service Buisness Office Samsung Identity Theft Apps Language Emergency Value Cryptocurrency Servers Regulations Google Calendar Onboarding Training IT solutions Corporate Profile Going Green IoT Dark Web Virtual Desktop Tech Support Google Docs Network Management Mirgation Access Control Slack Recycling Sports Education Hard Disk Drive Hacks Cookies Cyber Monday MSP Automobile Augmented Reality K-12 Schools Chromebook Notifications Supercomputer CrashOverride Electronic Medical Records Twitter Staffing Physical Security Motion Sickness Emoji Taxes Upgrades Gadget Administrator Crowdsourcing IT Budget Web Server what was your? GPS Personal Information Botnet Cortana IT Consultant Mobile Device Management 3D Printing Printers Cameras BDR Processors Tracking Machine Learning Meetings Virtualization Cleaning Mobile Computing Regulation Unsupported Software Update CCTV Computer Repair Relocation Webcam Mobile Data How To Work/Life Balance Error Recovery Health Private Cloud Point of Sale Ben McDonald shares Black Market Travel G Suite Law Enforcement

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3