<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Sextortion Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/sextortion/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/sextortion/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 18 Jun 2020 17:59:46 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Sextortion Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/sextortion/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 033 Sextortion through Dating Apps</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-033-sextortion-through-dating-apps/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 18 Jun 2020 23:05:05 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Dating Apps]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Sextortion]]></category>
		<category><![CDATA[Sextortion through Dating Apps]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2083</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 33. This week we&#8217;re going to talk about Sextortion through Dating Apps. I will talk about sextortion through email, which is much more common, in a future one of these. Where did you come across this sextortion through dating apps thing? The good folks over at the Internet Storm Center put&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-033-sextortion-through-dating-apps/">#WeekendWisdom 033 Sextortion through Dating Apps</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 33. This week we&#8217;re going to talk about Sextortion through Dating Apps.<span id="more-2083"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2083-1" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-033-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-033-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-033-lo.mp4</a></video></div>
<p>I will talk about sextortion through email, which is much more common, in a future one of these.</p>
<h2>Where did you come across this sextortion through dating apps thing?</h2>
<p>The good folks over at the <a href="https://isc.sans.edu/" target="_blank" rel="noopener noreferrer">Internet Storm Center</a> put up <a href="https://isc.sans.edu/forums/diary/Sextortion+to+The+Next+Level/26244/" target="_blank" rel="noopener noreferrer">a post</a> this week talking about an online forum that they have discovered. The posts on this forum are full of details about people and these details are coming from dating apps.</p>
<h3>What are the evil doers doing?</h3>
<p>What the criminals are doing is they are creating lots and lots of fake profiles on dating sites and dating apps. Then when they get connected with their victims, which are nearly always men, they will get into conversations with them. They will ask them what their sexual preferences are. What they like doing. They will try to get them to virtually cheat on their partners, etc. They gather all of this information and they put it into a post on this online forum which is actually in the public domain.</p>
<p>Then what they do is contact the victim and say &#8220;If you want us to take down this post with all your sexual preferences, etc., this embarrassing information, pay us some money.&#8221; And they do apparently do this when they are paid money.</p>
<h3>What&#8217;s the problem then?</h3>
<p>But the thing is these sites have been in the public domain, they might be indexed by Google or they might be also in an internet archive. So that information is still up and is probably still in the public domain.</p>
<h3>What can I do to protect myself?</h3>
<p>So it&#8217;s just a case of being very careful about who you contact and who you can converse with on these dating sites.</p>
<p>So that&#8217;s it for this week. Let&#8217;s be careful out there and we&#8217;ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-033-sextortion-through-dating-apps/">#WeekendWisdom 033 Sextortion through Dating Apps</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-033-lo.mp4" length="23053939" type="video/mp4" />

			</item>
		<item>
		<title>Hoax Bomb Extortion Emails Are Latest Scam</title>
		<link>https://www.l2cybersecurity.com/hoax-bomb-extortion-emails/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Dec 2018 15:36:32 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Extortion]]></category>
		<category><![CDATA[Hoax Bomb]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Sextortion]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1500</guid>

					<description><![CDATA[<p>In the last couple of days there are reports of hoax bomb threats being sent by e-mail. They&#8217;ve been particularly prevalent in the USA, but there is nothing to stop them spreading. They&#8217;ve targeted schools, government facilities and some businesses.The e-mail claims that there is a bomb planted on the premises. This &#8220;bomb&#8221; will detonate&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/hoax-bomb-extortion-emails/">Hoax Bomb Extortion Emails Are Latest Scam</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1501" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/hoax-bomb-150x150.jpg" alt="hoax bomb" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/hoax-bomb-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/12/hoax-bomb.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />In the last couple of days there are <a href="https://isc.sans.edu/forums/diary/Bombstortion+Boomstortion/24414/" target="_blank" rel="noopener">reports of hoax bomb threats</a> being sent by e-mail. They&#8217;ve been particularly prevalent in the USA, but there is nothing to stop them spreading. They&#8217;ve targeted schools, government facilities and some businesses.<span id="more-1500"></span>The e-mail claims that there is a bomb planted on the premises. This &#8220;bomb&#8221; will detonate at the end of the day if a ransom is not paid. The premises is said to be under surveillance and if an evacuation or arrival of the authorities occurs, the bomb will be detonated.</p>
<h3>Hoax bomb e-mail</h3>
<blockquote><p>Subject: Think twice<br />
There is the bomb (tronitrotoluene) in the building where your business is located. My recruited person constructed an explosive device under my direction. It has small dimensions and it is hidden very well, it is impossible to damage the supporting building structure by my bomb, but there will be many wounded people if it detonates.<br />
My man is controlling the situation around the building. If any unnatural behavior, panic or emergency is noticed he will power the device.<br />
I want to suggest you a deal. You send me $20&#8217;000 in Bitcoin and the bomb will not detonate, but do not try to fool me -I warrant you that I have to call off my man solely after 3 confirmations in blockchain network.<br />
My payment details (Bitcoin address)- XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX <span style="color: #ff0000;"><em><strong>&lt;redacted&gt;</strong></em></span><br />
You must pay me by the end of the workday. If the working day is over and people start leaving the building explosive will explode.<br />
This is just a business, if I do not see the money and the bomb detonates, next time other commercial enterprises will send me a lot more, because this is not a single incident.<br />
I wont enter this email. I check my Bitcoin wallet every 40 min and after seeing the payment I will order my mercenary to leave your district.<br />
If an explosion occurred and the authorities see this letter:<br />
We arent a terrorist society and do not assume responsibility for explosions in other places.</p></blockquote>
<p>Needless to say it is a hoax bomb threat. It is similar to <a href="https://www.l2cybersecurity.com/a-sextortion-scam/" target="_blank" rel="noopener">the sextortion scam</a> that I warned about last July.</p>
<p>I love the last line. &#8220;We arent (sic) a terrorist society &#8230;&#8221; I think the evil doers are a little bit scared that the anti-terror units will come after them. They should be scared &#8230; but of all law enforcement. They will come down hard on these guys. In fact the US Computer Emergency Readiness Team (US-CERT) <a href="https://www.us-cert.gov/ncas/current-activity/2018/12/13/Bomb-Threats-Emailed-Around-World" target="_blank" rel="noopener">have advised people to</a>:</p>
<ul>
<li>Do not respond or try to contact the sender.</li>
<li>Do not pay the ransom.</li>
<li>Report the email to the Federal Bureau of Investigation (FBI)</li>
</ul>
<p>The concern about the volume of these types of threats though, is that they will tie up first responder resources while the hoax bomb is being investigated.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/hoax-bomb-extortion-emails/">Hoax Bomb Extortion Emails Are Latest Scam</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sextortion Scam Volume 3</title>
		<link>https://www.l2cybersecurity.com/sextortion-scam-volume-3/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 10 Dec 2018 12:37:05 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Sextortion]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1506</guid>

					<description><![CDATA[<p>Remember the original Sextortion scam back in July? The one where they used an old password to make it look like the e-mail was plausible. This then evolved in August to add the use of partial mobile numbers. Well, it&#8217;s BAAAACKK!!!  And this time it is really, really nasty. So it&#8217;s similar in nature to the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sextortion-scam-volume-3/">Sextortion Scam Volume 3</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1507" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Sextortion-150x150.jpg" alt="sextortion scam updated" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Sextortion-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Sextortion.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />Remember the original Sextortion scam back in July? The one where they <a href="https://www.l2cybersecurity.com/a-sextortion-scam/" target="_blank" rel="noopener">used an old password</a> to make it look like the e-mail was plausible. This then <a href="https://www.l2cybersecurity.com/sextortion-scam-a-follow-up/" target="_blank" rel="noopener">evolved in August</a> to add the use of partial mobile numbers. Well, it&#8217;s BAAAACKK!!! <span id="more-1506"></span> And this time it is <a href="https://www.proofpoint.com/us/threat-insight/post/sextortion-side-ransomware" target="_blank" rel="noopener">really, really nasty</a>.</p>
<p>So it&#8217;s similar in nature to the earlier sextortion scam where it shows an old password. However this one includes a link to a &#8220;video presentation&#8221; as proof that they have a video recording of you up to fun and games while watching pornography. The recording also includes a view of the alleged pornography that you were watching. If you click on the link, it will lead to Ransomware becoming installed on your computer. This will then scramble all of your files and demand $500 ransom to unscramble them. Here is an example of the dodgy e-mail:</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-1503" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/ssf1.png" alt="sextortion ransomware email" width="549" height="619" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/ssf1.png 549w, https://www.l2cybersecurity.com/wp-content/uploads/2018/12/ssf1-266x300.png 266w" sizes="(max-width: 549px) 100vw, 549px" /></p>
<p>The evil doers are using multiple social engineering techniques to fool nervous and vulnerable people. This step of providing &#8220;proof&#8221; of the existence of the video evidence is really sneaky. Please don&#8217;t fall for it. Let everyone you know, hear about this. You can point them at some detailed advice in our <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/" target="_blank" rel="noopener">Fifth Commandment</a> which is part of the wildly popular <a href="http://www.l2cybersecurity.com/the-ten-commandments/" target="_blank" rel="noopener">Ten Commandments of Cyber Security</a>.</p>
<p>If you want to find out how our simple, yet comprehensive Security Awareness training can help you spot these scams and avoid falling for them, then please send an e-mail to <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a> or call 087-436-2675 and we can let you know.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/sextortion-scam-volume-3/">Sextortion Scam Volume 3</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sextortion scam &#8211; a follow up.</title>
		<link>https://www.l2cybersecurity.com/sextortion-scam-a-follow-up/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 15 Aug 2018 11:34:52 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Sextortion]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1354</guid>

					<description><![CDATA[<p>This time last month I posted about a sextortion scam that was sending out large amounts of emails to people claiming to have recorded them watching porn. As proof that they meant business, they included an old password the victim had previously used. There have been some developments. The first thing to highlight is that the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sextortion-scam-a-follow-up/">Sextortion scam &#8211; a follow up.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1355" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/Sextortion-Follow-up-150x150.jpg" alt="Sextortion scam follow up" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/Sextortion-Follow-up-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/Sextortion-Follow-up.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />This time <a href="https://www.l2cybersecurity.com/a-sextortion-scam/" target="_blank" rel="noopener">last month I posted</a> about a sextortion scam that was sending out large amounts of emails to people claiming to have recorded them watching porn. As proof that they meant business, they included an old password the victim had previously used. There have been some developments.<span id="more-1354"></span></p>
<p>The first thing to highlight is that the evil doers are now using partial telephone numbers in this sextortion scam instead of old passwords. This can be more effective than the old password ruse that was used last month. This could be because many people may have changed passwords since. However not too many of us regularly change our mobile number.</p>
<h3>New development of the sextortion scam</h3>
<p>We may also be quite used to seeing our number appear in a partially redacted manner.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1356" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/sextortion-example-20180813-211938.png" alt="" width="855" height="621" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/sextortion-example-20180813-211938.png 855w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/sextortion-example-20180813-211938-300x218.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/sextortion-example-20180813-211938-768x558.png 768w" sizes="auto, (max-width: 855px) 100vw, 855px" /></p>
<p>So in this example, the victim sees the number +XX XXXXXX6074 instead of an old password. They have <a href="https://isc.sans.edu/forums/diary/New+Extortion+Tricks+Now+Including+Your+Partial+Phone+Number/23982/" target="_blank" rel="noopener">confirmed to the good folks</a> over at the Internet Storm Centre (ISC) that those last 4 digits match their number. So that can really make people sit up and take notice.</p>
<p>The question arises though &#8211; why are they partially redacting the number? It&#8217;s not like these guys are reputable and are trying to protect your privacy by not emailing the full number. If they truly had your full information from a hack or a data breach, why not just put the whole thing in there? It would be very much more effective.</p>
<p>No, they don&#8217;t have your full number at all and as surmised by the team over at the ISC, they are probably getting the information from password reset forms. This is where the like of Google and Amazon will send you a text message with a code as part of the reset process. Or as part of a two-factor authentication step such as the following:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1357" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/two-factor-mobile.jpg" alt="" width="368" height="256" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/two-factor-mobile.jpg 368w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/two-factor-mobile-300x209.jpg 300w" sizes="auto, (max-width: 368px) 100vw, 368px" /></p>
<p>So the bad guys have upped their game here. Just don&#8217;t fall for it.</p>
<h3>Are they making any money?</h3>
<p>The other update in relation to this is about the money they have actually made from this sextortion scam. A couple of weeks ago the fine people at the ISC <a href="https://isc.sans.edu/forums/diary/Sextortion+Follow+the+Money/23922/" target="_blank" rel="noopener">did an analysis</a> of the bitcoin wallets that were included in the scam emails. These are the long string of characters and numbers that I redacted in the email example above.</p>
<p>&#8220;Wait a second&#8221; I hear you say, &#8220;Bitcoin is untraceable, anonymous money.&#8221;. Actually it&#8217;s not really untraceable as by the very nature of the blockchain on which bitcoin is based, each transaction is fully public. It would be more appropriate to say that it is unregulated money.</p>
<p>Anyway, their analysis revealed that of the many wallets they were monitoring:</p>
<ul>
<li>123 payments were received</li>
<li>$235,000 in total was paid to those wallets</li>
<li>$4,900 was the biggest payment, with an average payment of $1,900</li>
</ul>
<p>This was probably a subset of all the wallets in use across the whole campaign. However you can see that people were fooled into parting with their money in reasonably large numbers.</p>
<p>So you now want to easily protect you and your staff from these kind of scams, right? I do some pretty awesome <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/04/Security-Awareness-and-Safety-Training.pdf" target="_blank" rel="noopener">security awareness training</a>. If you were interested in finding out more, just send an e-mail to <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a>.</p>
<p>#LetsBeCarefulOutThere</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/sextortion-scam-a-follow-up/">Sextortion scam &#8211; a follow up.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Sextortion Scam</title>
		<link>https://www.l2cybersecurity.com/a-sextortion-scam/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 12 Jul 2018 22:06:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Sextortion]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1252</guid>

					<description><![CDATA[<p>The evil doers have launched a new sextortion scam on the internet. This one is interesting to say the least as it does use a technique to sucker you into believing it is real, without giving you any actual evidence of what they allege to have on you. You receive an e-mail at your current e-mail&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/a-sextortion-scam/">A Sextortion Scam</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1253" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Sextortion-150x150.jpg" alt="Sextortion Scam" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Sextortion-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Sextortion.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />The evil doers have launched a new sextortion scam on the internet. This one is interesting to say the least as it does use a technique to sucker you into believing it is real, without giving you any actual evidence of what they allege to have on you. <span id="more-1252"></span>You receive an e-mail at your current e-mail address with a subject line containing a User ID and Password from a very old account that belonged/belongs to you. The e-mail alleges that they have a video of you watching porn as well as the what porn you were viewing. They then look for money to not release the video to all of your friends, family and colleagues.</p>
<p>It is of course a scam, but having an old User ID and Password on the e-mail does seem to give it a sort of legitimacy, in that they may just have hacked your computer. If you happened to be somebody who recently viewed porn on that computer, one which has a webcam, then you may just fall victim to this sextortion scam. This is what a typical e-mail looks like:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1254" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Screen-Shot-2018-07-12-at-1_50_28-PM.jpg" alt="Sextortion Scam e-mail" width="834" height="544" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Screen-Shot-2018-07-12-at-1_50_28-PM.jpg 834w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Screen-Shot-2018-07-12-at-1_50_28-PM-300x196.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Screen-Shot-2018-07-12-at-1_50_28-PM-768x501.jpg 768w" sizes="auto, (max-width: 834px) 100vw, 834px" /></p>
<p>The amount payable varies between the various e-mails, as does the Bitcoin wallet address (both circled above). There may also be a number of random words towards the end of the e-mail, which are used to defeat spam filters.</p>
<p>The bottom line here is, these people did NOT hack into your machine and record you watching porn. If they did, why wouldn&#8217;t they include a frame from said footage to prove that they had something on you.</p>
<p>The old User ID and Password that they included will have been picked up by the bad guys from a data breach sometime in the past. This stuff has been knocking around the internet for a loooonnng time. I did mention this last year when I talked about another <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/">scam e-mail that knew your name</a>. They will have used other indexing techniques to associate the old account with your current e-mail address and then send you the scam e-mail.</p>
<p>Well known security reporter Brian Krebs, reckons that the evil doers may refine their technique and <a href="https://krebsonsecurity.com/2018/07/sextortion-scam-uses-recipients-hacked-passwords/">use more recent accounts</a> that were part of a data breach.</p>
<p>As I always do in these e-mails I refer you to my <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">fifth commandment</a>. I&#8217;ll also throw in a shameless plug for the <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/04/Security-Awareness-and-Safety-Training.pdf">security awareness training</a> that I provide, which, if you were interested in finding out more, just send an e-mail to <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a>.</p>
<p>Let&#8217;s be careful out there.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/a-sextortion-scam/">A Sextortion Scam</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
