IT Security Firm Explains What’s Behind ‘Sextortion’ Schemes

‘Sextortion’ schemes are just one of the many ‘porn scam’ spam scenarios in which the recipient receives an e-mail claiming that malware has been installed on their computer that is tracking their camera and passwords, and demanding payment or the hacker will make public potentially embarrassing or even criminal image or video files.

IT security firm SophosLab has published a report on the sextortion schemes of ‘porn scammers’, explaining how they work and how not to become a victim. 

According to the report, sextortion schemes work by a scenario in which a recipient gets an email that claims that malware has been installed on their computer that has gained access to images and video from the camera and browser history.

The extortion demand is typically somewhere from $700 to $4000, payable to a Bitcoin address provided in the email, SophosLab said, noting that porn scammers who use the scenario have been known to make up to $100,000 in a month. 

The scenario is completely fake, however, although the scammers include passwords into the email as “proof” that they have hacked the victim’s computer. The password displayed can often turn out to be one that a victim actually once used or still uses. 

These passwords, not gained from accessing the victim’s computer, however, should nonetheless immediately be changed if they are still being used.

There is no single source of the spam emails, as they can be spoofed to appear to come from different countries and servers. It has been revealed that most sextortion spam comes from innocent users whose computers have been infected with a piece of spam-sending malware known as a bot that sends the emails independently. 

The best way to counteract the spam schemes is to ensure that your computer has not been infected with a bot and change your passwords.

Sourse: sputniknews.com

No votes yet.
Please wait...

Leave a Reply

Your email address will not be published. Required fields are marked *