Sextortion Archives – Gridinsoft Blog https://gridinsoft.com/blogs/tag/sextortion/ Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Fri, 01 Dec 2023 15:37:27 +0000 en-US hourly 1 https://wordpress.org/?v=62936 200474804 What is Sextortion? Explanation, Signs & Ways to Avoid https://gridinsoft.com/blogs/what-is-sextortion/ https://gridinsoft.com/blogs/what-is-sextortion/#respond Fri, 01 Dec 2023 15:37:27 +0000 https://gridinsoft.com/blogs/?p=18051 Sextortion is a specific email phishing tactic that was around for quite some time. Over the last few years though its popularity skyrocketed, and some novice technologies make me concerned regarding possible sextortion approaches in future. Let me explain what I mean, what this scam is about, and how to detect and avoid it. What… Continue reading What is Sextortion? Explanation, Signs & Ways to Avoid

The post What is Sextortion? Explanation, Signs & Ways to Avoid appeared first on Gridinsoft Blog.

]]>
Sextortion is a specific email phishing tactic that was around for quite some time. Over the last few years though its popularity skyrocketed, and some novice technologies make me concerned regarding possible sextortion approaches in future. Let me explain what I mean, what this scam is about, and how to detect and avoid it.

What is Sextortion?

The term “Sextortion” is rather self-explanatory, aside from the fact that this practice has been in use for a pretty long time. That is a type of email scams that aim at money extortion through the threats of publishing explicit visual content with the victim. To look more authoritative, the scammer may claim to have access to the target’s social media accounts.

Professional Hacker Email scam example
Typical example of a sextortion email

Contrary to more classic email phishing scams, the attacker will never ask the victim about an action other than sending a sum of money. The reason for such a generous act is, as the villain assures, its possession over some compromising materials about you. Email text often discloses the way these photos and videos were obtained – from a webcam while you were browsing through adult sites, leaked from the hacked phone, or the like.

All this boils down to a simple demand: send the money or I will leak all these nude videos and pics to the public. Some definitely not exaggerating mates say they will post it from your profile, as they have access to it as well. Though ones who try to look more realistic simply promise to tag your entire friends list on a specific social media.

Are Sextortion Threats Real?

99.5% of the time, they are not. Even though some people can have someone’s nude photos on hand, the number of scam emails exceeds the number of these people by orders of magnitude. And since such graphic materials rarely end up in the hands of a stranger, it will be particularly easy to identify the extortionist. This adds up to the generic message text and absence of any proof – some definite signs of a scam. By the way, let’s have a more detailed look at them.

How to detect a Sextortion Scam Email?

Same as any email scam, sextortion bears on 3 psychological tricks: calling for a shock, forcing the feel of vulnerability and feeling of urgency. This leaves its footprint in the text, and eventually makes it somewhat templated in all the scam cases. Let’s review the most popular of them.

Typical Sextortion Email Patterns in Text

With time, there were dozens and hundreds of different text patterns for extortion emails. Most of them, however, are created with the intention of being suitable to any victim. It would be rather uncomfortable for a scammer to adjust the text whenever they target a new group of people. Thus, utterly generic and abstract text with absolutely no personalization is what you would expect from sextortion scams.

Sextortion email template
Sextortion emails are templated, even though the exact text may be different

The sense of shock appears as the stranger says it has your nude photos. Moreover, this guy tries to pose as a “professional hacker”. They boasts of having access to all the browsing history, webcams, online wallets and the like. Why would they do nothing about this info – hijacking accounts, stealing all the money from online wallets? The question is rhetorical.

Urgency to the situation appears due to the “deadline” you should pay the ransom before. As the hacker says, any negotiations and stuff are not possible, and failing the payment date will end up with publishing all the materials. Some crooks also say things like “this is not my email so I will stop using it shortly after”. This creates even bigger concerns about the inability to avoid public shame.

Sure enough, the same methods may be used by someone whose threats are real. But they never follow the pattern, at least not that straightforward. This distinguishes a letter written by a real human from a tool of scammers, designed to fit any circumstances.

Check For A Re-Used Crypto Wallet

As sextortion scams are running in “waves”, you are most likely not the only person who got such an email. Frauds often stick to the exact same text, changing only the crypto wallet they ask to send the ransom to. A simple Google search of the wallet may reveal not just one, but several text patterns used in the same scam wave.

Obviously, when the con actor is real in its threats and is not running this as a business, it will never use someone else’s crypto wallet or the one used in a scam before. Even when a real hacker does something like this (such an occasion happens once in a while) it will never use the same wallet twice. Moreover, “real hackers” rarely opt for Bitcoin as a payment method, preferring cryptos like Monero or DarkCoin. The latter have the anonymizing infrastructure that is so heavily demanded when you are going outlaw.

AI-fueled Sextortion Scams Incoming

All in all, sextortion is a rather old scam that was not really effective over the last few years. People are aware about it, and there is almost no way this is real after all. This is true, but over the last few years, there is a huge risk of sextortion scams being resurfaced with a force yet unseen. Let me explain.

AI undressing services
Undressing AI is galloping, and its potential use in malicious affairs is just a question of time

The current AI development is exciting. But what is more mind-boggling is the number of malignant implementations for this potential. In particular, we are talking about their photo editing capabilities. There are quite a few AI services even these days that will edit the clothing out of the picture of a person you’ve uploaded. Combine this ability with sextortion scams and the fact that most people share their normal photos without any doubt – and you receive fuel for a new, unpredictably powerful scam wave.

Scammers who stand behind sextortion emails will finally stop extorting money for nothing. This time, they may get not only a manipulative text, but things to prove their claims with. And, if you ignore the demand, they will post them somewhere. There’s still no reason to believe in their tails about access to all your accounts, but dumping the photos while tagging all your friends list may still be effective.

Sure, it is rather easy to prove the AI origin of images and videos. But the very fact of these images’ existence may throw people into panic. This will eventually force them to pay the ransom – which still does not guarantee that the scammer will not publish these fake photos. And even when you remain calm and ignore all the threats, it may be bothersome to prove that these nude photos of yours are just a hallucination of a vicious neural network.

How to protect yourself from email scams?

Well, that is not an easy question to answer. As I’ve just explained, things are getting complicated, and there is no well-rounded advice for the most modern cases. However, I took my time to think through the possible mitigation options for the majority of situations.

Control sharing your personal email address. While benign services try to keep their customers’ info private, there are enough services that do not care. Some shady forums, torrent tracking sites, websites with cracked software – they will gladly sell databases of their users’ emails to someone. Then, these databases are used to spam people and spread scams, including sextortion. Avoid leaving any personal info in such places, or at least do not use your personal email for authorization purposes.

Keep your head cold. A thing all extortionists rely on is your panic actions upon realization that someone may publish inappropriate graphic content with you online. You, in turn, should not do any emotional acts – that will save you both money and gray hair.

Change all your passwords. This is mostly for good measure, as only a few cases out of thousands of sextortion scams could really boast having your passwords leaked. Though, the very habit of updating your login credentials is a great enhancement to your personal cybersecurity.

Warn your friends, colleagues and relatives about a fake video. By announcing preventively that a provocative video can appear, you minimize the initial shock it may create. After that, all the fake video will do is call friendly laughs, avoiding shame or arguments. Even if the scammer is kidding and there is no graphic material in its possession, even a fake one, this will uplift the awareness of such cases.

What is Sextortion? Explanation, Signs & Ways to Avoid

The post What is Sextortion? Explanation, Signs & Ways to Avoid appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/what-is-sextortion/feed/ 0 18051
FBI experts say that this year “sextortion” brought scammers more than $8 million https://gridinsoft.com/blogs/fbi-experts-say-about-sextortion/ https://gridinsoft.com/blogs/fbi-experts-say-about-sextortion/#respond Tue, 07 Sep 2021 16:37:55 +0000 https://blog.gridinsoft.com/?p=5900 Experts from the FBI Internet Fraud Complaints Center (IC3) spoke about the activation of fraudsters in the field of the so-called “sextortion”. To denote such activity, the term sextortion is used, derived from the words sex and extortion. This tactic involves intimidating users: as a rule, such scammers send out spam, in which they try… Continue reading FBI experts say that this year “sextortion” brought scammers more than $8 million

The post FBI experts say that this year “sextortion” brought scammers more than $8 million appeared first on Gridinsoft Blog.

]]>
Experts from the FBI Internet Fraud Complaints Center (IC3) spoke about the activation of fraudsters in the field of the so-called “sextortion”.

To denote such activity, the term sextortion is used, derived from the words sex and extortion. This tactic involves intimidating users: as a rule, such scammers send out spam, in which they try to convince their victims that they have some compromising images or videos, and demand a ransom.

According to IC3, in the first half of 2021, users lost approximately $8,000,000 due to such attacks. That is, as of July 31, law enforcement agencies received more than 16,000 complaints, almost half of which were submitted by victims in the 20-39 age group. For comparison, for the entire 2020, there were about 23,000 such complaints.

Victims over 60 years old make up the third highest reported age group, while victims under the age of 20 made the least number of complaints.FBI analysts said.

Law enforcers write that sometimes attackers change tactics and, in more rare cases, do not demand money as a ransom, but additional explicit images and even sexual services.

Most victims report that the initial contact with the scammer was mutual, through dating sites or apps. Soon after they meet, the scammer offers to transfer communication from the site or from the application to another messaging platform. There, the fraudster initiates the exchange of sexually explicit material, and then encourages the victim to take part in a video chat or send their own sexually explicit photos. Immediately after the victim agrees, the scammer begins to blackmail it and demands money to prevent the publication of these photos or videos on social media. Often, the attacker gains access to social networks or the victim’s contact information and threatens to send images to the victim’s family and friends.

The FBI reminds that users should not send anyone incriminating images, regardless of how the person introduces himself and what he says. Also, do not open any attachments and links obtained from untrusted sources, while electronic devices and webcams should be turned off if they are not in use.

Let me remind you that we also talked about the fact that List of suspects in terrorism that are monitored by the FBI leaked to the network.

The post FBI experts say that this year “sextortion” brought scammers more than $8 million appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/fbi-experts-say-about-sextortion/feed/ 0 5900
TYPES OF MALWARE ON YOUR ANDROID https://gridinsoft.com/blogs/types-malware-android/ https://gridinsoft.com/blogs/types-malware-android/#respond Thu, 13 Jul 2017 13:50:54 +0000 https://blog.gridinsoft.com/?p=503 We all used to the fact that malware only affects the PC, but the more smartphones develop, the more viruses appear for them.  Android viruses and growing number of victims show that you shouldn’t protect only your PC with antivirus. Downloading apps from reliable sources (like Google Play Store or Amazon app) can’t guarantee a… Continue reading TYPES OF MALWARE ON YOUR ANDROID

The post TYPES OF MALWARE ON YOUR ANDROID appeared first on Gridinsoft Blog.

]]>
We all used to the fact that malware only affects the PC, but the more smartphones develop, the more viruses appear for them. 

Android viruses and growing number of victims show that you shouldn’t protect only your PC with antivirus. Downloading apps from reliable sources (like Google Play Store or Amazon app) can’t guarantee a protection of your personal life anymore. Malware for Android is evolving every day and it may lead to huge consequences, as the phone is always with you. It can track where are you going, where is your home and when you are not there, that gives criminals an opportunity to steal not just your data but rob your home. Forewarned is forearmed, we have started a new category on our blog – Malware on Android.

Firstly let’s figure out what malware is.

Malware, short for malicious software, is any program or file that is harmful to a user’s device. Malware includes computer viruses, worms, Trojan horses and spyware. It was created for one goal –  to make money on you.

It can damage your device, get access to your personal information (including bank account and personal data) or encrypt all files.

TYPES OF MALWARE ON ANDROID:

  »  Ransomware

The most popular type of virus now. Everyone has already heard about WannaCry, Petya, Spora and other ransomware. But they infecting only PCs, you may say. Unfortunately, you are wrong.

The biggest Android attack was in 2014. UK and USA users received a message from allegedly FBI, that saying about an illegal activity on this phone with a list of violated federal laws. To unlock the phone you had to pay a fine. For Russians was another scheme – a pop-up on Google Play, that was asking a banking card information to purchase apps.

It looked like a legitimate page on a trusted source, but it wasn’t. Such type of viruses appears regularly, but unfortunately, there are still a lot of people are caught on the hook. To be fear viruses becoming more unpredictable and refined so is it not so easy for a non-expert to define whether it is a malware or no. This is why antivirus is a necessity not only for PC but for your Android device also.

FBI virus Ransomware
Android attacked with  FBI Virus

 

Wait for our next post about malware on Android. Believe me, you will be very surprised how your phone can be hacked without you even noticed it!

The post TYPES OF MALWARE ON YOUR ANDROID appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/types-malware-android/feed/ 0 503