{"id":25070,"date":"2018-12-21T09:00:13","date_gmt":"2018-12-21T14:00:13","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=25070"},"modified":"2020-05-18T08:35:59","modified_gmt":"2020-05-18T12:35:59","slug":"extortion-spam","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/extortion-spam\/25070\/","title":{"rendered":"Blackmail demand claims to have nailed you watching porn"},"content":{"rendered":"<p>One fine (or not so fine) day, you check your inbox and discover a message that starts like this:<\/p>\n<p>\u201cI\u2019m aware, ********** is your password. You don\u2019t know me and you are probably thinking why you are getting this email, right? Well, I actually placed a malware on the adult video clips (porn) web site\u2026\u201d<\/p>\n<p>Or like this:<\/p>\n<p>\u201cI hacked this mailbox and infected your operating system with a virus\u2026\u201d<\/p>\n<p>Or even:<\/p>\n<p>\u201cI\u2019m part of an international hacker group. As you can guess, your account was hacked\u2026\u201d<\/p>\n<p>All sorts of variants exist, but the message boils down to a claim that the sender infected your computer by hacking your account or placing malware on a porn site you visited. They appear to have harvested your e-mail contacts, social networks, instant messengers, and phone book. They appear to have total access to your device, and they\u2019ve also, it appears, hijacked your webcam to make a video of you watching something.<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/12\/20095436\/extortion-scam-letter-EN.png\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-25071\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/12\/20095436\/extortion-scam-letter-EN.png\" alt=\"This is what a porn-extortion message might look like\" width=\"1460\" height=\"928\"><\/a><\/p>\n<p>The cybercriminals threaten to send the video to all of your friends and colleagues. The only way to stop them, they say, is to transfer a specified sum of cryptocurrency to an anonymous wallet.<\/p>\n<p>Some scammers give you only a few days, claiming to know exactly when you opened the e-mail, which supposedly contains a <a target=\"_blank\" href=\"https:\/\/www.wired.com\/story\/how-email-open-tracking-quietly-took-over-the-web\/\" rel=\"noopener noreferrer nofollow\">tracking pixel<\/a> that lets them monitor the message\u2019s status. In some cases, as part of their effort to convince you of the <a target=\"_blank\" href=\"https:\/\/www.bleepstatic.com\/images\/news\/security\/e\/extortion-scams\/adult-site-scam\/email-scam.jpg\" rel=\"noopener noreferrer nofollow\">existence of a compromising video<\/a>, you are asked to reply to the message, whereupon the scammers say they will send the video to a selection of your contacts.<\/p>\n<p>Of course, they say if payment is made, they\u2019ll immediately destroy the video and the database of your contacts.<\/p>\n<h3>Calm down, no one\u2019s filmed you<\/h3>\n<p>In reality, there is no omnipotent \u201cvirus\u201d or shameful video. How does someone know your password? Simple: The blackmailer has got hold of one of the many databases of user accounts and passwords available on the darknet, leaked from a variety of online services. Alas, such leaks are not uncommon \u2014 in the United States alone, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/data-leaks-2017\/19723\/\" rel=\"noopener noreferrer nofollow\">no fewer than 163 million user records were compromised<\/a> in just the first three quarters of 2017.<\/p>\n<p>As for \u201cknowing\u201d that you\u2019ve been viewing adult content, it\u2019s a shot in the dark. The e-mail you received was sent to thousands, perhaps millions of people, with the addressee\u2019s password (and other personal details) automatically merged into the message from the database. Even if only a few dozen recipients pay up, that will be more than enough for the scammer.<\/p>\n<p>The same goes for the promise to send a video to some of your friends as proof. Few people would want to verify the existence of such delicate material in this manner. Most would prefer not to risk even a limited disclosure of this kind of secret.<\/p>\n<h3>Ransom message \u2014 with a bonus Trojan encryptor<\/h3>\n<p>Recently, scammers have come up with an even more effective way to make victims pay up: In early December, researchers at Proofpoint found a spam wave <a target=\"_blank\" href=\"https:\/\/www.zdnet.com\/article\/those-annoying-sextortion-scams-are-redirecting-users-to-ransomware-now\/\" rel=\"noopener noreferrer nofollow\">offering victims to personally verify the existence of an embarrassing video<\/a> without involving family and friends. All they had to do was follow the link in the message.<\/p>\n<p>Naturally, no video appeared. Instead, users were prompted to download a ZIP archive, which if unpacked and run really did infect the system \u2014 big time.<\/p>\n<p>Don\u2019t worry, cybercriminals still won\u2019t be filming you watching porn. What they do, however, is encrypt your files with the <a target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/gandcrab-ransomware-distributed-by-exploit-kits-appends-gdcb-extension\/\" rel=\"noopener noreferrer nofollow\">GandCrab malware<\/a>, and demand more ransom \u2014 this time, to recover your data.<\/p>\n<h3>How to stay safe<\/h3>\n<p>To avoid falling victim to ransomware scammers, we advise being cautious and following a few simple steps. Here\u2019s what you <em>don\u2019t<\/em> want to do:<\/p>\n<ul>\n<li>Don\u2019t panic.<\/li>\n<li>Don\u2019t pay the ransom.<\/li>\n<li>Don\u2019t respond to ransom e-mails \u2014 you will only validate your address and attract more.<\/li>\n<li>Don\u2019t follow links in such messages. At best, you\u2019ll get bombarded with shady ads, and you might even infect your machine with a virus, now for real.<\/li>\n<\/ul>\n<p>What to do:<\/p>\n<ul>\n<li>Note the password sent in the ransom e-mail, and change it immediately on any websites where you use it. While you\u2019re at it, choose a stronger password.<\/li>\n<li>Use a reliable password manager, such as <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Password Manager<\/a>, to store your strong, hard-to-remember passwords.<\/li>\n<li>Install a <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">trusty antivirus<\/a> to keep malware off your system and set to rest any worries about <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-security-2018\/17981\/\" rel=\"noopener noreferrer nofollow\">webcam hijacking<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-porno-try\">\n","protected":false},"excerpt":{"rendered":"<p>They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don\u2019t pay! We explain how this scam works.<\/p>\n","protected":false},"author":2484,"featured_media":25709,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683,9],"tags":[3106,80,1566,420,240,422,131],"class_list":{"0":"post-25070","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-extortion","10":"tag-fraud","11":"tag-porn","12":"tag-ransomware","13":"tag-spam","14":"tag-threats","15":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/extortion-spam\/25070\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/extortion-spam\/14964\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/extortion-spam\/12545\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/extortion-spam\/16896\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/extortion-spam\/15093\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/extortion-spam\/13904\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/extortion-spam\/17594\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/extortion-spam\/16738\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/extortion-spam\/21894\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/extortion-spam\/5529\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/extortion-spam\/11292\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/extortion-spam\/11200\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/extortion-spam\/10202\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/extortion-spam\/18287\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/extortion-spam\/23581\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/extortion-spam\/17769\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/extortion-spam\/21853\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/extortion-spam\/21801\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/fraud\/","name":"fraud"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=25070"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25070\/revisions"}],"predecessor-version":[{"id":35577,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25070\/revisions\/35577"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/25709"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=25070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=25070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=25070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}