{"id":27146,"date":"2019-06-07T06:00:59","date_gmt":"2019-06-07T10:00:59","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=27146"},"modified":"2019-11-15T06:25:51","modified_gmt":"2019-11-15T11:25:51","slug":"cia-sextortion","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/cia-sextortion\/27146\/","title":{"rendered":"CIA sextortion \u2014 an old scam with a new twist"},"content":{"rendered":"<p>What would you think if you received an e-mail with \u201cCentral Intelligence Agency \u2014 Case #45361978\u201d in the subject line? Would you decide that someone, somewhere had seriously screwed up and accidentally sent you a top-secret file? Or that you\u2019re being recruited for the secret services (well, you never know)? Alas, in either case you would almost certainly be mistaken \u2014 the e-mails in question are just another extortion trick.<\/p>\n<h2>Accused by the CIA of pedophilia<\/h2>\n<p>The author of the e-mails that caught our experts\u2019 collective eye poses as a CIA officer who has allegedly found the recipient\u2019s details in Case #45361978 (relating to possession and distribution of child pornography, or so it seems). The \u201cofficer\u201d states that the CIA is about to swoop in on more than 2,000 individuals suspected of pedophilia in 27 countries around the globe. The message implies that the recipient is accused of being one of them.<\/p>\n<p>The scammer is kind enough to reveal the scope of the information the department has: apparently not only the victim\u2019s name, phone number, and e-mail, but also home and work addresses and information about relatives (supposedly obtained from a range of sources, including ISP, online chats, and social networks).<\/p>\n<p>The cybercriminal allegedly has access to the case file and can help prevent arrest by deleting the compromising information. However, the victim will have to pay $10,000 in bitcoin for this. There\u2019s not much time to mull it over \u2014 the first arrests are allegedly due to commence in a couple of weeks, and for the kind-hearted CIA employee to be of assistance, the money needs to be transferred within nine days.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/06\/03104230\/cia-sextortion-screenshot.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-27179\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/06\/03104230\/cia-sextortion-screenshot.jpg\" alt=\"Sample extortionate e-mail threatening arrest for possession of child pornography\" width=\"1460\" height=\"1931\"><\/a><\/p>\n<h3>Don\u2019t believe the extortionists<\/h3>\n<p>Scam mailings accusing the victim of having a taste for pornography are nothing new. In most cases they concern legal porn, though, and the cybercriminals introduce themselves as hackers in their typo-infested messages threatening to expose your immoral habits to friends and colleagues.<\/p>\n<p>Compared with regular sextortion spam, the \u201cCIA\u201d message is well-written, with grammatically correct, stylistically restrained language in a quite official-sounding tone. The scammers also took care of the layout: The message text is nicely formatted and easy to read, and the effect is amplified by the CIA emblem staring out from the screen.<\/p>\n<p>However, just because the message looks more imposing doesn\u2019t make it more true. Don\u2019t be offended, but the CIA is unlikely to give a hoot about you. The scammers most likely found your e-mail address in a database leaked online, or even just came across it by chance.<\/p>\n<p>Most likely, they have no information about you at all. Such messages are sent to thousands or even millions of people in the hope that just a handful will swallow the bait. Given the size of the ransom, if even a few victims pay up, it will have been worth the cybercriminals\u2019 time and effort.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n<h3>Don\u2019t panic<\/h3>\n<p>If you get an e-mail seemingly from the CIA, the most sensible thing to do is trash it immediately. The likelihood that someone at Langley has you on their radar is infinitesimally low. However, if curiosity takes over and you do read it, our number one tip is not to panic.<\/p>\n<ul>\n<li>Never pay scammers; that would only encourage the extortionists even more.<\/li>\n<li>Do not respond to the e-mail, even if you really want to prove to the author that your name is in the \u201ccase file\u201d by mistake. By doing so, you would be confirming that your address is valid and provoke an even greater wave of spam. For the same reason, do not try to troll the scammers.<\/li>\n<li>Close the message and mark it as spam \u2014 this will help the spam filter to do its job better.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Scammers posing as CIA agents demand ransom for alleged possession of child porn, threatening arrest.<\/p>\n","protected":false},"author":2481,"featured_media":27178,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683,9],"tags":[906,3106,80,1566,1639,797,240,422,131],"class_list":{"0":"post-27146","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"category-tips","10":"tag-cia","11":"tag-extortion","12":"tag-fraud","13":"tag-porn","14":"tag-ransom","15":"tag-sextortion","16":"tag-spam","17":"tag-threats","18":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cia-sextortion\/27146\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cia-sextortion\/15858\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cia-sextortion\/13385\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cia-sextortion\/17767\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cia-sextortion\/15911\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cia-sextortion\/14626\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cia-sextortion\/18605\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cia-sextortion\/22809\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cia-sextortion\/11817\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cia-sextortion\/11935\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/cia-sextortion\/10830\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cia-sextortion\/19411\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cia-sextortion\/23376\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cia-sextortion\/18447\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cia-sextortion\/22691\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cia-sextortion\/22640\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/fraud\/","name":"fraud"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/27146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2481"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=27146"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/27146\/revisions"}],"predecessor-version":[{"id":29432,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/27146\/revisions\/29432"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/27178"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=27146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=27146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=27146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}