Scam of Sextortion Is on the Rise: How to Avoid Scammers Who Claim to Have Proof of You Watching Adult Content by 30Seconds Mom

Tech Headlines
4 years ago

Scam of Sextortion Is on the Rise: How to Avoid Scammers Who Claim to Have Proof of You Watching Adult Content

The latest report from cybersecurity company Symantec shows that extortion scams are on the rise. The company blocked almost 300 million emails of this type in the first five months of 2019. The time-tested scams are making a comeback with new variations, and sextortion is currently the most popular technique to use against internet users.

According to a report by The Hacker News, a decade-old Phorpiex botnet, which currently controls over 450,000 computers worldwide, has recently been sending sextortion emails. The compromised machines are used as proxies to dispatch over 30,000 blackmail messages per hour. Each individual spam campaign can cover up to 27 million potential victims.

“We notice a trend of scammers getting more creative. In a typical sextortion message, anonymous blackmailers would say they have a visual proof of you watching adult content. Now, they have started including passwords or mobile phone numbers in the subject line to scare their potential victims even more,” says Daniel Markuson, the digital privacy expert at NordVPN.

Symantec’s study also found out that criminals often translate extortion messages into foreign languages. Markuson says that “even though a text received from scammers looks real and personal, it usually isn’t. Most of the time, those threats are badly translated with Google Translate and sent to thousands of potential victims.”

What Is Sextortion?

In sextortion scams, fraudsters threaten people to share compromising photos or videos of them watching adult content unless the victims pay a ransom. Sextortion is often carried out through email, social media or text messages, and the scammers demand payments in cryptocurrencies. Usually, the extortionists claim that they’ve installed a program on a porn website and tracked the victim accessing its content. They might also say they have gotten access to the victim’s web camera.

To make their messages more credible, the criminals have started to reveal their victims’ breached credentials, such as usernames, passwords or contact details. They usually obtain this information from the dark web, which is full of leaked accounts or any recent password dumps. Extortionists’ claims about having compromising material are false in the majority of cases. However, sometimes victims still pay the ransom to avoid huge embarrassment as blackmailers threaten to expose illicit information to everyone on their contact list.

How to Protect Yourself From Sextortion Scams

Markuson says that sextortion emails are all about fear and urgency. Therefore, it is essential to stay calm if one of them finds its way into your inbox. “You should never pay extortionists. If you send them money, the requests will likely never stop. Before you send any funds to the scammers, contact the relevant authorities, who will help you in this uncomfortable situation."

Markuson explains the best practices on how to save yourself from sextortion attacks:

  • Don’t open phishing emails and click on dodgy links. In other words, always ignore scammers. If you’ve received such an email, don’t panic. You shouldn’t reply but mark the message as spam instead. Don’t download any attachments or click on any links as these might contain malware. In case the email contains any of your identifiable personal information, it is recommended to report it to the police.
  • Check if your passwords have been leaked. Extortionists use hacked passwords to make their messages seem more credible. To know if any of your accounts have been compromised and your passwords leaked, Markuson recommends checking Have I Been Pwned. If any email you receive from strangers includes your password, simply go and change it on the account it came from.
  • Always protect your accounts with strong and unique passwords. To make things easier for you, use password managers.
  • Disable or cover your webcam. That’s the easiest way to protect yourself from scammers who claim to have any visual evidence of your activity. Either physically cover your webcam (don’t forget about those installed on your laptop or smartphone) with a piece of tape or disable it through settings.
  • Use antivirus and a VPN. These tools will protect your devices from malware and man-in-the-middle attacks. Make sure your gadgets have antivirus software installed and update it regularly. If your device is new or hasn’t been infected with malware before, a VPN is a perfect solution for your security. According Markuson, VPNs, such as NordVPN, secure all your online connections. If some hackers try to get into your computer and access its webcam, they will face a wall of strong encryption. Just remember to always keep your VPN active when using the internet.

Take 30 seconds and join the 30Seconds community. Inspire and be inspired.

Related Products on Amazon We Think You May Like:

30Second Mobile, Inc. is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.

Online Safety: The Most Dangerous Apps & Social Media Sites for Kids

New Year, New Digital You: Protect Your Privacy Online With These Tips From the National Cyber Security Alliance

"Parenting In the Digital Age": Parents Discuss Cyber Bullying, Screen Time, Parenting Styles & More!

Children & Media: 12 Tips From the American Academy of Pediatrics to Help Parents Manage Kids in Today's Digital World

Elisa Schmitz
They're using robo-calls to do this as well. Be aware, folks! Thanks for sharing this.
Try Belong . It combines NFT membership, content and events to c Try Belong . It combines NFT membership, content and events to c
Beyond SquadUP's traditional use of event management, their collaboration with Sidechain opened up a new dimension. They have delved into blockchain technology, specifically NFT ticketing. The platform built on the Solana blockchain allows event organizers to auction NFT tickets. Attendees can convert tickets to NFTs using the Proof of Presence (POAP) protocol. This groundbreaking move, combined with the presence-earnings model, promises to revolutionize the way we think about ticket sales and event attendance dynamics. To delve deeper into these revolutionary initiatives, check out the squad up review article there. It's an informative read for those intrigued by the intersection of technology and live events

join discussion

Please login to comment.

recommended tips

Happy International Women’s Day: Celebrating Women's Achievement & Driving Gender Equality

Volunteering: Gain Marketable Jobs Skills Through Helping Others!