Sextortion Scam — How to Evade and Protect Yourself From It

This article has been created in order to help you by explaining to you how to remove the Sextortion Scam which can be encountered via email messages.

The Sextortion scam is a new malicious tactic that is used against computer users worldwide. It ims to blackmail users by containing sensitive information about them (usually stolen).

Threat Summary

NameSextortion Scam
Type Scam / Malware
Short DescriptionThis scam uses harvested or stolen information about the users and blackmails them to pay money to the operators.
SymptomsReceived blackmail messages.
Distribution MethodVia e-mail messages that imitate legitimate email notification messages .
Detection Tool See If Your System Has Been Affected by Sextortion Scam

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Sextortion Scam.

Sextortion Scam – Overview

The Sextortion scam is a new hacker tactic that attempts to blackmail computer users worldwide. The main tactic relies on the use of email messages. They are orchestrated to send out the messages in groups. There are two possible case scenarios:

  • Phishing Messages — The email messages can be sent from addresses that appear to be legitimate security companies. They may insert details that can correlate with the user’s identity or insert elements that are taken from well-known services, software or sites.
  • Anonymous Messages — The email messages can be sent from anonymous domains, hacked accounts or other similar methods. The operators can send out many messages at once to raise attention to them.

Another method used by the criminals is the use of scripts and redirect code. They are generally distributed on various sites using redirects, banners, pop-ups or in-line hyperlinks. Clicking on malicious forms and filling in email details can lead to the email generation.

The other distribution tactic relies on the creation of malicious sites. The controllers can (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | authored by Martin Beltov. Read the original post at: