Sunday, December 8, 2019
  • When Will Blockchain Technology Be a Game-Changer?
  • Single Sign-On (SSO) vs Active Directory (AD)
  • Ransomware at Colorado IT Provider Affects 100+ Dental Offices
  • Social Engineers are No Match for Artificial Intelligence
  • The Changing Landscape of Customer Acquisition, Engagement and Retention in 2020

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Data Security Identity & Access SBN News Security Bloggers Network 

Home » Cybersecurity » Data Security » Sextortion Scams Using Redacted Phone Numbers to Demand Payment

Sextortion Scams Using Redacted Phone Numbers to Demand Payment

by David Bisson on August 16, 2018

Sextortion scammers are now using potential targets’ redacted phone numbers in an attempt to trick them into submitting payment.

Perhaps after having obtained a list that ties people’s phone numbers and email addresses together, scammers are sending out sextortion emails that use redacted phone numbers to lure in victims. Here’s an example, as disclosed by Naked Security:

It seems that, +1-555-xxx-xx55, is your phone number. You may not know me and you are probably wondering why you are getting this e mail, right?

. . .

I backuped phone. All photo, video and contacts.

I created a double-screen video. 1st part shows the video you were watching (you’ve got a good taste haha . . .), and 2nd part shows the recording of your web cam.

exactly what should you do?

Well, in my opinion, [AMOUNT FROM $100-$1000 THIS TIME] is a fair price for our little secret. You’ll make the payment by Bitcoin (if you do not know this, search “how to buy bitcoin” in Google).

Of the 5,000 instances of this scam received by Naked Security, many had the same five digits redacted, though there were a few with all but the last four digits censored.

Each of the scam messages directed victims to transfer Bitcoin to one of three addresses. At the time of publication, those addresses showed 20 payments ranging in value from $1 to $1000. It’s unclear whether those payments were directly related to the scam.

The emergence of this ploy hasn’t stopped sextortion fraudsters from using breached passwords to demand payment from users, either. Wendy Nather, Director of Advisory CISOs at Duo Security, confirmed as much on Twitter.

So far this week I’ve gotten 23 spam extortion emails from the same lame sender who can’t make their script work. All of the fake sender names are female, (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/sextortion-scams-using-redacted-phone-numbers-to-demand-payment/

August 16, 2018August 16, 2018 David Bisson IT Security and Data Protection, Latest Security News, Password, scam, sextortion
  • ← Nine Steps to better File Auditing
  • Avast research finds at least 32,000 smart homes and businesses at risk of leaking data | Avast →
Featured Blog

Enzoic

Automate Password Policy & NIST Password Guidelines

Enzoic

Old vs. New Methods for Employee Password Hardening

Enzoic

Shop Safely This Cyber Monday

Enzoic

Disney and the Password Reuse Problem

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns
Are Passwords Now Passé?
Learning From Health Care’s IoT Security Strategy
Why You Need PAM and VPAM in 2020
Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)
Biggest 2019 data breaches: Some of the worst of the worst
The Ultimate Hacker Movies List for 2020
Cyber Security Roundup for November 2019
Uncovering vulnerabilities in Cryptographic libraries: Mayhem, Matrixssl, and WolfSSL
Data Protection in the Digital Transformation Era

Upcoming Webinars

Mon 09

Cloud Security – Keeping Serverless Data Safe

December 9 @ 11:00 am - 12:00 pm
Tue 10

Securing Mobile Apps, From the Inside Out

December 10 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

The Next Generation of Application Security

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Learning From Health Care’s IoT Security Strategy
Cybersecurity Industry Spotlight IoT & ICS Security Security Boulevard (Original) 

Learning From Health Care’s IoT Security Strategy

December 6, 2019 Mike Nelson | 2 days ago 0
Why You Need PAM and VPAM in 2020
Cybersecurity Identity & Access Industry Spotlight Security Boulevard (Original) 

Why You Need PAM and VPAM in 2020

December 5, 2019 Tony Howlett | 3 days ago 0
Cybersecurity Identity & Access Industry Spotlight Security Boulevard (Original) 

Are Passwords Now Passé?

December 4, 2019 Ori Eisen | 4 days ago 0

Top Stories

Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)
Cybersecurity Endpoint Featured Mobile Security News Security Boulevard (Original) Spotlight Threats & Breaches 

Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)

December 6, 2019 Richi Jennings | 1 day ago 0
StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns
Cybersecurity Data Security Featured Malware Mobile Security News Security Awareness Security Boulevard (Original) Spotlight 

StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns

December 3, 2019 Richi Jennings | 4 days ago 0
TrueDialog Leaks 600GB of Personal Data, Affecting Millions
Cloud Security Cybersecurity Data Security Featured Governance, Risk & Compliance News Security Boulevard (Original) Spotlight 

TrueDialog Leaks 600GB of Personal Data, Affecting Millions

December 2, 2019 Richi Jennings | Dec 02 0

Security Humor

via    the comic delivery system monikered  Randall Munroe  at   XKCD  !

XKCD, Is It Christmas?

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2019 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.