Wednesday, August 10, 2022
  • How Stolen Credentials and Ransomware are a Simultaneous Threat
  • VERT Threat Alert: August 2022 Patch Tuesday Analysis
  • Microsoft Patch Tuesday, August 2022 Edition
  • Debunking IAST myths
  • Hybrid Identity Protection with Denis Ontiveros Merlo

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Events
    • Upcoming Events
    • Upcoming Webinars
    • On-Demand Events
    • On-Demand Webinars
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About Us

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Data Security SBN News Security Bloggers Network 

Home » Cybersecurity » Data Security » New Sextortionist Scam Uses Email Spoofing Attack to Trick Users

SBN

New Sextortionist Scam Uses Email Spoofing Attack to Trick Users

by David Bisson on October 12, 2018

A new sextortionist scam is using spoofing techniques to trick users into thinking that digital attackers have compromised their email accounts.

DevOps Connect:DevSecOps @ RSAC 2022

As reported by Bleeping Computer, an attack email belonging to this ploy attempts to lure in a user with the subject line “[email address] + 48 hours to pay,” where [email address] is their actual email address. The message informs them that they were infected with a virus sometime between 30 July 2018 and 9 October 2018 after they supposedly visited a malicious website. Through this fake infection, the bad actors claim to have gained access to the user’s “messages, social media accounts, and messengers.” They also state that they were able to access the user’s webcam and record the user while they were watching adult content online.

The attackers ultimately demand that the user pays $800 in bitcoin or has their messages and recorded videos sent to their email account’s contacts. As of 11 October, users had deposited 0.49179786 bitcoins (approximately $3,054) into the bitcoin wallet operated by the attackers.

Below is an example of the attack email sent out by this sextortionist scam variant.

An attack email sent out by this scam variant. (Source: Bleeping Computer)

As in other recent sextortionist scam variants, the individuals behind these attack emails are just bluffing. They don’t have access to users’ email accounts. They’re sending spoofed messages that appear to come from someone else.

The first instance of this scam variant surfaced in the Netherlands, where attackers made off with €40,000. Not long afterward, a security researcher known as “SecGuru” discovered an English variant of the ruse.

SecGuru told Bleeping Computer that email providers can help protect users with Sender Policy Framework (SPF) and Domain-based Message Authentication, Reporting and Conformance (DMARC) frameworks that lock down (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/sextortionist-scam-uses-email-spoofing-attack-to-trick-users/

October 12, 2018October 12, 2018 David Bisson IT Security and Data Protection, Latest Security News, scam, sextortionist, spoofing
  • ← Introduction to Verifiable Delay Functions (VDFs)
  • Google+ ending and CA is no state for weak passwords | Avast →

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Most Read on the Boulevard

US Emergency Alert System Has ‘Huge Flaw’ — Broadcasters Must Patch NOW
Upskilling is Critical to Closing Cybersecurity Skills Gaps
8 Questions Cybersecurity Pros Should Ask Hiring Managers
Suffering From a Surfeit of Security Tools
Slack App Leaked Hashed User Passwords for 5 YEARS
SOC 2 Compliance: Q&A with Compliance and Security Expert David Carter
What You Need to Know About Ransomware in AWS
How to detect Log4j vulnerabilities in Java projects for free with CodeSec
Say it Ain’t So Mom! Back to School Shopping & Retail Cybersecurity
What are Chinese APT groups up to?

Upcoming Webinars

Wed 17

Code Tampering: Four Keys to Pipeline Integrity

August 17 @ 1:00 pm - 2:00 pm
Mon 22

API Security

August 22 @ 1:00 pm - 2:00 pm
Wed 24

Implementing Identity Access Prioritization and Risk-Based Alerting for High-Fidelity Alerts

August 24 @ 1:00 pm - 2:00 pm
Tue 30

CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together

August 30 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

Managing the AppSec Toolstack

Industry Spotlight

MiCODUS Car Trackers are SUPER Vulnerable and Dangerous
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security DevOps Editorial Calendar Featured Identity & Access Identity and Access Management Incident Response Industry Spotlight IoT & ICS Security Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

MiCODUS Car Trackers are SUPER Vulnerable and Dangerous

July 21, 2022 Richi Jennings | Jul 21 0
How AI Secures the Future of Digital Payments
Application Security Cloud Security Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

How AI Secures the Future of Digital Payments

July 18, 2022 Natasha Lane | Jul 18 0
HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Identity & Access Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

June 17, 2022 Richi Jennings | Jun 17 Comments Off on HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

Top Stories

Twilio Fails Simple Test — Leaks Private Data via Phishing
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security DevOps Featured Governance, Risk & Compliance Identity & Access Incident Response Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Twilio Fails Simple Test — Leaks Private Data via Phishing

August 9, 2022 Richi Jennings | Yesterday 0
GitHub Zero-Day: From 35K Repos Compromised to False Alarm
Application Security Cybersecurity Featured Incident Response Malware News Security Boulevard (Original) Spotlight Threat Intelligence Vulnerabilities 

GitHub Zero-Day: From 35K Repos Compromised to False Alarm

August 8, 2022 Gabriel Liechtman-Manor | 1 day ago 0
Slack App Leaked Hashed User Passwords for 5 YEARS
Analytics & Intelligence API Security Application Security Cloud Security Cybersecurity Data Security DevOps Editorial Calendar Featured Identity & Access Incident Response Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Slack App Leaked Hashed User Passwords for 5 YEARS

August 8, 2022 Richi Jennings | 1 day ago 0

Security Humor

XKCD ‘Scientific Field Prefixes’

XKCD ‘Scientific Field Prefixes’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Techstrong Research
  • Techstrong TV
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
  • Digital Anarchist
Powered by Techstrong Group
Copyright © 2022 Techstrong Group Inc. All rights reserved.