Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/30/2019
08:00 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Sextortion Email Scams Rise Sharply

Cybercriminals are increasingly trying to trick people into paying ransoms by threatening to expose compromising activities to friends and family.

Email scams in which cybercriminals attempt to extort money from victims by threatening to reveal something embarrassing about them are on the rise.

According to Symantec, between January and the end of May this year, it blocked some 289 million scam emails, many of them involving so-called "sextortion" attempts. Of these, about 30% were sent during a 17-day period around Valentine's Day. The blocked emails were written in English and a dozen other languages, including Chinese, German, Italian, and Japanese.

Sextortion is a type of email scam where cybercriminals attemps to extort money from individuals by claiming to have a recording of them engaged intimate acts. Often the scam email informs victims that their webcams were hacked and used to make recordings of them visiting porn sites.

Attackers demand that victims send a specified amount of money in Bitcoin or other cryptocurrency — or risk having the alleged recordings sent to every contact in their address books. The emails convey a sense of urgency by demanding the victims pay the extortion amount with 24 or 48 hours.

The scam emails often include passwords and phone numbers recipients may have used or are currently using to give the impression the attackers have access to a lot of their personal information. The goal is make users fear their computers might have actually been hacked and used to observe potentially compromising actions.

In reality, the criminals likely obtained the data from one of the many large password dumps that have happened in recent years, Symantec said. In some cases, attackers have purported to be members of law enforcement who have discovered child pornography on victims' computers.

Not all email scams that Symantec blocked in the first five months of this year were sextortion-themed. Several were bomb-scare emails where the sender claimed to have planted a bomb in a building that would be triggered unless the requested amount is paid in full.

The scam emails typically followed the same pattern with relatively minor variations in the messages. Some, for instance, included PDF attachments, others had links pointing to malicious sites, while some contained obfuscated text and other characters designed to evade spam filters. Users opening the attachments or clicking on the URLs to see the purported recording of their activities often ended up downloading malware on their systems.

Easy Payoff
For cybercriminals, mounting such scams is easy because all it involves is sending a spam email, says Kevin Haley, director of security response at Symantec. "You can take a new idea, throw it against the wall, and see if it works. If not, move on to the next idea," he says.

Blackmailing people over their alleged sexual activity is not new. But the abundant email lists and credential data available on the Dark Web these days has made it relatively easy for attackers to launch convincing-looking scam campaigns, Haley notes. Often victims are tricked into believing attackers might have gathered personally compromising information.

"For the amount of effort and skill that is required to carry out these scams, it's a solid return on investment [for attackers]," Haley says. Symantec estimates that the 5,000 most-seen Bitcoin addresses received a total of about $106,240 in May. "If we take that number as the average amount to make in a 30-day period for these kinds of scams, that's just over $1.2 million in a year," Haley says.

For the most part, sextortion scams are consumer-focused. But reports about attackers using spear-phishing emails to target individuals in corporate settings have come out as well. For instance, earlier this year researchers from Barracuda Networks analyzed some 360,000 spear-phishing emails and found one in 10 involved sex-themed blackmail.

Barracuda found that the subject lines on a majority of sextortion emails contained some form of security alert and often included the victim's email address or password, too.

Though sextortion scams are twice as likely as business email scams in a corporate setting, they are often under-reported because of the intentionally embarrassing and sensitive nature of the content, Barracuda discovered. IT teams often are unaware of these attacks because employees don't report them regardless of whether they paid the demanded ransom.

For enterprises, the increase in sextortion and other scams highlight the need for strong email security controls, Haley says. "If these threats do not hit the end users' mailbox, then they do not become an issue," he notes. "Additionally, organizations need to educate their employees on the existence of these threats so they do not get fooled."  

Related Content:

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
7/30/2019 | 9:08:53 AM
LINKED IN PROFILES
Are becoing quite real - used to be just a hot pic and a single job but now they are acting like employed with a ton of friends and look legit ---- then within a few texts they develop profound feelings and later on ask for money for their ailing father;  Total scam.
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17103
PUBLISHED: 2020-01-27
An Incorrect Default Permissions vulnerability in the BDLDaemon component of Bitdefender AV for Mac allows an attacker to elevate permissions to read protected directories. This issue affects: Bitdefender AV for Mac versions prior to 8.0.0.
CVE-2020-8009
PUBLISHED: 2020-01-27
AVB MOTU devices through 2020-01-22 allow /.. Directory Traversal, as demonstrated by reading the /etc/passwd file.
CVE-2019-17100
PUBLISHED: 2020-01-27
An Untrusted Search Path vulnerability in bdserviceshost.exe as used in Bitdefender Total Security 2020 allows an attacker to execute arbitrary code. This issue does not affect: Bitdefender Total Security versions prior to 24.0.12.69.
CVE-2019-17102
PUBLISHED: 2020-01-27
An exploitable command execution vulnerability exists in the recovery partition of Bitdefender BOX 2, version 2.0.1.91. The API method `/api/update_setup` does not perform firmware signature checks atomically, leading to an exploitable race condition (TOCTTOU) that allows arbitrary execution of syst...
CVE-2017-16112
PUBLISHED: 2020-01-27
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs:CVE-2017-15010. Reason: This candidate is a reservation duplicate of CVE-2017-15010. Notes: All CVE users should reference CVE-2017-15010 instead of this candidate. All references and descriptions in this candidate have been removed to preven...