Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/30/2019
08:00 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Sextortion Email Scams Rise Sharply

Cybercriminals are increasingly trying to trick people into paying ransoms by threatening to expose compromising activities to friends and family.

Email scams in which cybercriminals attempt to extort money from victims by threatening to reveal something embarrassing about them are on the rise.

According to Symantec, between January and the end of May this year, it blocked some 289 million scam emails, many of them involving so-called "sextortion" attempts. Of these, about 30% were sent during a 17-day period around Valentine's Day. The blocked emails were written in English and a dozen other languages, including Chinese, German, Italian, and Japanese.

Sextortion is a type of email scam where cybercriminals attemps to extort money from individuals by claiming to have a recording of them engaged intimate acts. Often the scam email informs victims that their webcams were hacked and used to make recordings of them visiting porn sites.

Attackers demand that victims send a specified amount of money in Bitcoin or other cryptocurrency — or risk having the alleged recordings sent to every contact in their address books. The emails convey a sense of urgency by demanding the victims pay the extortion amount with 24 or 48 hours.

The scam emails often include passwords and phone numbers recipients may have used or are currently using to give the impression the attackers have access to a lot of their personal information. The goal is make users fear their computers might have actually been hacked and used to observe potentially compromising actions.

In reality, the criminals likely obtained the data from one of the many large password dumps that have happened in recent years, Symantec said. In some cases, attackers have purported to be members of law enforcement who have discovered child pornography on victims' computers.

Not all email scams that Symantec blocked in the first five months of this year were sextortion-themed. Several were bomb-scare emails where the sender claimed to have planted a bomb in a building that would be triggered unless the requested amount is paid in full.

The scam emails typically followed the same pattern with relatively minor variations in the messages. Some, for instance, included PDF attachments, others had links pointing to malicious sites, while some contained obfuscated text and other characters designed to evade spam filters. Users opening the attachments or clicking on the URLs to see the purported recording of their activities often ended up downloading malware on their systems.

Easy Payoff
For cybercriminals, mounting such scams is easy because all it involves is sending a spam email, says Kevin Haley, director of security response at Symantec. "You can take a new idea, throw it against the wall, and see if it works. If not, move on to the next idea," he says.

Blackmailing people over their alleged sexual activity is not new. But the abundant email lists and credential data available on the Dark Web these days has made it relatively easy for attackers to launch convincing-looking scam campaigns, Haley notes. Often victims are tricked into believing attackers might have gathered personally compromising information.

"For the amount of effort and skill that is required to carry out these scams, it's a solid return on investment [for attackers]," Haley says. Symantec estimates that the 5,000 most-seen Bitcoin addresses received a total of about $106,240 in May. "If we take that number as the average amount to make in a 30-day period for these kinds of scams, that's just over $1.2 million in a year," Haley says.

For the most part, sextortion scams are consumer-focused. But reports about attackers using spear-phishing emails to target individuals in corporate settings have come out as well. For instance, earlier this year researchers from Barracuda Networks analyzed some 360,000 spear-phishing emails and found one in 10 involved sex-themed blackmail.

Barracuda found that the subject lines on a majority of sextortion emails contained some form of security alert and often included the victim's email address or password, too.

Though sextortion scams are twice as likely as business email scams in a corporate setting, they are often under-reported because of the intentionally embarrassing and sensitive nature of the content, Barracuda discovered. IT teams often are unaware of these attacks because employees don't report them regardless of whether they paid the demanded ransom.

For enterprises, the increase in sextortion and other scams highlight the need for strong email security controls, Haley says. "If these threats do not hit the end users' mailbox, then they do not become an issue," he notes. "Additionally, organizations need to educate their employees on the existence of these threats so they do not get fooled."  

Related Content:

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
7/30/2019 | 9:08:53 AM
LINKED IN PROFILES
Are becoing quite real - used to be just a hot pic and a single job but now they are acting like employed with a ton of friends and look legit ---- then within a few texts they develop profound feelings and later on ask for money for their ailing father;  Total scam.
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
CVE-2021-31660
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.