The latest one doing the rounds looks like this the actual content varies considerably from scam to scam but the basic idea is the same :. Once you were there on the website, my malware took control of your browser. It started operating as a keylogger and remote desktop protocol which gave me access to your webcam. Immediately after that my software collected your complete contacts from your Messenger, FB, and email. I created a double-screen video. First part shows the video you were watching you have a good taste lol… , and the second part displays the recording of your webcam.
5 Recent Stories
Sextortion Scam Uses Recipient’s Hacked Passwords — Krebs on Security
Any sizable breach of sensitive information like usernames and passwords represents a privacy catastrophe. But when those credentials link breach victims to sex sites, the consequences go beyond the risk of a hacked credit card or Twitter account and into the realm of humiliation and blackmail. On Sunday, the website Leaked Source, a repository of breached data, revealed that hackers had compromised the online hookup and dating firm FriendFinder and stolen million users' information, including usernames, passwords, and email addresses. The data includes more than million accounts on AdultFriendFinder. Though Leaked Source reports that some of the leaked passwords were cryptographically hashed to protect them , others were left unencrypted, and even the protected ones were easily cracked in almost all cases.
Sex workers' clients exposed by Dutch hack attack
The missive threatens to release the video to all your contacts unless you pay a Bitcoin ransom. The new twist? The basic elements of this sextortion scam email have been around for some time, and usually the only thing that changes with this particular message is the Bitcoin address that frightened targets can use to pay the amount demanded.
Zain Qaiser, a member of an organized Russian-speaking cyber gang, responsible for "one of the most successful and closely guarded pieces of malicious software ever developed by the cybercrime community," was jailed for more than six years in the U. In the U. The criminal network infected millions of computers across multiple jurisdictions around the world. Qaiser purchased "masses of advertising traffic from pornographic websites" under the name K!