قالب وردپرس درنا توس
Home / LifeStyle / The Sextortion scheme alters the cryptocurrencies to cover the tracks

The Sextortion scheme alters the cryptocurrencies to cover the tracks




Cofense security researchers have found that cybercriminals have begun to alter fraud attempts by claiming payment in other cryptocurrencies than Bitcoin.

The behind-the-scenes threat actors typically send out an email stating their potential victims who have installed and recorded malware on their systems as they access adult content online via their webcam. Ransom is usually demanded in Bitcoin with the threat that cybercriminals will send the videos or pictures they have taken to the families and colleagues of a victim if they are not paid.

However, since the email addresses used in these scams are common, cybercriminals who have been identified as having a data breach have occasionally given a user's passwords in their original email to make their threats more persuasive.

With Sextor fraud becoming more and more of a threat, companies have begun to write detection tools that block these emails looking for keywords or Bitcoin addresses in the body of the email. To get around this problem, cybercriminals have switched to attaching PDF documents to their threats.

Avoiding Detection

In the recent wave of sexton fraud, Cofense found that cybercriminals now use a Litecoin Wallet address instead of Bitcoin to prevent detection

Many Secure Email Gateways (SEGs) now have Rules for detecting Bitcoin addresses in email text or in attached PDF files containing ransom demands. 1

9659002] According to Cofense, these new Sextoctor scams use e-mails that are written to contain very few searchable word patterns, making them harder to recognize for SEGs.

In addition to changing their tactics, cybercriminals are increasingly deploying alternative cryptocurrencies alongside Bitcoin to claim victims' ransom payments. For the victims, however, only about a dozen crypto currencies on major exchanges are easy to obtain. For these scams to succeed, victims must be able to easily pay the cybercriminals behind them.

Fortunately, it's easy to avoid fraud. Users can ignore these emails because a cybercriminal who actually had access to a person's system would provide much stronger evidence than just showing one of his passwords to a user. By checking websites such as haveibeenpwned, users can simultaneously see if their email address has been leaked, increasing the likelihood that they will become the target of sexton fraud.

  • Protect your systems from the latest cyber threats with the best antivirus software

Source link