The Sextortion scam is a new malicious tactic that is used against computer users worldwide. It is used to blackmail users by containing sensitive information about them (usually stolen).
|Type||Scam / Malware|
|Short Description||This scam uses harvested or stolen information about the users and blackmails them to pay money to the operators.|
|Symptoms||Received blackmail messages.|
|Distribution Method||Via e-mail messages that imitate legitimate email notification messages .|
See If Your System Has Been Affected by malware
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Sextortion Scam.|
Sextortion Scam – Overview
The Sextortion scam is a new hacker tactic that attempts to blackmail computer users worldwide. The main tactic relies on the use of email messages. They are orchestrated to send out the messages in groups. There are two possible case scenarios:
- Phishing Messages — The email messages can be sent from addresses that appear to be legitimate security companies. They may insert details that can correlate with the user’s identity or insert elements that are taken from well-known services, software or sites.
- Anonymous Messages — The email messages can be sent from anonymous domains, hacked accounts or other similar methods. The operators can send out many messages at once to raise attention to them.
Another method used by the criminals is the use of scripts and redirect code. They are generally distributed on various sites using redirects, banners, pop-ups or in-line hyperlinks. Clicking on malicious forms and filling in email details can lead to the email generation.
The other distribution tactic relies on the creation of malicious sites. The controllers can create their own portal sites that can utilize various scam tactics that harvest personal information about the users.
Upon being targeted by Sextortion scam the users will receive an email message that blackmails them for a payment. Here is a sample message:
I’m going to cut to the chase. I’m aware
is your pass word. More importantly, I
know about your secret and I’ve proof of this. You don’t know me and nobody paid me to examine you.
It is just your bad luck I came across your bad deeds. Let me tell you, I placed a malware on the
adult videos (sex sites) and you visited this website to have fun (you know what I mean). While you
were watching video clips, your web browser began working as a Rdp (Remote control desktop) with
a key logger which provides me access to your display as well as web cam. Right after that, my
software program obtained all your contacts from messenger, social networks, as well as email.
After that I put in more hours than I should’ve digging into your life and created a double-screen
video. 1st part displays the video you had been viewing and 2nd part shows the capture from your
web cam (its you doing dirty things).
Honestly, I am willing to forget everything about you and let you get on with your regular life. And I
am about to offer you 2 options that will achieve that. Two two choices are to either ignore this letter, or simply pay me $3200. Let’s understand these 2 options in more details.
First Option is to ignore this email message. You should know what is going to happen if you select
this option. I will certainly send your video recording to all your contacts including close relatives,
colleagues, and many others. It doesn’t shield you from the humiliation you an your family
must face when friends and family learn your sordid details from me.
Second Option is to pay me $3200. We will it my “privacy fee”. Now let me tell you what
happens if you pick this choice. Your secret will remain your secret. I will erase the video immediately.
You move on with your routine life that none of this ever occurred.
At this point you must be thinking “I will call the cops”. Without a doubt, I’ve overed my steps to
ensure that this email cannot be tracked back to me and it will not stay away from the evidence
from destroying your daily life. AI am not seeking to steal your savings. I just want to get compensated
for the time I placed into investigating you. Let’s hope you have chosen make all of this go away
and pay me the confidentiality fee. You’ll make the payment by Bitcoins (if you do not know how,
search “how to buy bitcoins” in google)
Amount to be sent: $3200
Bitcoin Address to Send to: 1F8dxmQMskgBowr6AW33P3bitLfvopLTmYf
(it’s CASE sensitive, so copy and paste it carefully)
The fact that the messages may contain account credentials shows that the Sextortion scam be part of a malware infection sequence. The criminals have probably used a Trojan horse or another type of virus to harvest the computers.
The malware infections can be programmed into harvesting strings that can be grouped into several categories:
- User Private Data — The collected information can reveal private information about the victims. Example content includes their name, address, location, interests, passwords and etc.
- System Information — The hackers can extract information about the infected hosts that can be used to optimize the attack campaigns. The hackers use generated reports giving details about the installed hardware components, certain operating system values and etc.
- Current Status — The criminal operators can instruct the deployed code to automatically monitor for the user’s behavior when using their email clients and/or web email services.
In such cases it may be possible that the criminals behind the Sextortion scam can utilize a Trojan module. It will connect to a hacker-controlled server from which it will be able to receive commands. They include the following:
- Surveillance — The Sextortion scam Trojan can spy on the victims in real time.
- Machine Control — The remote attackers can take advantage of the fact that they can install various scripts that can manipulate the systems or altogether take over control of them.
- Additional Infection — The threat can be used to deploy additional malware to the infected hosts.
Sextortion Scam – October 2018 Update
A recent security report reads that the latest examples of the sextortion scams use a different approach. They make more use of preliminary information gathering by looking out for a more complete data. It is not known what channels or methods they use however it is speculated that this is done using automated tools and frameworks that dig deep into social networks and online behavior. A key difference is that the receiving users this time are employees of state, local, tribal and territorial agencies. This is an important change as the criminals appear to target them via the blackmail tactics of facing repercussions.
Some of the displayed information that is now shown to the users includes their name, email address, timeframes of computer interaction. In some cases the hackers can also quote leaked/exposed passwords.
The new approach shows that the messages are created using the personalized contents — when the appropriate layout and information is presented to the targets there is much higher percentage of success. Some of the harvested information that is taken to leaked databases and mass hacks that have resulted in the credentials leak. We also anticipate that in some cases the criminals can buy the databases from the underground hacker markets.
Sextortion Scam Example — Hacked Files
An example email message taken from a recent attack is the following:
I’m a member of an international hacker group.
As you could probably have guessed, your account XXXXXXXXXXXXXX was hacked, I sent message you from it.
Now I have access to your accounts!
For example, your password for XXXXXXXXX is XXXXXXXXXXXXxx.
Within a period from XXXXX XXXXXX to XXX XXXXX you were infected by the virus we’ve created, through an adult website you’ve visited.
So far, we have access to your message, social media accounts, and messengers.
Moreover, we’ve gotten full dumps of these data.
We are aware of your little and big secrets..yeah, you do have them. We saw and recorded your doings on porn websites. Your tastes are so weird, you know..
But the key thing is that sometimes we recorded you with your webcam, syncing the recordings with what you watched!
I think you are not interested show this video to your friends, relatives, and your intimate one..
Transfer $700 to our Bitcoin wallet: XXXXXXXXXXXXXXXXXXXXXX
If you don’t know about Bitcoin please input in Google “buy BTC”. It’s really easy.
I guarantee that after that, we’ll erase all your “data” :D
A timer will start once you read this message. You have 48 hours to pay the above-mentioned amount.
Your data will be erased once the money are transferred.
If they are not, all your messages and videos recorded will be automatically sent to all your contacts found on your devices at the moment of infection.
Sextortion Scam Example — Hijacked Phone Data
Another sample message reads has a slightly different text:
It seems that, XXXXXXXXXXXXXX is your phone number. You may not know me and you are probably wondering why you are getting this e-mail, right?
. . .
I backuped phone. All photo, video and contacts..
I created a double-screen video. 1st part shows the video you were watching (you’ve got a good taste haha . . .), and 2nd part shows the recordng of your web cam.
exactly what should you do?
Well, in my opinion, (AMOUNT FROM $100-$1000 THIS TIME) is a fair price for our little secret. You’ll make the payment by Bitcoin (if you do not know this, search “how to buy bitcoin” in Google).
Remove Sextortion Scam
The Sextortion scam messages are a very dangerous example of a phishing scam that takes advantage of the victim’s gullibility.
- Guide 1: How to Remove Sextortion Scam from Windows.
- Guide 2: Get rid of Sextortion Scam from Mac OS X.
- Guide 3: Remove Sextortion Scam from Google Chrome.
- Guide 4: Erase Sextortion Scam from Mozilla Firefox.
- Guide 5: Uninstall Sextortion Scam from Microsoft Edge.
- Guide 6: Remove Sextortion Scam from Safari.
- Guide 7: Eliminate Sextortion Scam from Internet Explorer.
How to Remove Sextortion Scam from Windows.
Step 1: Boot Your PC In Safe Mode to isolate and remove Sextortion Scam
Step 2: Uninstall Sextortion Scam and related software from Windows
Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it.
Step 3: Clean any registries, created by Sextortion Scam on your computer.
The usually targeted registries of Windows machines are the following:
You can access them by opening the Windows registry editor and deleting any values, created by Sextortion Scam there. This can happen by following the steps underneath:
Get rid of Sextortion Scam from Mac OS X.
Step 1: Uninstall Sextortion Scam and remove related files and objects
1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:
- Go to Finder.
- In the search bar type the name of the app that you want to remove.
- Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
- If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.
In case you cannot remove Sextortion Scam via Step 1 above:
In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:
You can repeat the same procedure with the following other Library directories:
Tip: ~ is there on purpose, because it leads to more LaunchAgents.
Step 2: Scan for and remove Sextortion Scam files from your Mac
When you are facing problems on your Mac as a result of unwanted scripts and programs such as Sextortion Scam, the recommended way of eliminating the threat is by using an anti-malware program. SpyHunter for Mac offers advanced security features along with other modules that will improve your Mac’s security and protect it in the future.
Remove Sextortion Scam from Google Chrome.
Step 1: Start Google Chrome and open the drop menu
Step 2: Move the cursor over "Tools" and then from the extended menu choose "Extensions"
Step 3: From the opened "Extensions" menu locate the unwanted extension and click on its "Remove" button.
Step 4: After the extension is removed, restart Google Chrome by closing it from the red "X" button at the top right corner and start it again.
Erase Sextortion Scam from Mozilla Firefox.
Step 1: Start Mozilla Firefox. Open the menu window
Step 2: Select the "Add-ons" icon from the menu.
Step 3: Select the unwanted extension and click "Remove"
Step 4: After the extension is removed, restart Mozilla Firefox by closing it from the red "X" button at the top right corner and start it again.
Uninstall Sextortion Scam from Microsoft Edge.
Step 1: Start Edge browser.
Step 2: Open the drop menu by clicking on the icon at the top right corner.
Step 3: From the drop menu select "Extensions".
Step 4: Choose the suspected malicious extension you want to remove and then click on the gear icon.
Step 5: Remove the malicious extension by scrolling down and then clicking on Uninstall.
Remove Sextortion Scam from Safari.
Step 1: Start the Safari app.
Step 2: After hovering your mouse cursor to the top of the screen, click on the Safari text to open its drop down menu.
Step 3: From the menu, click on "Preferences".
Step 4: After that, select the 'Extensions' Tab.
Step 5: Click once on the extension you want to remove.
Step 6: Click 'Uninstall'.
A pop-up window will appear asking for confirmation to uninstall the extension. Select 'Uninstall' again, and the Sextortion Scam will be removed.
Eliminate Sextortion Scam from Internet Explorer.
Step 1: Start Internet Explorer.
Step 2: Click on the gear icon labeled 'Tools' to open the drop menu and select 'Manage Add-ons'
Step 3: In the 'Manage Add-ons' window.
Step 4: Select the extension you want to remove and then click 'Disable'. A pop-up window will appear to inform you that you are about to disable the selected extension, and some more add-ons might be disabled as well. Leave all the boxes checked, and click 'Disable'.
Step 5: After the unwanted extension has been removed, restart Internet Explorer by closing it from the red 'X' button located at the top right corner and start it again.