Online Scam Sextortion: It's Scarier Than Ever; How to Avoid It?

Sextortion is a disgusting, common blackmail technique - and now even more intimidating.

This is a simple practice, and it becomes more common as our obsession with documenting ourselves develops. We record our lives through social media and communication is so easy. We have a lot to share with friends and family.

Cybercriminals take advantage of this. And it only gets worse.

Online Scam Sextortion


What Is Sextortion?

Sextortion is a truly heinous form of blackmail, in which attackers use sexually explicit images and videos stolen from their victims to scam money or NSFW supplemental material. If the victims do not comply with their demands, all the photos and videos held by the criminals are published on the Internet. Attacks are becoming more complex, as are threats. It can affect any age, but children are often the intended victims.

The traditional sextortion method is very simple: scammers create fake social media accounts and engage strangers in conversations. These shifts to video chats (Skype in many cases) and attackers convince their victims to engage in cybersex - which is then recorded and used against them.


How Has This Changed?

Of course, a lot of this remains the same, but besides luring their victims into video chats, the criminals convince them to download a supposed fix for the audio problem, which is actually malware. Android is a specific target, but jailbroken iPhones are also vulnerable The app or file then sends additional personal data to the fraudster, who then lists the names, phone numbers, and email addresses of family and friends to directly threaten their close relationship. There is nothing personal from cybercriminals.

Typically, the icons of malicious applications mimic familiar images such as Siri, QR codes, and photo albums.

There are various examples of the main malware shown in sextortion scams. However, the biggest concern is malware that intercepts SMS and phone calls, sends its own messages, and prevents the victim from logging text messages and calls until they pay the blackmailer's demands. Much of this is handled using the SMTP protocol. mail

This evolution of sextortion is a shift from blackmailing victims to overt material to more complete domination over personal data and contacts.


What Can You Do to Combat Sextortion?

head of the FBI's Cybercrime Division in Boston spoke to the MUO, who advised parents on how to deal with the growing threats to children online:

I would say that the first thing parents can do is talk to their children. Make sure you have an open discussion about the potential threats that are on the Internet. Not only communicating with a stranger but also an indication that the one with whom they are dating may not immediately approach them and try to develop friendships and the like. Thus, you need to constantly conduct an open dialogue with your child, making sure that over the years he has an understanding because every year his threats change slightly.

Another tip is to keep an eye on what your kids are doing online. Keep an eye out, especially regarding privacy protection priorities.

Also, it's important to remember that not all minors can do something like this. Although sextortion is more common, it still affects a minority. However, here are some simple guidelines to keep in mind:


  • Don't chat with strangers requesting video calling or cybersex;
  • Don't download any apps or files from someone you don't know;
  • Delete any suspicious SMS or emails;
  • Talk about what's going on. Even if it's uncomfortable, family and friends like you are for who you are, no matter what mistakes are made;

Remember if your webcam was hacked, you provided voluntary material, or if it was found on stolen hardware, it is not your fault.


Don't Open Attachments From People You Don't Know

Most email platforms and messaging systems have pretty decent spam filters. However, there may be some emails slipping through the cracks. If you receive a message from someone you don't know, make sure you don't open attachments. This is an easy way for hackers to infect your computer with malware, which can allow them to install keyloggers and even take control of your device.

In the same vein, you should avoid clicking on links in emails if you are not sure where they are coming from. This can lead to fake websites that ask you to enter credentials, which can then be used to hack your real accounts. To keep safe your data install total security software.


Encrypt Your Devices

If you store any type of sensitive data on your device, whether it be work documents or explicit images or videos, then you should definitely consider encrypting the device or at least the corresponding files and folders. This means that if someone gets their hands on your PC, laptop, or mobile device, they cannot recover the encrypted information without your password (or PIN or similar lock).

Comments