631-905-9617    Get SUPPORT

Suffolk Computer Consultants, Inc. Blog

Suffolk Computer Consultants, Inc. has been serving the Speonk area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Sextortion Scams are on the Rise with Extra Creepy Behavior

Sextortion Scams are on the Rise with Extra Creepy Behavior

Sextortion scams are far from glamorous. These attacks involve a scammer claiming to have compromising photos or videos of their target engaged in explicit activities—often suggesting this footage was captured through their online behavior. The scammer then threatens to release this material unless a ransom is paid.

These scams were easier to dismiss in the past, but recent versions have escalated, including the victim's personal details like names and even images of their homes. Let’s break down how these attacks work, so you can recognize and respond to them if they ever land in your inbox.

Dissecting the Sextortion Scam

Sextortion scams rely on two key assumptions:

  1. Many people access adult content online.
  2. Most people want to keep their interaction with such content private.

The scam typically starts with a hacker contacting the target, claiming to have recorded them engaging with explicit material. The hacker demands payment and threatens to send the footage to the victim’s contacts if they refuse.

This tactic plays on a deep human fear of shame and social rejection. The threat feels particularly believable if the victim has engaged in this behavior, which is why these scams can be so effective.

The consequences are serious—potentially embarrassing the victim and damaging their relationships with family, friends, or coworkers. The fear of such humiliation makes paying the ransom seem like an easy way out, even though it isn’t.

The "Proof" is What Matters

While more people are aware of scams today, many still struggle with how to respond effectively. Scammers have adapted by making their threats seem more credible, often using personal data harvested from breaches.

Some of the more sinister attacks include not just passwords but also private details like photos of the victim’s home or their actual address. Seeing such personal information takes the fear and believability of the scam to a new level.

Addresses Are Just Another Form of Private Data

Remember that an address is just another piece of personal data, like a password. In data breaches, scammers can quickly obtain information like email addresses, usernames, and, yes, even home addresses.

Once they have this, they can look up images of the victim’s property from real estate websites or other online sources. Even though finding this information is relatively easy, the personal nature of an address makes it more likely for people to fall for the scam.

Young People Are Especially at Risk

Unfortunately, sextortion scams have increasingly targeted minors, leading to tragic outcomes in some cases. Between October 2022 and March 2023, there was a reported 20% rise in sextortion scams against minors compared to the previous year. The wide range of platforms young people use—smartphones, gaming consoles, tablets—makes them vulnerable to these attacks.

The U.S. Department of Justice is actively combating this trend. In one case, four men from Delaware were charged with attempting to extort nearly $7 million from victims worldwide, collecting around $1.9 million before being caught. If found guilty, they could face up to 20 years in prison.

How to Respond to a Sextortion Scam

If you find yourself targeted by a sextortion scam, follow these steps to protect yourself:

  • Research the sender - If you’re interacting with someone online, search their name to see if it’s linked to previous scams or is a famous name. This is especially important in online dating situations.
  • Never share compromising photos - No matter who you think you’re talking to, avoid sending explicit images of yourself.
  • Seek legal advice - If you become a victim, consult an attorney for guidance.
  • Verify the scam - Copy and paste part of the threatening email into a search engine or visit the BBB Scam Tracker to confirm it’s a scam.
  • Do not engage - No matter how serious the email sounds, don’t respond. Delete it immediately.
  • Avoid clicking links or downloading attachments - This could expose you to malware or identity theft.
  • Never pay the ransom - Don’t send money, gift cards, or comply with any demands.
  • Run a security check - Ensure your computer has up-to-date security software installed.
  • Enable two-factor authentication - Secure your important accounts with extra layers of protection.
  • Update your passwords regularly - Use strong, unique passwords and consider using a password manager.
  • Cover your webcam - This simple step can provide peace of mind.
  • Check if your email was compromised - Use tools like Have I Been Pwned to see if your email has been part of a data breach.

If you are targeted, report the scam to the FBI and the Better Business Bureau.

Remember, security is crucial both at home and in the workplace. If you think your business could benefit from enhanced security measures, contact us at 631-905-9617 for more information.

Realistic Expectations Make Business Easier
Explaining VoIP and How It Saves Money
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Wednesday, October 16 2024

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Newsletter Sign Up