New sextortion campaign taps altcoins to avoid detection

New sextortion campaign taps altcoins to avoid detection

A new phishing sextortion campaign has switched from the standard ransom demands for Bitcoin (BTC) to alternative coins in an attempt to bypass email protections. 

On Tuesday, phishing simulation provider Cofense said the new technique has been successful in circumventing security layers implemented by email providers and their Secure Email Gateways (SEGs).


Sextortion campaigns often follow a common pattern. 


A fraudulent email is first sent to a victim that claims an attacker has infected their PC with malware and this has been used to spy on the victim, collecting information relating to their alleged browsing habits on the way. 


TechRepublic: How to quickly deploy a honeypot with Kali Linux




These emails will claim to have recorded browsing histories including visits to adult websites and webcam footage showing the victim, potentially in compromising situations. 


While many of them can simply be ignored as standard spam, some messages may appear to be authentic due to the inclusion of data such as passwords that have been used to secure online accounts. 




There are massive data dumps online now, full of our stolen information. You only need to check your email address against these dumps to understand the full extent of the problem -- Have I Been Pwned being a useful tool for these scans -- and no matter how careful you may be of your own personal security, you've likely been caught in a company breach or two. 


As this information has been le ..

Support the originator by clicking the read the rest link below.