Tech News

Tech Business News

  • Home
  • Technology
  • Business
  • News
    • Technology News
    • Local Tech News
    • World Tech News
    • General News
    • News Stories
  • Media Releases
    • Tech Media Releases
    • General Media Releases
  • Advertisers
    • Advertiser Content
    • Promoted Content
    • Sponsored Whitepapers
    • Advertising Options
  • Cyber
  • Reports
  • People
  • Science
  • Articles
    • Opinion
    • Digital Marketing
    • Guest Publishers
  • About
    • Tech Business News
    • News Contributions -Submit
    • Journalist Application
    • Contact Us
Reading: Sextortion Scams On The Rise And Growing In Sophistication
Share
Font ResizerAa
Tech Business NewsTech Business News
  • Home
  • Technology News
  • Business News
  • News Stories
  • General News
  • World News
  • Media Releases
Search
  • News
    • Technology News
    • Business News
    • Local News
    • News Stories
    • General News
    • World News
    • Global News
  • Media Releases
    • Tech Media Releases
    • General Press
  • Categories
    • Crypto News
    • Cyber
    • Digital Marketing
    • Education
    • Gadgets
    • Technology
    • Guest Publishers
    • IT Security
    • People In Technology
    • Reports
    • Science
    • Software
    • Stock Market
  • Promoted Content
    • Advertisers
    • Promoted
    • Sponsored Whitepapers
  • Contact & About
    • Contact Information
    • About Tech Business News
    • News Contributions & Submissions
Follow US
© 2022 Tech Business News- Australian Technology News. All Rights Reserved.
Tech Business News > Cyber > Sextortion Scams On The Rise And Growing In Sophistication
Cyber

Sextortion Scams On The Rise And Growing In Sophistication

Sextortion scams are on the rise globally, with hackers using victims’ addresses and photos of their homes to personalise the attacks and increase the pressure to pay, according to new research by Barracuda. Sextortion attacks are a type of blackmail where criminals attempt to extort money from victims by threatening to release explicit images or videos taken from the victim’s computer unless their demands are met.

Editorial Desk
Last updated: November 21, 2024 9:34 am
Editorial Desk
Share
SHARE

Sextortion scams are a type of extortion where criminals attempt to extort money from victims by threatening to release explicit images or videos unless demands are met.

Leveraging usernames and passwords stolen in data breaches, criminals contact victims and claim to have compromising content, allegedly from the victim’s computer, and threaten to publicly share it if victims don’t pay up.

  • Barracuda threat researchers have identified evolving tactics being used by cybercriminals in targeted sextortion scams.
  • Criminals are now frequently using victims’ addresses and photos of their homes to better personalise sextortion phishing attacks and increase the pressure to pay.
  • Extortion demands are increasing from hundreds to thousands of dollars, and criminals are making it easier for victims to pay with quick response (QR) codes.

Evolving Tactics Add Personalisation And Pressure

Barracuda research shows that extortion emails make up roughly 3% of the total number of targeted phishing attacks detected annually.

Most of these are sextortion attacks. Every incident is a serious crime with potentially devastating impact that can range from monetary loss to significant emotional and mental distress.

Barracuda researchers have identified evolving tactics — including advanced personalization — being used by criminals in these targeted attacks.


Criminals are leveraging the personal data of targeted victims, including full names, telephone numbers, and addresses, to make their sextortion attempts more threatening and convincing.

The sextortion emails address the victim by their first and last name, and the opening sentences of the email include the victim’s telephone number, street address, and city.

In many cases, emails start with copy like this: “I know that calling [telephone number] or visiting [street address] would be a better way to have a chat with you in case you don’t cooperate. Don’t even try to escape from this. You have no idea what I’m capable of in [city].”

An image from Google Maps of the target’s location is now frequently being included in the sextortion email. In analyzed emails, images included either a residential or commercial location, depending on the address associated with the victim’s stolen data.

The Payment Demands Are Increasing.

In the past, sextortion emails typically demanded payments of a couple hundred dollars, up to about $500 maximum. In the latest attacks seen by Barracuda researchers, the amounts are $1,950 and $2,000.

Different copy variations are being tested. While most of the copy in the emails is identical or very similar, there are some variations.

For example, several variations are being used in the line of copy that appears just before the Google Map image of the victim’s address, including:

  • See you here?
  • Can you notice something here?
  • Is this the right place to meet?

Likewise, variations are being used in the line of copy that appears just below the bitcoin payment information, including:

  • Once you pay up, you’ll sleep like a baby. I keep my word.
  • Let me tell ya, it’s peanuts for your peace.
  • Let me tell ya, it’s peanuts for your tranquility.

Additional Points Of Personalisation Are Being Used.

In some of the sextortion emails, an additional point of personalisation is being included in the last sentence of the final paragraph that appears before the image of the victim’s address: “I don’t make mistakes, [first name.]” the email warns.

Criminals Are Leveraging Technology To Expedite Payment.

In some cases, quick response (QR) codes are being provided in the emails to make it faster and easier for victims to send bitcoin payments to the criminals. In the emails that include them, the QR codes appear directly below the bitcoin address.

Examples Of Sextortion Emails

Sextortion Scams example email
Sextortion Scams On The Rise
Sextortion Scams On The Rise And Growing

Protecting Against Sextortion Scams

Sextortion emails are usually sent to thousands of people at a time as part of larger spam campaigns, so most get caught in spam filters. But attackers also vary and personalise the content of the emails, making them more difficult for spam filters to detect and stop.

Scammers are continually evolving their email fraud techniques, including using social-engineering tactics to bypass traditional email security gateways.

Sextortion emails that end up in inboxes typically do so because they originate from high-reputation senders and IPs; hackers use already-compromised Microsoft 365 or Gmail accounts. 

Here are several ways to defend against sextortion scams:

AI-based protection — Attackers are continually adapting sextortion emails to bypass email gateways and spam filters, so a good spear-phishing solution that uses AI to detect and protect against these and other email attacks is a must.

Account-takeover protection — Many sextortion attacks originate from compromised accounts; be sure scammers aren’t using your organisation as a base camp to launch these attacks.

Deploy technology that uses AI to recognise when accounts have been compromised, allowing you to remediate in real time by alerting users and removing malicious emails sent from compromised accounts.

Proactive investigations — Given the nature of sextortion scams, employees might be less willing than usual to report these attacks due to the intentionally embarrassing and sensitive nature of the threats.

Conduct regular searches on delivered mail to detect emails related to password changes, security alerts, and other content. Many sextortion emails originate from outside North America or Western Europe. Evaluate where your delivered mail is coming from, review any of suspicious origin, and remediate.

Security-awareness training — Educate users about sextortion fraud, especially if you have a large and diverse user base. Make it part of your security awareness training program. Ensure employees can recognize these attacks, understand their fraudulent nature, and feel comfortable and know how to report them. Use phishing simulation to test the effectiveness of your training.

System maintenance — Keeping browsers and operating systems up-to-date helps prevent exploits from infecting computers. Sextortion emails can infect targets’ devices with malware, and keeping browsers and operating systems up-to-date prevents infection.


Related Resources

[Report] Top Email Threats & Trends ~ June 2024
https://www.barracuda.com/reports/email-threats-and-trends-1

[Glossary] Understanding sextortion and how to stay safe
https://www.barracuda.com/support/glossary/sextortion

By Editorial Desk
The TBN team is a well establish group of technology industry professionals with backgrounds in IT Systems, Business Communications and Journalism.
Previous Article Corporate Australia Offered Training on 'How to Be Human,' Says Terri Martin Corporate Australia Offered Training On ‘How to Be Human’
Next Article VeePN cyber security holidays VeePN Warns of Growing Phishing Risks as Holiday Season Approaches
Leave a comment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sextortion scams Barracuda threat spotlight

Tech Articles

Top Cyber Security Threats 2024

Top Cyber Security Threats In 2024

Top cyber security threats in 2024 has put the information…

October 2, 2024
Attitudes Toward Work Manifest The Rise of AI

Did Our Collective Attitudes Toward Work Manifest The Rise of Artificial Intelligence? (AI)

It’s definitely something to think about. There’s a fine line…

November 26, 2024
Content creation platforms leveraged for phishing attacks

Phishing Attacks Exploit Content Creation Platforms

Content creation platforms are being leveraged for phishing attacks. Its…

September 17, 2024

Recent News

US Schools Cyber Attacks
CyberWorld Tech

Cyberattacks on US schools increasing amid reliance on technology

5 Min Read
Online Shame
CyberStories

Aussies’ fear and shame make it difficult to fight ransomware

7 Min Read
Forescout's 2024 H1 Threat Review reveals surge in cyber threats
Cyber

Forescout’s 2024 H1 Threat Report Highlights Sharp Rise in Cyber Threats

4 Min Read
Pro Matt Warren RMIT Cyber
Cyber

Australia should be prepared for Russia’s Cyber Reaction

2 Min Read
Tech News

Tech Business News

Stay up to date with the latest technology & business news trends from Australia and the around the world.

Technology News reports and whitepaper publishing services are available along with media and advertising options

Our Australian technology news includes People, Business, Science, World News, Local News, Guest publishers, IT News & Tech News Australia | Tech News was established in 2019

About

About Us 
Contact Us 
Privacy Policy
Copyright Policy
Terms & Conditions

December, 10, 2024

Contact

Contact Information.
Melbourne, Australia

Werribee 3030

Phone: +61 431401041

Hours : Monday to Friday, 9am 530-pm.


Tech News

© Copyright Tech Business News 

Latest Australian Tech News – 2024

Welcome Back!

Sign in to your account