Sextortion scammers getting creative

Credit to Author: William Tsing| Date: Tue, 26 Nov 2019 17:09:34 +0000

We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of…

Categories:

Tags:

(Read more…)

The post Sextortion scammers getting creative appeared first on Malwarebytes Labs.

Read more

The lucrative business of Bitcoin sextortion scams (updated)

Credit to Author: Threat Intelligence Team| Date: Thu, 22 Aug 2019 15:00:00 +0000

Sextortion scams are back on the radar, and many say they’re on the uptick. We investigate an email campaign to see how lucrative the business of sextortion can be.

Categories:

Tags:

(Read more…)

The post The lucrative business of Bitcoin sextortion scams (updated) appeared first on Malwarebytes Labs.

Read more

The lucrative business of Bitcoin sextortion scams

Credit to Author: Threat Intelligence Team| Date: Thu, 22 Aug 2019 15:00:00 +0000

Sextortion scams are back on the radar, and many say they’re on the uptick. We investigate an email campaign to see how lucrative the business of sextortion can be.

Categories:

Tags:

(Read more…)

The post The lucrative business of Bitcoin sextortion scams appeared first on Malwarebytes Labs.

Read more