4/4/2023 0 Comments Extortion pornThe latest attacks, however, are a troubling trend. Payment claims for fake software, often bogus or almost-worthless security software - dubbed "scareware" - are not only nothing new, but also very lucrative, according to a 2008 report. The criminals were planning to pitch a second extortion demand to those who fell for the first, Ferguson said. "The second extortion attempt would claim, 'Look, you downloaded these files too, and look how expensive they are.'" "You can't listen to those files," he said. Those files were offered for sale on another site for what Ferguson called "extremely high" prices, as much as 58 million yen, or $630,000. The hackers also built in a second extortion attempt by adding three MP3 files to victims' PCs. "The name to shame would be especially effective against victims like that," Ferguson said. If the victims had regularly surfed to Hentai sites, the IE activity screenshots and extortion demand would have been very effective in embarrassing users into paying up, he added.Īccording to reports in the Japanese media, 5,500 people in the Nagasaki area alone have admitted they downloaded the malicious file. "This 'name to shame' tactic hasn't been used before," Ferguson said. "For a fee, would remove that information and resolve the copyright infringement."Īlthough copyright infringement scams have been used by cyber criminals - a recent attack hit European users who were accused of illegally downloading music - the pornographic angle is new. "Victims receive e-mail from a company called Romancing Inc., which claims they were in breach of copyright infringement," said Ferguson. Before it went dark, it was used by criminals to extort 1,500 yen, or approximately $16, from victims by promising to remove the information. That information, as well as the IE screenshots, were posted to a Web site that is currently offline. "It also collects information from the PC, including screenshots of Internet Explorer's Favorites." The latter is IE's term for its bookmarks. "The installer asks a whole series of personal questions, including name, date of birth, phone number, mailing address, company name and game passwords," said Ferguson.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |