Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

Scam Claims to Have Compromising Video… of You

Scam Claims to Have Compromising Video… of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

For a bit of background, it is important to recognize that a full 30 percent of the Internet is made up of pornographic materials. That 30 percent is not short of visitors, either - websites featuring adult content draw more traffic than Amazon, Twitter, and Netflix do together. This prevalence is one of the reasons that this email scam has been as effective as it has.

How the Scam Works
Like most scams, the purpose of this one is to extort money from its victims. A popular way to do this (among criminal circles, of course) is to blackmail them with some piece of information that they would prefer hidden - the more scandalous, the better. This scam claims that the sender of an email has just that information on you.

This scam starts with an email appearing in an inbox:

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The user is then given an address and case-sensitive alphanumeric code into which they are to deposit the sizable ransom. They are advised to use the copy/paste function to make sure the code is correct. Finally, the email ends with a warning:


You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

One thing is for sure: this would be an extremely unsettling email to open your inbox to find. Regardless of which of its many versions you may encounter, it will deliver the same ultimatum: deliver the Bitcoin to me, or I deliver this to everyone in your life.

Don’t Get Excited
This would be a really scary threat, if it was real. There was no video filmed of you, and while the password is one that you once used, it comes from a decade-old hacked database. This threat is little more than that - a threat - but there are still lessons to be learned from an attempt like this.

This scam has been considerably successful, netting over $250,000 over the course of a few weeks, which means that scams like this will continue, and that plenty of people don’t change their passwords the way they should. However, it is also legitimately scary to consider what might happen if this threat someday wasn’t a threat - after all, almost every device today comes with a built-in front facing camera. As a result, it will be hard to be sure that there isn’t footage of you - compromising or otherwise - floating around in some cybercriminal’s system someday.

How to Protect Yourself
Proactive measures are key to foiling any attack like this, especially in regard to your passwords. Properly managing your passwords should be a priority - follow best practices and use different ones, changing them often - and if you have difficulty remembering them, use a password manager to remember them for you.

Plus, you may want to strongly consider covering up your webcam when not intentionally using it. That way, it won’t matter so much how you choose to spend your time.

Regardless, we get it. It can be really hard to keep up with each and every threat and attack that’s out there, between sextortion, ransomware, and all the others. That’s part of the reason that Tekie Geek is here. We do everything we can to protect our clients from compromise, including education and practical defenses. Give us a call at (347) 830-7322 to learn more.

5 Business Communications Solutions
Technology Basics: Blue Screen of Death


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, November 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Time Management Work/Life Balance IT services NYC Telephone Processor Innovation IT support Staten Island Business Metrics Tablet Processors Wireless Uninterrupted Power Supply Managed IT Services Virus IT support IT consulting company Social Engineering Data Management Bitcoin Public Cloud malware worms Bluetooth Phishing computer services IT Management Big Data Upgrade managed services Startup Telephone System Memory Virtualization Network Congestion Remote Monitoring Facebook Business Computing Visible Light Communication Access Control Content Filtering Recovery Analytics Communication Identity Theft Microsoft LiFi IT services Staten Island Office 365 Network End of Support Help Desk VoIP Mobile Devices Internet of Things Computer Malfunction Going Green VPN Upload Hardware Solutions Automobile Solid State Drive Cache Laptops Rental Service Tech Terms App Quick Tips Mobility Windows XP Thank You Social Network Staten Island IT consulting Safety BDR Data storage Best Practices User Tips data recovery Staten Island WiFi Staten Island computer support Settings Google staten island managed services Hacks Supercomputer Money Hard Drive Disposal Sports Data Breach Hacking Internet Comparison Digital SaaS Mobile Device Management Legislation Streaming Media HTML Users Society Entertainment Apps Data Protection Microchip Health IT consulting NYC Username Cryptocurrency Tablets Update Writing tech support IT support NYC Securty Employer-Employee Relationship Conferencing computer support Machine Learning it support Microsoft Excel Compliance Multi-Factor Security Privacy Staten Island IT support Spam Unified Threat Management Browser Workplace Tips Mobile Device Microsoft Office Software Tech Term Project Management Text Messaging Business Technology IT support Staten Islans Ransomware Documents Hack Twitter Multi-factor Authentication Gadgets Law Enforcement Business Cards Search Passwords Cabling Equifax Content Operating System Windows 10 Staten Island tech support computer support firms CCTV Firewall Telephone Systems Robot Lithium-ion battery Fake News Business Management Cloud Maintenance Powerful Technology Solutions IT Consultant Business Network Management Gamification Regulations Audit Social Technology Business Continuity Security Employer Employee Relationship Music Backup Productivity Vendor Bookmark IBM Managed IT Company Culture Evernote Screen Reader Hackers Printing IT consulting G Suite Saving Time Hacker Nanotechnology Directions IT consulting firms Addiction computer repair Staten Island Fileless Malware Accountants Applications managed IT services NYC Windows 10 ransomware attacks Alert Backup and Disaster Recovery Administrator Network Security Software as a Service Taxes managed it services Chromebook Proactive IT Productivity Workers Government Unified Communications Hardware Excel Computers Saving Money today ’s organizations Cybersecurity computer support NYC Cloud Computing Miscellaneous email scam Knowledge News Computer Care CrashOverride Administration Two-factor Authentication computer repair Managed IT Services BYOD Business Mangement Private Cloud Networking Download Bring Your Own Device CryptoLocker eWaste end-user files Disaster Recovery Cost Management How To Mobile Security Start Menu Virtual Desktop managed IT services staten island Relocation Holiday Outsourced IT Flash Wireless Headphones Remote Computing Hiring/Firing Cortana SharePoint Physical Security tech support Staten Island Piracy Mobile Technology Database Devices Hosted Solution Accidental deletion Tip of the week History Small Business Customer Resource management Malware Android Managed Service Trends Running Cable Browsers Email Television Web Server Education Collaboration Spyware VoIP Server Samsung Electronic Medical Records Data Backup Artificial Intelligence Proxy Server YouTube Website Emails DDoS Lenovo Downloads Google Drive IT services New York City Laptop Tip of the Week Password Disaster Advertising Virtual Reality Error Printer Augmented Reality Emergency Computing Reliable Computing IT consulting Staten Island Travel Domains communications Monitors 3D Printing Tracking Computer IT consulting Staten island Google Calendar Training Budget Google Docs Patch Management Motion Sickness Gmail Google Wallet Corporate Profile Data Analysis Access Botnet Service Level Agreement Tech Support Social Media Downtime Managing Stress Vendor Mangement Vulnerability Data Security Worker Digital Payment Specifications Antivirus Websites Banking Monitoring Software License IT Support Business Growth managed services Staten Island Apple Telephony Congratulations Outlook Hard Drive tech support Staten Isalnd Customer Service Data Desktop Notifications Save Money Cybercrime Efficiency Staffing Automation Workstations The Internet of Things Managed Service Provider Tactics Drones Best Practice datto Cleaning Regulation Device security data loss Windows 8 Freedom of Information Office Office Tips Legal Computing Infrastructure Management Paperless Office Health IT Google Maps Word Information Technology Black Market IT consulting firm IT support firms Wireless Technology Cloud computing Staten Island Language Retail IT support New York City PDF Mouse data recovery Smartphones Flexibility Politics computer support Staten Island Hosted Solutions Meetings Touchscreen Distributed Denial of Service User Tip Document Management Wi-Fi Blockchain Deep Learning Windows Scam Vulnerabilities Vendor Management Redundancy In Internet of Things Information IT Services File Sharing computer services Staten Island Scalability Webcam Virtual Assistant malware Hard disk Printers Smartphone Unified Threat Management Displays Encryption Navigation Experience Bandwidth

Newsletter Sign Up