Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

Scam Claims to Have Compromising Video… of You

Scam Claims to Have Compromising Video… of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

For a bit of background, it is important to recognize that a full 30 percent of the Internet is made up of pornographic materials. That 30 percent is not short of visitors, either - websites featuring adult content draw more traffic than Amazon, Twitter, and Netflix do together. This prevalence is one of the reasons that this email scam has been as effective as it has.

How the Scam Works
Like most scams, the purpose of this one is to extort money from its victims. A popular way to do this (among criminal circles, of course) is to blackmail them with some piece of information that they would prefer hidden - the more scandalous, the better. This scam claims that the sender of an email has just that information on you.

This scam starts with an email appearing in an inbox:

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The user is then given an address and case-sensitive alphanumeric code into which they are to deposit the sizable ransom. They are advised to use the copy/paste function to make sure the code is correct. Finally, the email ends with a warning:


You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

One thing is for sure: this would be an extremely unsettling email to open your inbox to find. Regardless of which of its many versions you may encounter, it will deliver the same ultimatum: deliver the Bitcoin to me, or I deliver this to everyone in your life.

Don’t Get Excited
This would be a really scary threat, if it was real. There was no video filmed of you, and while the password is one that you once used, it comes from a decade-old hacked database. This threat is little more than that - a threat - but there are still lessons to be learned from an attempt like this.

This scam has been considerably successful, netting over $250,000 over the course of a few weeks, which means that scams like this will continue, and that plenty of people don’t change their passwords the way they should. However, it is also legitimately scary to consider what might happen if this threat someday wasn’t a threat - after all, almost every device today comes with a built-in front facing camera. As a result, it will be hard to be sure that there isn’t footage of you - compromising or otherwise - floating around in some cybercriminal’s system someday.

How to Protect Yourself
Proactive measures are key to foiling any attack like this, especially in regard to your passwords. Properly managing your passwords should be a priority - follow best practices and use different ones, changing them often - and if you have difficulty remembering them, use a password manager to remember them for you.

Plus, you may want to strongly consider covering up your webcam when not intentionally using it. That way, it won’t matter so much how you choose to spend your time.

Regardless, we get it. It can be really hard to keep up with each and every threat and attack that’s out there, between sextortion, ransomware, and all the others. That’s part of the reason that Tekie Geek is here. We do everything we can to protect our clients from compromise, including education and practical defenses. Give us a call at (347) 830-7322 to learn more.

5 Business Communications Solutions
Technology Basics: Blue Screen of Death


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, April 23, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Saving Time Cybercrime Government Black Market Experience Corporate Profile Router computer support firms IT services NYC Office 365 Websites Scam BYOD Business Computing Productivity Banking IT support New York City Emergency Downtime Start Menu Google Wallet Running Cable computer repair Staten Island Managed Service Provider Spam Security Cameras Specifications Managed IT Services Twitter IT consulting Business Mangement Windows 7 Cabling Mobile Technology Multi-Factor Security Healthcare Data Cloud computing Staten Island Safety Managing Stress Accountants IT consulting firm Wi-Fi Time Management Mobile Device Computer Care Help Desk tech support Staten Isalnd Rental Service BDR VoIP Windows 10 Gamification Software computer support Staten Island Network Multi-factor Authentication Telephony Data Security Robot email scam Wireless Laptop Data Analysis LiFi managed services Update Office Google Maps App Privacy Social Engineering Technology IT services Staten Island Hackers computer support NYC Worker today ’s organizations Vendor Mangement Remote Monitoring end-user files Streaming Media Business Metrics Automation Proxy Server Bookmark Employer-Employee Relationship Productivity Public Cloud Vendor Management Evernote Backup Tech Terms Virtualization Modem Tech Support Blockchain Solutions Accidental deletion Securty Staten Island IT support Vulnerability IT consulting firms Disaster Small Business Hacker Social Information Technology Virtual Desktop Thank You Holiday Facebook Word Saving Money Supercomputer SSID Digital Data Backup computer services Staten Island Machine Learning Computers eWaste Fileless Malware Microsoft Excel Sports Tablet Business Growth Maintenance Hosted Solutions Workstations Health IT it support Microchip Computing Infrastructure End of Support Information Drones Google Drive Printers Windows 10 Desktop Taxes File Sharing Cloud Computing Entertainment Flash Mobile Devices Private Cloud Retail IT Consultant Piracy Unified Threat Management managed services Staten Island Knowledge Firewall Mouse Tech Term Workplace Tips Screen Reader SaaS Cleaning Proactive IT Alert Data Breach Two-factor Authentication Backup and Disaster Recovery Health Smartphones computer support tech support Hardware IT support Staten Island Service Level Agreement Unified Communications Cortana Apple How To Save Money Augmented Reality Medical IT Bring Your Own Device Business Continuity Managed IT Services Workers malware worms Addiction Server Mobility G Suite Documents datto malware Hard disk managed it services Miscellaneous Google Identity Theft DDoS Disaster Recovery Flexibility Access Communication Startup Browser IT support Staten Islans Equifax Analytics Telephone Systems Customer Service Quick Tips Windows XP Username Collaboration Congratulations User Tip Microsoft 365 Tracking Computer Malfunction Microsoft Office Wireless Headphones Hardware Solutions Ransomware Patch Management Staten Island computer support Staten Island tech support Passwords Redundancy Hacking Staten Island IT consulting Cooperation Botnet Downloads Cost Management Fake News Vulnerabilities Employer Employee Relationship Project Management Internet of Things Security Television CryptoLocker Tip of the week The Internet of Things Gmail VoIP Software License Smartphone Hiring/Firing Internet Regulation Vendor Database Training Cryptocurrency Music Bitcoin Automobile Email VPN Paperless Office Cache Devices Compliance YouTube Bluetooth Unified Threat Management IT Management Spyware computer services data recovery Download Search Physical Security Wireless Technology Google Docs Society Hard Drive IT consulting Staten Island Lithium-ion battery Remote Computing Budget Android Reliable Computing Tip of the Week Laptops Money Distributed Denial of Service IT consulting NYC Operating System Best Practice Error Touchscreen Chromebook CrashOverride Administrator Apps Business Cards Nanotechnology Hard Drive Disposal IT consulting Staten island Trends Software as a Service Web Server Data storage User Tips computer repair Processors Cybersecurity Comparison WiFi Upgrade Notifications Content data loss Settings IT support Networking Navigation PDF Legislation Digital Payment Document Management Office Tips Big Data Emails Law Enforcement SharePoint managed IT services staten island Printing Hosted Solution Outlook Device security Staffing Microsoft Recovery Integration Website Politics Google Calendar Education Audit Excel Transportation communications Malware Business Google Play Hack Antivirus iPhone Encryption Directions Tactics Telephone Password Displays Legal Tablets IT Services News In Internet of Things History tech support Staten Island Solid State Drive Network Management Managed IT Phishing Cloud Virtual Reality Language Deep Learning Lenovo Memory Virus Virtual Assistant staten island managed services Tech Powerful Technology Solutions Access Control Webcam Content Filtering Mobile Security Innovation Windows 8 IT services New York City IT Support Customer Resource management Processor Professional Services Scalability Uninterrupted Power Supply Management ransomware attacks Browsers Electronic Medical Records IT support firms Text Messaging managed IT services NYC Voice over Internet Protocol Business Management Business Technology Samsung IT consulting company Visible Light Communication Advertising IT support NYC Computer Network Congestion Upload Domains Hacks Relocation Computing Conferencing Monitoring Travel Writing Freedom of Information Gadgets Data Protection PowerPoint HTML Mobile Device Management Telephone System CCTV Best Practices Company Culture Going Green Users Network Security Efficiency Monitors Administration Social Network Windows Outsourced IT IBM Printer Work/Life Balance Artificial Intelligence data recovery Staten Island Managed Service Bandwidth Motion Sickness Term Data Management Meetings Regulations Applications 3D Printing Social Media

Newsletter Sign Up