Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

Scam Claims to Have Compromising Video… of You

Scam Claims to Have Compromising Video… of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

For a bit of background, it is important to recognize that a full 30 percent of the Internet is made up of pornographic materials. That 30 percent is not short of visitors, either - websites featuring adult content draw more traffic than Amazon, Twitter, and Netflix do together. This prevalence is one of the reasons that this email scam has been as effective as it has.

How the Scam Works
Like most scams, the purpose of this one is to extort money from its victims. A popular way to do this (among criminal circles, of course) is to blackmail them with some piece of information that they would prefer hidden - the more scandalous, the better. This scam claims that the sender of an email has just that information on you.

This scam starts with an email appearing in an inbox:

“You don’t know me and you’re thinking why you received this email, right?

Well, I actually placed a malware on the porn website and guess what, you visited this web site to have fun (you know what I mean). While you were watching the video, your web browser acted as a RDP (Remote Desktop) and a keylogger which provided me access to your display screen and webcam. Right after that, my software gathered all your contacts from your Messenger, Facebook account, and email account.

What exactly did I do?

I made a split-screen video. First part recorded the video you were viewing (you’ve got a fine taste haha), and next part recorded your webcam (Yep! It’s you doing nasty things!).

What should you do?

Well, I believe, $1400 is a fair price for our little secret. You’ll make the payment via Bitcoin to the below address (if you don’t know this, search “how to buy bitcoin” in Google).”

The user is then given an address and case-sensitive alphanumeric code into which they are to deposit the sizable ransom. They are advised to use the copy/paste function to make sure the code is correct. Finally, the email ends with a warning:


You have 24 hours in order to make the payment. (I have an unique pixel within this email message, and right now I know that you have read this email). If I don’t get the payment, I will send your video to all of your contacts including relatives, coworkers, and so forth. Nonetheless, if I do get paid, I will erase the video immidiately [sic]. If you want evidence, reply with “Yes!” and I will send your video recording to your 5 friends. This is a non-negotiable offer, so don’t waste my time and yours by replying to this email.”

One thing is for sure: this would be an extremely unsettling email to open your inbox to find. Regardless of which of its many versions you may encounter, it will deliver the same ultimatum: deliver the Bitcoin to me, or I deliver this to everyone in your life.

Don’t Get Excited
This would be a really scary threat, if it was real. There was no video filmed of you, and while the password is one that you once used, it comes from a decade-old hacked database. This threat is little more than that - a threat - but there are still lessons to be learned from an attempt like this.

This scam has been considerably successful, netting over $250,000 over the course of a few weeks, which means that scams like this will continue, and that plenty of people don’t change their passwords the way they should. However, it is also legitimately scary to consider what might happen if this threat someday wasn’t a threat - after all, almost every device today comes with a built-in front facing camera. As a result, it will be hard to be sure that there isn’t footage of you - compromising or otherwise - floating around in some cybercriminal’s system someday.

How to Protect Yourself
Proactive measures are key to foiling any attack like this, especially in regard to your passwords. Properly managing your passwords should be a priority - follow best practices and use different ones, changing them often - and if you have difficulty remembering them, use a password manager to remember them for you.

Plus, you may want to strongly consider covering up your webcam when not intentionally using it. That way, it won’t matter so much how you choose to spend your time.

Regardless, we get it. It can be really hard to keep up with each and every threat and attack that’s out there, between sextortion, ransomware, and all the others. That’s part of the reason that Tekie Geek is here. We do everything we can to protect our clients from compromise, including education and practical defenses. Give us a call at (347) 830-7322 to learn more.

5 Business Communications Solutions
Technology Basics: Blue Screen of Death


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, January 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Google Docs Social Device security Error Lithium-ion battery History Management Websites Innovation Google Drive managed services Staten Island Vendor Mangement it support Navigation Budget Evernote Multi-Factor Security Cryptocurrency App Technology Processor Internet of Things Ransomware Healthcare Cybercrime Office Tips Managed IT Services Microsoft Office Apps Best Practice Saving Money Staten Island tech support tech support Staten Island Blockchain Mobile Technology Two-factor Authentication Smartphones Motion Sickness Banking Multi-factor Authentication Office 365 Printer Writing IT services Staten Island Lenovo computer repair WiFi Disaster Tracking Sports Chromebook HTML Windows 10 SaaS Laptop computer support NYC Operating System Unified Communications Network Security Society Patch Management Miscellaneous Deep Learning End of Support Holiday Analytics Scam Downtime Data Privacy data loss Entertainment Vulnerabilities Apple Windows Encryption Network Mobile Devices Congratulations Fake News Company Culture Wireless CryptoLocker Advertising Computer Malfunction Data Analysis Displays Artificial Intelligence BYOD IT consulting firm Business Computing Google Maps Physical Security communications Digital IT consulting firms Identity Theft Cloud computing Staten Island Hacks Corporate Profile staten island managed services Windows 8 Collaboration LiFi File Sharing managed IT services NYC Users Touchscreen Managed Service Provider Powerful Technology Solutions Cloud Business Continuity Printers Proxy Server Tech Term Word Software as a Service Conferencing Microsoft Excel Employer Employee Relationship Google Calendar Retail Microchip Meetings Taxes Software PDF email scam Security Tablet Virtual Desktop How To Hacking tech support Remote Monitoring Emails Addiction Tech IT Consultant Hard Drive Disposal CrashOverride Machine Learning Cloud Computing Bitcoin Tech Terms Content Service Level Agreement Firewall Business Technology SSID Administrator SharePoint Trends Flexibility IT services New York City Business Mangement Communication Desktop Samsung today ’s organizations Unified Threat Management Managing Stress Customer Service Bandwidth Directions Mobility Social Network computer support Backup Content Filtering Hacker computer services IT consulting Gadgets Networking Start Menu Data storage Remote Computing Website Upload Virtualization YouTube Help Desk Username datto managed IT services staten island Digital Payment Solid State Drive Computer Care Data Management Botnet Training IT consulting NYC Cybersecurity Google Wallet Virtual Assistant Modem Maintenance Devices Notifications Legal Automation managed services Hosted Solutions Fileless Malware Vendor Private Cloud Computing Infrastructure malware Hard disk Wireless Technology Access Control Information Technology Facebook Google Twitter Automobile Travel Supercomputer Black Market Productivity Screen Reader Printing IT Management Project Management Work/Life Balance Customer Resource management IT Services Freedom of Information Telephone Systems IT support New York City ransomware attacks Managed IT Services Securty Tip of the Week Vulnerability Monitoring IT Support Audit User Tip computer support firms Legislation Router Network Congestion Term VoIP Managed IT Flash Health Accidental deletion Internet Electronic Medical Records Disaster Recovery Applications Passwords Web Server Telephone System Email end-user files Business Cards Emergency Password Telephone Outlook Piracy Cleaning Distributed Denial of Service Phishing Language Social Engineering Server Hackers VoIP IT services NYC Android Tech Support Laptops Network Management Antivirus Augmented Reality Search Relocation IT consulting company Smartphone Staffing Office IT consulting Staten Island Knowledge Update computer support Staten Island Recovery Browsers Hiring/Firing Robot Time Management G Suite Tactics Going Green Settings Safety IBM Download Proactive IT Data Backup Big Data Database BDR IT consulting Staten island Alert Malware News Microsoft Politics Wi-Fi Gamification Public Cloud Mobile Device Unified Threat Management Staten Island computer support IT support Backup and Disaster Recovery VPN Running Cable Mobile Security Access Employer-Employee Relationship Accountants Tablets Data Breach data recovery Staten Island DDoS CCTV Google Play Social Media Spam Hardware Solutions User Tips IT support NYC Mobile Device Management Small Business Bluetooth Monitors Television Saving Time Government Equifax Virus eWaste Workstations Domains Security Cameras Compliance Computer In Internet of Things Document Management Excel Visible Light Communication Webcam Hosted Solution Computing Education Cabling Streaming Media Quick Tips Computers The Internet of Things Bookmark Processors Hardware Data Protection Workers Law Enforcement Telephony Workplace Tips Cost Management Save Money Administration Staten Island IT consulting Upgrade computer repair Staten Island tech support Staten Isalnd Comparison Music Reliable Computing Best Practices Cache Thank You Redundancy Virtual Reality Staten Island IT support IT support Staten Island Memory Hack Information Windows 10 Business Management malware worms Outsourced IT Efficiency Cortana Health IT Experience Data Security managed it services Business Growth Spyware Downloads Mouse IT support Staten Islans Drones Managed Service Business Regulations Gmail Scalability Worker Startup IT support firms Money Regulation Browser Hard Drive Documents Software License Tip of the week Rental Service Business Metrics Nanotechnology computer services Staten Island Productivity Uninterrupted Power Supply Paperless Office Text Messaging data recovery Specifications Bring Your Own Device Wireless Headphones Windows XP Vendor Management 3D Printing

Newsletter Sign Up