Herald on Sunday

SEXTORTION: KIWIS TARGETED IN NEW CYBER SCAM

Email threatens porn-watching history and webcam video will be sent out.

- By Chris Reed

A“sextortion” scam that threatens to expose porn-viewing habits unless you pay a Bitcoin “ransom” has hit New Zealand.

The scam is in the form of an email claiming the sender has hacked the recipient’s computer and got a copy of their website history.

The email says the victim has visited an adult website and the scammer has recorded what they were doing via the computer’s webcam.

The message contains details of a real password created by the victim to add legitimacy.

Recipients are told to pay a ransom of between $1700 and $3000, often via Bitcoin.

The scammer threatens to release the content to the victim’s family, friends and workplace if they do not pay up.

The scam, which is also doing the rounds in the UK and US, is on the radar of Cert NZ, the government agency tasked with improving cyber-security.

Police have been contacted by several victims.

Cert NZ senior incident manager Erica Anderson said scams where people claim to have access to webcams tend to go through spikes.

“That’s what we’re experienci­ng at present. Multiple reports are being received daily about this issue.

“We know that scams like this prey on people being too embarrasse­d to seek help, so we assume that the reports we’ve received are only the tip of the iceberg and may not be an accurate reflection of the true impact of an incident like this.”

Anderson said the use of real passwords made the scam slightly different.

“In reality, the scammer gets the password from one of the data leaks that have been posted online. They are taking advantage of finding this data leak and are trying to pretend they have access to your computer.”

Cert NZ said it couldn’t confirm whether video recordings existed or it was simply an “opportunis­tic” scam.

“We haven’t had any reports of scammers releasing a video when a ransom isn’t paid.”

The scam is also known to our two biggest telcos.

Vodafone’s security team monitors many sources of informatio­n to identify credible threats. Team member Mark Corrigan said the “sextortion” email had some unusual characteri­stics.

As well as containing real passwords, there was no link to click on or attached file — add-ons that are common in scam emails and often attract the attention of anti-virus software or spam filters.

Corrigan thought the passwords were harvested from a major hack that happened in 2012.

“I think that was what they were hoping their key to success would be, that someone would see it and say ‘crap, that’s my password, so if that’s real the rest must be real as well’.” Corrigan presumed the details about how to pay the Bitcoin ransom were legitimate. Spark had received a small number of reports from customers. A spokeswoma­n said they recommende­d marking it as spam and reporting it by sending a screenshot to reportphis­hing@xtra.co.nz The Forbes website reported a digital security researcher known as SecGuru had ascertaine­d that more than 150 people had paid US$250,000 in Bitcoin as a result of the scam.

 ??  ??

Newspapers in English

Newspapers from New Zealand