Back End News

Enterprise Technology – Business, Cloud, Cybersecurity, IoT

Monday, January 18th, 2021|
  • Services

Menu

  • Home
  • About
  • Services
  • Contact
  • Featured
  • News
  • Devices
  • Media Release
  • Shop Now!

Our Services – Talk to us.

SME, Small Business, small and medium enterprises

Photo by Anthony Shkraba on Pexels.com

Top Posts

  • Augmented reality total market value will surpass $140 billion in 2025
    Augmented reality total market value will surpass $140 billion in 2025
  • Acer's new Nitro, Aspire notebooks are powered by new AMD Ryzen 500, Nvidia GeForce RTX 30
    Acer's new Nitro, Aspire notebooks are powered by new AMD Ryzen 500, Nvidia GeForce RTX 30
  • Latest Lenovo ThinkBook laptops built to meet needs of mobile workforce
    Latest Lenovo ThinkBook laptops built to meet needs of mobile workforce
  • UnionBank adds over 11,000 deposit channels with ECPay, 7-Eleven nationwide
    UnionBank adds over 11,000 deposit channels with ECPay, 7-Eleven nationwide
  • Infinix Mobile brings Note 8 to the Philippines
    Infinix Mobile brings Note 8 to the Philippines

Follow Us

  • LinkedIn
  • Twitter
  • Facebook
  • Instagram

Follow us on Twitter

My Tweets
Cybersecurity

Cybersecurity experts trace $500K sextortion bitcoin haul

By Back End News on April 24, 2020

Money paid by the victims of millions of sextortion emails were deposited in the attackers’ bitcoin wallets, the security researchers at SophosLabs found out after following the trail. The total bitcoin haul amounted to $500,000 as indicated in the latest article “Following the Money in a Massive ‘Sextortion’ Spam Scheme.”

Cybersecurity solutions firm Sophos believes this report is the first to trace a bitcoin haul from sextortion.

Sextortion is a widely used form of spam attack that accuses the recipient of visiting a pornographic website and threatens to share video evidence with their friends and family unless the recipient pays. In the examples analyzed, recipients were asked to pay up to $800 in bitcoin into designated wallet addresses.

SophosLabs researchers worked with CipherTrace to track the flow of the money from these wallets. They found that the extorted funds were used to support subsequent illicit activity, such as transacting with dark web marketplaces and buying stolen credit card data. Other funds were quickly moved through a series of wallet addresses to be consolidated, put through “mixers” in an attempt to launder the transactions, or converted to cash.


Sophos sees spike in COVID-19, coronavirus email, phishing scams

Sophos looks at PH to develop, hire cybersecurity professionals


“The cybercriminal underworld is an intricate web and SophosLabs’ research shows how attackers used the money raised in one operation to invest in another,” said Tamás Kocsír, a security researcher at SophosLabs who led the research. “Sextortion scams prey on fear and this makes them an effective way of making quick money. Across the five months of our investigation, we saw wave after wave of attacks, often taking place over the weekend and sometimes accounting for up to a fifth of all spam tracked at SophosLabs. And while most recipients either didn’t open the email or didn’t pay, enough of them did to net the attackers around 50.9 bitcoin, equivalent to nearly $500,000.”

Spam emails

The scams exploited global botnets on compromised PCs to dispatch millions of spam emails to recipients around the world. Vietnam, Brazil, Argentina, the Republic of Korea, India, Italy, Mexico, Poland, Colombia, and Peru are the top 10 countries where these compromised computers were used to dispatch the spam messages, of which 81% were in English, 10% were in Italian, 4% were in German, 3.5% were in French, and 1.2% were in Chinese.

“Spam campaigns are relatively cheap and easy to implement, but the assumption that this means they are launched only by low-skilled, opportunistic attackers could be inaccurate,” said Kocsír. “Our research found that some of the scam emails featured innovative obfuscation techniques designed to bypass anti-spam filters. Examples of this include breaking up the words with invisible random strings, inserting blocks of white garbage text, or adding words in the Cyrillic alphabet to confuse machine scanning. These are not beginner techniques and they are a good reminder that spam attacks of any kind should be taken seriously. A robust approach to cybersecurity is essential. If you are worried about becoming the target of a sextortion scam, disable or cover the camera on your computer.”

SPREAD THE WORD:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • More
  • Click to share on Reddit (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Telegram (Opens in new window)

Have you read?

Categories: Cybersecurity, News

Tagged as: bitcoin, sextortion, Sextortion Bitcoin, sophos, SophosLabs, Spam Email

Post navigation

PSF, Smart launch Text-to-Donate drive for COVID-19 health workers, frontliners
Manulife provides free insurance to Grab, Lalamove riders during ECQ

Published by Back End News

View all posts by Back End News

SUBSCRIBE to our Weekly Newsletter and get a FREE digital magazine!

* indicates required
Email Format

Categories

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Copyright Back End News 2020

Back End News is published by Back End News Limited

Business Address:

Shop 58, Beverley Commercial Centre, 87-105 Chatham Road South, Tsim Sha Tsui, Hong Kong

Categories

  • Top categories: News
Contact | |