Database of accounts targeted by sextortion | xxxDatabase of accounts targeted by sextortion – xxx
菜单

Database of accounts targeted by sextortion

八月 5, 2019 - BleepingComputer

Database of accounts targeted by sextortion

An active sextortion campaign actively targeting a large database of more than 200 million compromised email accounts has been spotted by researchers at Cofense Labs.

Extortion emails are being sent by scammer outfits either with the help of massive spam botnets or via smaller and more targeted spam campaigns.

The number of extortion emails delivered that reach the targets’ inboxes are on a continuous rise, especially since the crooks behind these cybercriminal operations are also coming up with new approaches to monetize their databases of leaked email accounts.

Database of accounts targeted by sextortion

Cofense Labs, Cofense’s new arm of research and development discovered the botnet that targets the over 200 million leaked accounts in the database with sextortion emails in June 2019.

The scammers’ activity is being monitored on a daily basis by the researchers with the end goal being of keeping a close eye on new email addresses being targeted, as well as keep track of a malware strain this malicious campaign is currently distributing.

The full database is now searchable online on the Cofense website and it can be accessed HERE, allowing potential future victims of this sextortion campaign to take mitigation measures and not fall for the scammers’ panic-inducing tricks.

Database of accounts targeted by sextortion
Sextortion database

“If your email address is found in a target list used by the botnet, it’s highly likely you will receive a sextortion email – if you haven’t already. We felt it was critical to get this information out,” says Cofense Co-Founder and CTO Aaron Higbee.

“We hope that victims receiving a sextortion email will find our resource center so they can avoid the anxiety and stress of trying to figure out whether to pay a bitcoin ransom.”

“This botnet is not infecting computers to acquire new data sets – it is a true ‘spray and pray’ attack reusing credentials culled from past data breaches to fuel legitimacy and panic through sextortion scams.”

Cofense recommends taking the following measures to prevent being tricked by this sextortion campaign:

• Change passwords immediately
• Consider using a password manager to keep passwords strong and unique
• Enable two-factor authentication whenever that is an option on online accounts
• Use a webcam cover – malware can access webcam’s without user knowledge
• If a sextortion email is received, we recommend that you do not respond to the email or pay the ransom

Sextortion emails on the rise

Sextortion is a very specific type of email scam that was first seen in the wild during July 2018, when crooks started emailing their victims claiming that they have them recorded on video while browsing adult sites.

To make their scams messages more credible, they also include the passwords that were leaked with the accounts as part of a data breach dump. 

Besides extorting money from people fearing that their adult site browsing history will be made public, the crooks behind sextortion campaign have also started distributing various strains of malware from ransomware to data-stealing Trojans.

So far, 30 victims have paid more than $50,000 in total. (and I have only examined 42 BTC addresses, my expectation is that there are thousands of them) Thanks to everyone who sends the Bitcoin addresses to me. cc: @danielverlaan @BleepinComputer @KarinSpaink https://t.co/9k83hSogBF

— SecGuru (@SecGuru_OTX) July 19, 2018

Sextortion scams were and still are an extremely successful operation, with one of the campaigns having raked in over $50,000 within a single week in July.

To have an even more clear idea of how much sextortion scam operators collect from their victims, ISC handler Rick Wanner found after tracking only a handful of Bitcoin addresses used by the crooks to consolidate their earnings that they’ve raked in at least $69 Billion.

“It is important to remember that these consolidation addresses are the ones I was able to find using only our very limited set of tracked Sexploitation BTC addresses, there are very likely many more consolidation addresses in use,” Wanner says in his Sextortion: Follow the Money – The Final Chapter report published today.

Database of accounts targeted by sextortion
Sextortion consolidation addresses

Related Articles:

Extortion Emails on the Rise: A Look at The Different Types

New Sextortion Email Uses CIA Investigation as Scare Tactic

Extortion Scam Claims EternalBlue Was Used to Install a Backdoor

New ‘US State Police’ Extortion Scam Includes Contact Numbers

Beware of Fake Microsoft OneNote Audio Note Phishing Emails

Forum Rules and Posting Guidelines

Bleeping Computer® is a community of individuals of all ages who are here to learn new information, to help each other, and to help their fellow peers. With that in mind, we ask that all members please follow these simple rules in order to create an atmosphere where everyone feels comfortable.

The rules are as follows:

Violation of any of these rules can lead to a banning of the user from our Web Site and a deletion of their account. The consequences will be determined by the Staff on a case by case basis.

When posting you agree that the administrators and the moderators of this forum have the right to modify, delete, edit or close any topic, signature, account, or profile data at any time that they see fit. If you have any questions concerning this, please do not start a new thread, but rather private message to an administrator or moderator.

contact us


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51