As I discuss in another report, sextortion scammers have lately been including user passwords in their scam emails as a way of making their false claim seem more plausible. And, in another variation, the scammers include part of the recipient’s phone number instead of the password.
These fake blackmail sextortion scams are not new. Typically, the scammers send out many thousands of identical emails that claim that they have used malware to capture video of the recipient visiting a porn site. They warn that they will send this compromising video to all of the recipient’s contacts if they do not receive a payment via Bitcoin.
But in fact, the scammers have not really created the compromising video or installed any malware. Nor have they hijacked the recipient’s contacts list. The whole thing is just a bluff. But, the scammers bank on the fact that at least a few recipients will be panicked into sending the requested money.
And, including real passwords and real phone numbers certainly increases the likelihood that recipients will believe the bogus claims, panic, and pay up.
Of course, passwords and phone numbers or not, the scam is still the same old bluff.
So, how are the scammers getting the passwords and phone numbers and matching them with the correct email addresses?
It is likely that the scammers are using some sort of script that extracts passwords and phone numbers from an old data breach and automatically matches it to the corresponding email address. The scammers can then distribute large numbers of scam emails that will all be identical except for the password or phone number that matches each email address.
The scammers may be using phone numbers rather than passwords simply because, while people will (hopefully) change their passwords fairly regularly, they will likely keep the same phone numbers for long periods. Many people have reported that the passwords included in the scam emails are very old and no longer in use. But, receiving a version of the scam email that includes your current phone number may make it appear that the scammer really does have access to your information.
And, of course, phone numbers are much more accessible and open than user passwords and may be available from a variety of sources including phone directories, websites, social media pages, and email signatures. But, to make the scam work effectively, the scammers would need to employ some mechanism to quickly match a great many phone numbers and email addresses. So they are likely using some sort of database – breached or otherwise – that includes both pieces of information.
If you receive one of these emails, the best thing to do is just hit the delete button. Do not reply or respond in any way.
However, if the email includes your real password or phone number you should check that the corresponding email address is not associated with a known data breach. You can do so by entering the email address into Troy Hunt’s excellent “have i been pwned” service.
If any accounts that use that email address have been breached, you should certainly change the account passwords as soon as possible. In fact, regardless of breaches, it is a good idea to change your passwords regularly.
Read more information about fake blackmail sextortion scams:
Importance NoticeAfter considerable thought and with an ache in my heart, I have decided that the time has come to close down the Hoax-Slayer website.
These days, the site does not generate enough revenue to cover expenses, and I do not have the financial resources to sustain it going forward.
Moreover, I now work long hours in a full-time and physically taxing job, so maintaining and managing the website and publishing new material has become difficult for me.
And finally, after 18 years of writing about scams and hoaxes, I feel that it is time for me to take my fingers off the keyboard and focus on other projects and pastimes.
When I first started Hoax-Slayer, I never dreamed that I would still be working on the project all these years later or that it would become such an important part of my life. It's been a fantastic and engaging experience and one that I will always treasure.
I hope that my work over the years has helped to make the Internet a little safer and thwarted the activities of at least a few scammers and malicious pranksters.
A Big Thank YouI would also like to thank all of those wonderful people who have supported the project by sharing information from the site, contributing examples of scams and hoaxes, offering suggestions, donating funds, or helping behind the scenes.
I would especially like to thank David White for his tireless contribution to the Hoax-Slayer Facebook Page over many years. David's support has been invaluable, and I can not thank him enough.
Closing DateHoax-Slayer will still be around for a few weeks while I wind things down. The site will go offline on May 31, 2021. While I will not be publishing any new posts, you can still access existing material on the site until the date of closure.
Thank you, one and all!