{"id":214,"date":"2021-01-04T17:18:01","date_gmt":"2021-01-05T01:18:01","guid":{"rendered":"http:\/\/blogs.pugetsound.edu\/infosec\/?p=214"},"modified":"2021-01-08T15:09:58","modified_gmt":"2021-01-08T23:09:58","slug":"phishing-from-12-30-2020-i-have-full-control-of-your-device","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/infosec\/the-phish-tank\/214","title":{"rendered":"Phishing from 12\/30\/2020: &#8220;I have full control of your device&#8221;"},"content":{"rendered":"\n<p class=\"has-large-font-size\">Original Phishing Message<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"428\" src=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/01\/12-30-20-extortion-bitcoin-1024x428.png\" alt=\"\" class=\"wp-image-215\" srcset=\"https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/01\/12-30-20-extortion-bitcoin-1024x428.png 1024w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/01\/12-30-20-extortion-bitcoin-300x125.png 300w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/01\/12-30-20-extortion-bitcoin-768x321.png 768w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/01\/12-30-20-extortion-bitcoin-1536x642.png 1536w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/01\/12-30-20-extortion-bitcoin-1440x602.png 1440w, https:\/\/blogs.pugetsound.edu\/infosec\/files\/2021\/01\/12-30-20-extortion-bitcoin.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-large-font-size\">Tips on Handling &#8220;Sextortion&#8221; Emails<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>This email is an example of an extortion scam. As a general rule, do not engage with blackmailers. <\/li><li>The sender claims to have acquired compromising information from accessing your device. Typically, these are empty threats and you do not need to be concerned. You can always run a malware scan if you have anti-virus installed on your machine.<\/li><li>These emails are sent to massive lists of email addresses with financial gain in mind. The attackers&#8217; hope is that some people will be frightened into paying Bitcoin for the false assurance that the compromising information will not be released. <\/li><li>You can always contact the Service Desk if you are unsure about the validity of an email.<\/li><li>For more information about this type of phishing email, MalwareBytes has an informative article concerning this: <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2020\/05\/what-to-do-when-you-receive-an-extortion-e-mail\/\" data-type=\"URL\" data-id=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2020\/05\/what-to-do-when-you-receive-an-extortion-e-mail\/\">https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2020\/05\/what-to-do-when-you-receive-an-extortion-e-mail\/<\/a>. <\/li><\/ul>\n\n\n\n<p class=\"has-large-font-size\">Text of Phishing Message<\/p>\n\n\n\n<p>From: steve.holmes[@]capellabioscience.com<br>Subject Line: I have full control of your device<\/p>\n\n\n\n<p>Hi<br><br>Did you notice that I sent you an email from your address? Yes, that means I have full control of your device. I am aware you watch adults contents with underage teens frequently. My spyware recorded a video of you masturbating. I also got access to your address book. I am happy to share these interesting videos with your address list and social media contacts. To prevent this from happening, you need to send me 1000 (USD) in bitcoins.<br><br>Bitcoin wallet part 1:&nbsp; 17qBCU7Y5yrS9eimxvydRYw<br><br>Bitcoin wallet part 2: 3XNF9meuSCY<br><br>Combine part 1 and part 2 with no space between them to get the full bitcoin wallet.<br><br>Quick tip! You can&nbsp;procure bitcoins from Paxful. Use Google to find it.<br><br>Once I receive the compensation (Yes, consider it a compensation), I will immediately delete the videos, and you will never hear from me again. You have three days to send the amount. I will receive a notification once this email is opened, and the countdown will begin.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Original Phishing Message Tips on Handling &#8220;Sextortion&#8221; Emails This email is an example of an extortion scam. As a general rule, do not engage with blackmailers. The sender claims to have acquired compromising information from accessing your device. Typically, these are empty threats and you do not need to be concerned. You can always run [&hellip;]<\/p>\n","protected":false},"author":521,"featured_media":221,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,4],"class_list":["post-214","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-phish-tank","tag-phishing","tag-phishtank"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/comments?post=214"}],"version-history":[{"count":3,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/214\/revisions"}],"predecessor-version":[{"id":232,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/posts\/214\/revisions\/232"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media\/221"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/media?parent=214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/categories?post=214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/infosec\/wp-json\/wp\/v2\/tags?post=214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}