LinkedIn Used As The Vehicle For A Global Scam

In a world where everyone is so dependent on social media, apps and the Internet as a whole, it’s no surprise to see cyber-crime hitting new heights. Cyber criminals keep coming up with novel ways to target vulnerable users but this new report by a security research firm comes as a real revelation. Cyber criminals are looking at “targets” who are vulnerable to ‘sextortion’. 

According a report by security research firm Digital Shadows, “The extortionist provides the user with a known password as “proof” of compromise, then claims to have video footage of the victim watching adult content online, and finally urges them to pay a ransom to a specified Bitcoin (BTC) address.”

The report further highlights that the people who are targeted are relative high net-worth individuals (HNIs) and include doctors and lawyers whose LinkedIn profiles are scoured by cyber criminals. Cyber criminals are actually, according to the report, training extortionists and even sell something called blackmail guides for as much as $10. 

Digital Shadows gives an example of a ‘sextortion’ tactic and how it works. Criminals start by creating a profile and then embark on an online relationship with a married man and then threatens to reveal details of the affair with his partner unless a ransom is paid. 

What’s more interesting is that cyber-crime groups are “promising salaries averaging the equivalent of $360,000 per year to accomplices who can help them target high-worth individuals, such as company executives, lawyers and doctors with extortion scams.” 

The salaries, based on certain conditions, can go as high as $1,080,000 per year.

So far, according to Digital Shadows’ tracking campaign, a sample of 'sextortion' cases were found from July 2018 to February 2019. About 89,000 unique recipients faced some 792,000 extortion attempts against them. 

The Digital Shadows report further reveals that “an analysis of Bitcoin wallets associated with these scams found that 'sextortionists' could be reaping an average of $540 per victim.” On an average, victims have paid Rs 39,000 to these 'sextortionists'. 

Times Of India

You Might Also Read:

Reputational Damage & The Human Factor In Social Media:

 

 

« US Cyber Command Can Cut Russian Troll Access
What's The Difference Between AI And Machine Learning? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

International Organization for Standardization (ISO)

International Organization for Standardization (ISO)

ISO is an independent, non-governmental international standards organization. The ISO/IEC 27001 is the standard for information security management systems.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

MSAB

MSAB

MSAB is a pioneer in forensic technology for mobile device examination.

CyberSecurity Malaysia

CyberSecurity Malaysia

CyberSecurity Malaysia is the national cyber security specialist agency under the Ministry of Science, Technology and Innovation (MOSTI).

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

Thrive

Thrive

Thrive delivers the experience, resources, and expertise needed to create a comprehensive cyber security plan that covers your vital data, SaaS applications, end users, and critical infrastructure.

Cytenna

Cytenna

Cytenna Signal is a suite of SaaS (Software-as-a-Service) products that use AI and machine learning to automatically aggregate the latest information about software vulnerabilities.

Secuvant

Secuvant

Secuvant is an independent IT Security firm providing enterprise-grade IT security services to mid-market organizations.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

Comcast Business

Comcast Business

Comcast Business keeps businesses ready for what’s next with powerful connectivity, advanced cybersecurity solutions, and the right people at your side.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

RealTyme

RealTyme

RealTyme is a secure communication and collaboration platform with privacy and human experience at its core.

Avalon Cyber

Avalon Cyber

Arm your organization in the fight against cyberattacks by partnering with the experts at Avalon Cyber.