• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Researchers Block Two Million Extortion Emails Daily

You are here: Home / General Cyber Security News / Researchers Block Two Million Extortion Emails Daily
June 10, 2022

Security scientists are warning end users to be on the lookout for extortion cons after revealing they block millions of this kind of e-mails just about every day.

Proofpoint claimed in a new website post that it blocks on ordinary a million extortion e-mails just about every 24 hrs, growing to two million on significant quantity days.

These usually occur in the type of some sort of sextortion theme – the attacker promises to have a webcam video of the victim looking at porn and threatens to distribute it to all of their email contacts except if a ransom is compensated in cryptocurrency.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


These types of threats are not new, but the info from Proofpoint demonstrates how popular they have develop into. Normally, sufferer data these types of as passwords is involved in the email to increase legitimacy to the menace actor’s claim that they have hijacked the machine. In truth, they are normally attained from info breaches.

As much back again as 2016, the UK’s Nationwide Crime Agency (NCA) warned that thousands of victims had been falling to sextortion cons in the country just about every year.

Cryptocurrency payments are a key element of these threats, enabling the attacker to keep on being nameless.

“Proofpoint scientists evaluate with significant self-confidence the extortion department of the BEC taxonomy would not be as productive or as profound as it is nowadays without the need of cryptocurrency,” the vendor claimed.

Nevertheless, crypto is also getting made use of and abused in a variety of other ripoffs, such as more conventional invoice-themed business email compromise (BEC), explained Proofpoint.

In some conditions, cryptocurrency wallets by themselves are targeted in credential phishing attacks. Menace actors generally spoof large names in the sector, such as cryptocurrency exchanges Celo and Binance and wallet vendor Reliable Wallet. Phishing for NFT credentials employs related tactics, Proofpoint spelled out.

Uncomplicated-to-use phishing kits easily available on the dark web make the work even much easier for would-be cyber-criminals.


Some sections of this post are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Russia: Cyber-Attacks Could Escalate Military Conflict
Next Post: Potent Emotet Variant Spreads Via Stolen Email Credentials potent emotet variant spreads via stolen email credentials»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies
  • China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies

Copyright © TheCyberSecurity.News, All Rights Reserved.