Share This:

From our sponsor

sextortion scamsSextortion scams are a type of extortion where criminals attempt to extort money from victims by threatening to release explicit images or videos unless demands are met. Leveraging usernames and passwords stolen in data breaches, criminals contact victims and claim to have compromising content, allegedly from the victim’s computer and threaten to publicly share it if victims don’t pay up.

Key findings

  • Barracuda threat researchers have identified evolving tactics being used by cybercriminals in targeted sextortion scams.
  • Criminals are now frequently using victims’ addresses and photos of their homes to better personalize sextortion phishing attacks and increase the pressure to pay.
  • Extortion demands are increasing from hundreds to thousands of dollars, and criminals are making it easier for victims to pay with quick response (QR) codes.

Evolving tactics add personalization and pressure

Barracuda research shows that extortion emails make up roughly 3% of the total number of targeted phishing attacks detected annually. Most of these are sextortion attacks. Every incident is a serious crime with a potentially devastating impact that can range from monetary loss to significant emotional and mental distress.

Barracuda researchers have identified evolving tactics — including advanced personalization — being used by criminals in these targeted attacks. Criminals are leveraging the personal data of targeted victims, including full names, telephone numbers, and addresses, to make their sextortion attempts more threatening and convincing. The sextortion emails address the victim by their first and last name, and the opening sentences of the email include the victim’s telephone number, street address, and city.

In many cases, emails start with a copy like this: “I know that calling [telephone number] or visiting [street address] would be a better way to have a chat with you in case you don’t cooperate. Don’t even try to escape from this. You have no idea what I’m capable of in [city].”

An image from Google Maps of the target’s location is now frequently being included in the sextortion email. In analyzed emails, images included either a residential or commercial location, depending on the address associated with the victim’s stolen data.

The payment demands are increasing. In the past, sextortion emails typically demanded payments of a couple of hundred dollars, up to about $500 maximum. In the latest attacks seen by Barracuda researchers, the amounts are $1,950 and $2,000.

Different copy variations are being tested. While most of the copy in the emails is identical or very similar, there are some variations.

For example, several variations are being used in the line of copy that appears just before the Google Map image of the victim’s address, including:

  • See you here?
  • Can you notice something here?
  • Is this the right place to meet?

Likewise, variations are being used in the line of copy that appears just below the Bitcoin payment information, including:

  • Once you pay up, you’ll sleep like a baby. I keep my word.
  • Let me tell ya, it’s peanuts for your peace.
  • Let me tell ya, it’s peanuts for your tranquility.

Additional points of personalization are being used. In some of the sextortion emails, an additional point of personalization is being included in the last sentence of the final paragraph that appears before the image of the victim’s address: “I don’t make mistakes, [first name.]” the email warns.

Criminals are leveraging technology to expedite payment. In some cases, quick response (QR) codes are being provided in the emails to make it faster and easier for victims to send Bitcoin payments to criminals. In the emails that include them, the QR codes appear directly below the bitcoin address.

Examples of sextortion emails

sextortion scams

Criminals are using the full names, telephone numbers, and addresses of targeted victims to make their attempts more threatening and convincing.

threat spotlight

An image of the recipient’s location, based on either their home or work address, is now being included in sextortion emails.

Some of the latest sextortion emails include a quick response (QR) code to make it easier for the victim to send their Bitcoin payment to the criminals.

While most of the copy in the sextortion emails is identical or very similar, there are some variations being used, including in the stand-alone line that appears just below the Bitcoin payment information.

Protecting against sextortion scams

Sextortion emails are usually sent to thousands of people at a time as part of larger spam campaigns, so most get caught in spam filters. But attackers also vary and personalize the content of the emails, making them more difficult for spam filters to detect and stop.

Scammers are continually evolving their email fraud techniques, including using social-engineering tactics to bypass traditional email security gateways. Sextortion emails that end up in inboxes typically do so because they originate from high-reputation senders and IPs; hackers use already-compromised Microsoft 365 or Gmail accounts.

Here are several ways to defend against sextortion scams:

AI-based protection — Attackers are continually adapting sextortion emails to bypass email gateways and spam filters, so a good spear-phishing solution that uses AI to detect and protect against these and other email attacks is a must.

Account-takeover protection — Many sextortion attacks originate from compromised accounts; be sure scammers aren’t using your organization as a base camp to launch these attacks. Deploy technology that uses AI to recognize when accounts have been compromised, allowing you to remediate in real time by alerting users and removing malicious emails sent from compromised accounts.

Proactive investigations — Given the nature of sextortion scams, employees might be less willing than usual to report these attacks due to the intentionally embarrassing and sensitive nature of the threats. Conduct regular searches on delivered mail to detect emails related to password changes, security alerts, and other content. Many sextortion emails originate from outside North America or Western Europe. Evaluate where your delivered mail is coming from, review any of suspicious origin, and remediate.

Security-awareness training — Educate users about sextortion fraud, especially if you have a large and diverse user base. Make it part of your security awareness training program. Ensure employees can recognize these attacks, understand their fraudulent nature, and feel comfortable and know how to report them. Use phishing simulation to test the effectiveness of your training.

System maintenance — Keeping browsers and operating systems up-to-date helps prevent exploits from infecting computers. Sextortion emails can infect targets’ devices with malware, and keeping browsers and operating systems up-to-date prevents infection.

Related Resources:

This article was originally published at Barracuda Blog.

Photo: Antonio Guillem / Shutterstock


Share This:
Kyle Blanker

Posted by Kyle Blanker

Kyle Blanker is a Sr. Software Engineer in the Advanced Technology Group at Barracuda.

Leave a reply

Your email address will not be published. Required fields are marked *