{"id":2853,"date":"2019-04-06T19:34:14","date_gmt":"2019-04-06T19:34:14","guid":{"rendered":"http:\/\/www.syyhoaxanalyzer.com\/?p=2853"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-29T17:00:00","slug":"Sextortion-Scammers-Using-Phone-Numbers-as-Well-as-Passwords","status":"publish","type":"post","link":"https:\/\/www.syyhoaxanalyzer.com\/?p=2853","title":{"rendered":"Sextortion Scammers Using Phone Numbers as Well as Passwords"},"content":{"rendered":"<div>\n<p>As I discuss in <a href=\"https:\/\/www.hoax-slayer.net\/fake-blackmail-sextortion-scam-emails-using-real-passwords\/\">another report<\/a>, sextortion scammers have lately been including user passwords in their scam emails as a way of making their false claim seem more plausible. And, in another variation, the scammers include part of the recipient&#8217;s phone number instead of the password. \u00a0 <\/p>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HS Net Top Content Responsive --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"4870821038\"\n     data-ad-format=\"auto\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<p>These <a href=\"https:\/\/www.hoax-slayer.net\/tag\/sextortion\/\">fake blackmail sextortion scams<\/a> are not new. \u00a0 Typically, the scammers send out many thousands of identical emails that claim that they have used malware to capture video of the recipient visiting a porn site. \u00a0 They warn that they will send this compromising video to all of the recipient&#8217;s contacts if they do not receive \u00a0a payment via Bitcoin.<\/p>\n<p>But in fact, the scammers have not really created the compromising video or installed any malware. Nor have they hijacked the recipient&#8217;s contacts \u00a0list. \u00a0 The whole thing is just a bluff. But, the scammers bank on the fact that at least a few recipients will be panicked into sending the requested money.<\/p>\n<p>And, including real passwords and real phone numbers certainly increases the likelihood that recipients will believe the bogus claims, panic, and pay up.<\/p>\n<p>Of course, passwords and phone numbers or not, the scam is still the same old bluff.<\/p>\n<p>So, how are the scammers \u00a0getting the passwords and phone numbers and matching them with the correct email addresses?<\/p>\n<p>It is likely that the scammers are using some sort of script that extracts passwords and phone numbers<a href=\"https:\/\/krebsonsecurity.com\/2018\/07\/sextortion-scam-uses-recipients-hacked-passwords\/\"> from an old data breach<\/a> and automatically matches it to the corresponding email address. \u00a0The scammers can then distribute \u00a0large numbers of scam emails that will all be identical except for the password or phone number that matches each email address.<\/p>\n<p>The scammers may be using phone numbers rather than passwords simply because, while people will (hopefully) change their passwords \u00a0fairly regularly, they will likely keep the same phone numbers for long periods. \u00a0 Many people have reported that the passwords included in the scam emails are very old and no longer in use. But, receiving a version of the scam email that includes \u00a0your current phone number may make it appear that the scammer \u00a0really does have access to your information. \u00a0<\/p>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block; text-align:center;\"\n     data-ad-format=\"fluid\"\n     data-ad-layout=\"in-article\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"9162856233\"><\/ins><br \/>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<p>And, of course, phone numbers are much more accessible and open \u00a0than user passwords and may be available from a variety of sources including phone directories, websites, social media pages, and email signatures. \u00a0 But, to make the scam work effectively, the scammers would need to employ some mechanism to quickly match a great many phone numbers and email addresses. \u00a0 So they are likely using some sort of database &#8211; breached or otherwise &#8211; that includes both pieces of information.<\/p>\n<p>If you receive one of these emails, the best thing to do is just hit the delete button. Do not reply or respond in any way.<\/p>\n<p>However, if the email includes your real password or phone number you should check that \u00a0the corresponding email address \u00a0is not \u00a0associated with a known data breach. \u00a0 You can do so by entering the email \u00a0address \u00a0into Troy Hunt&#8217;s excellent \u00a0 \u00e2\u20ac\u0153<a href=\"https:\/\/haveibeenpwned.com\/\">have i been pwned<\/a>&#8221; service.<\/p>\n<p>If any accounts that use that email address have been breached, you should certainly change the account passwords as soon as possible. In fact, regardless of breaches, it is a good idea to change your passwords regularly.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<h2>Read more information about fake blackmail sextortion scams:<\/h2>\n<ul>\n<li>\n<h3><a href=\"https:\/\/www.hoax-slayer.net\/fake-blackmail-sextortion-scam-emails-using-real-passwords\/\">Fake Blackmail Sextortion Scam Emails Using Real Passwords<\/a><\/h3>\n<\/li>\n<li>\n<h3><a href=\"https:\/\/www.hoax-slayer.net\/i-know-about-your-secret-fake-blackmail-scam-email\/\">&#8216;I Know About Your Secret&#8217; Fake Blackmail Scam Email<\/a><\/h3>\n<\/li>\n<li>\n<h3><a href=\"https:\/\/www.hoax-slayer.net\/bogus-blackmail-scam-email-demands-payment-in-bitcoin\/\">Bogus Blackmail Scam Email Demands Payment in Bitcoin<\/a><\/h3>\n<\/li>\n<li>\n<h3><a href=\"https:\/\/www.hoax-slayer.net\/you-were-stupid-fake-blackmail-scam-email\/\">&#8216;You Were Stupid&#8217; Fake Blackmail Scam Email<\/a><\/h3>\n<\/li>\n<\/ul>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- Third Content Ad Responsive --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"1909104632\"\n     data-ad-format=\"auto\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<div align=\"center\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HS Net Bottom AdLinks --><br \/>\n<ins class=\"adsbygoogle\" style=\"display: block;\" data-ad-client=\"ca-pub-0355887770822260\" data-ad-slot=\"1358951439\" data-ad-format=\"link\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/div>\n<p><\/br><\/br> Original Source : <a href=\"https:\/\/www.hoax-slayer.net\/sextortion-scammers-using-phone-numbers-as-well-as-passwords\/\" target=\"_blank\">https:\/\/www.hoax-slayer.net\/sextortion-scammers-using-phone-numbers-as-well-as-passwords\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As I discuss in another report, sextortion scammers have lately been including user passwords in their scam emails as a way of making their false claim seem more plausible. And, in another variation, the scammers include part of the recipient&#8217;s phone number instead of the password. \u00a0 These fake blackmail sextortion scams are not new. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6890,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2853","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hoax-inggris"],"_links":{"self":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts\/2853"}],"collection":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2853"}],"version-history":[{"count":0,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts\/2853\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/media\/6890"}],"wp:attachment":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2853"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}