Now cyber criminals are rummaging through your personal life

One of the practices that cyber criminals use to take advantage of individuals and businesses is to use bait emails and fraudulent links to trick them into downloading a program that will allow them to access the computer and corporate network. As soon as this open door is reached, they “hijack” all of the information contained therein and request a ransom for it and again offer access to the devices or devices.

Cyber ​​criminals extort money from their victims by threatening to post porn videos or exposing their dirty laundry

This is known as “ramsonware”, a widespread technique that is behind the recent attack on SEPE, viruses like “Wannacry” or high profile attacks on large multinational companies like Telefónica that have hijacked their networks.

Cyber ​​criminals, always looking for new ways to deceive and defraud their victims, are now experimenting with a new variant of “ramsonware” called “extortionware”. The process is simple: now they don’t limit themselves to just hijacking the information from the computer, they go even further, rummaging around in it and looking for content that the owner might be ashamed of if published publicly for a financial one Request to make reward.

With this in mind, it is established that groups of cyber criminals Access to the user’s personal data and they search folders for content such as intimate photos or videos, pornographic content … and threaten to be published on social networks or dark web forums if a certain amount of money is not delivered.

Blackmail isn’t just limited to porn. For example, actions like searching the victim’s emails to identify them any kind of financial fraud to the Treasury, to insurance companies or the like as well as other criminal acts. If the requested “ransom” is not paid, this information would come to light.

Any kind of sensitive information is sufficient. When cyber criminals discover content that can be distressing or embarrassing, they use it to request a ransom or increase the number already requested by re-granting access to the hijacked information. In addition to this, you must pay now to keep your most personal information from being published.

Click to rate this entry!
(Votes: 0 Average: 0)

Leave a Comment