Use zoom? You want to concentrate on a horrible new intercourse rip-off that might severely value you

Zoom users are warned of a new sext sorting scam that security experts are warning of. Last month, Internet security firm Avast blocked over half a million sex sorting attacks, with cyber criminals targeting English-speaking users in the UK and US. Avast said the scams all have a common mode – scammers claim they have X-rated footage of a victim that was secretly taped.

The calloused scammers say that unless they pay a ransom, they will show footage of private and intimate sexual acts involving the victim that was secretly filmed from their webcam. In the scams discovered by Avast, victims were told that the X-rated footage was recorded because of an alleged security vulnerability in the hugely popular Zoom video conferencing app.

And victims are asked to pay $ 2,000 in bitcoin to avoid this alleged private video from being published.

This type of email would be extremely scary to receive. But Avast urges potential victims to try to stay calm as the scammers behind these sex sorting attempts are usually bluffing.

Marek Beno, malware analyst at Avast, said, “Sextortion scams are dangerous and worrying, and can even have tragic consequences that lead to suicide among affected users. During the Covid-19 pandemic, cyber criminals are likely to see a great opportunity for success as humans You spend more time with zoom and in front of the computer.

“As scary as e-mails may sound, we urge people to stay calm if they receive such a message in their inbox and ignore it, as it’s just a dirty trick cyber criminals are trying to get your money on come.”

READ MORE: Android users who have watched porn will be VERY concerned by this warning

Avast said the surge in people using web conferencing services like Zoom during the Covid-19 pandemic is one reason hackers may be naming such a popular app.

Security experts saw more of these scams in December when people who were socially distant might use zoom or other such services more frequently during the Christmas and holiday seasons to connect with family and friends.

A scam email sent by Avast during this period mentioned that attackers had “recorded” a “sexual act” involving the victim that could cause “terrible reputational damage.” The email, which appears to have been sent from the victim’s email address, also states that attackers have “access to confidential information”.

The nefarious parties claim they managed to obtain this compromising footage and sensitive information about “critical vulnerabilities” in the Zoom app. However, Avast has not found any actual security vulnerabilities in the Zoom application.

Speaking to Express.co.uk, a Zoom spokesperson also said: “These scammers are doing what they do best: lying. Using Zoom protects against such vulnerabilities. Zoom takes security and privacy very seriously and does not offer the possibility to secretly record other users across all services and technology platforms should be careful with emails or links received from unknown senders. “

In the second type of scam, attackers claim that a Trojan horse is installed on the victim’s computer and has been running for months.

The attackers claim they recorded all of the victim’s actions with a microphone and webcam during this period, and stole data from the allegedly targeted device via chats, social media activities and contacts.

A ransom is then requested, with a fake timer appearing in the email that counts down until a ransom has to be paid. But as Avast said, this threat is fake yet again.

Beno added, “As with the Zoom campaign, these threats are all fake. There are no undetectable Trojans, nothing is recorded, and attackers have no data. The timer included in the email is another social engineering technique, which is used for manipulation will pay victims. “

Avast advised people on how to protect them from sextortion scams, adding …

• Stay calm. In reality, the attacker has no record keeping and uses social engineering techniques to scare and shame you into paying.

• Treat the email as if you were handling spam email: ignore it.

• Don’t answer or pay any money.

• If the attacker gave you an older leaked password, change your password to a long, complex password if you haven’t already.

Leave A Reply

Your email address will not be published.