April 15, 2019 By David Bisson 2 min read

Security researchers observed sextortion scammers launching new attack campaigns that leverage image spam and other clever techniques to trick users into fulfilling their demands.

According to Cisco Talos, attackers are currently using several different tactics to make their emails evade detection by anti-spam filters. Some of these methods aren’t entirely new. For instance, some attackers are using image spam, a technique that goes back to at least 2005, by sending along only an image of a sextortion-based ransom note.

The problem with this approach, however, is that victims can’t follow the note’s instructions or copy the attacker-owned bitcoin address included in the image. This snag lowers the chances of the attackers receiving payment.

Some of the tactics are more recent. For instance, some threat actors are seeking to trick anti-spam filters by using a combination of usernames in comments, plaintext letters and HTML characters. Others are sending along ZIP files that purport to contain evidence of the attackers having compromised the target’s computer.

Cisco Talos researchers weren’t able to examine the contents of these password-protected archives, but they believe that any files included likely consist of junk data.

New Attack Waves, New Techniques

Sextortion scammers have been busy since at least July 2018, when researchers discovered the first attack waves. As reported by Krebs on Security, those emails leveraged passwords already compromised in publicly disclosed data breaches to trick users into fulfilling the attacker’s demands. One month later, Naked Security spotted another wave using redacted phone numbers toward the same end.

Since then, cybercriminals have grown increasingly more creative. For instance, Proofpoint observed one wave that attempted to infect users’ computers with GandCrab ransomware. Another variant relied on a fake CIA investigation to scare users into paying, as reported by Tripwire.

How to Defend Against Sextortion Scams

Security professionals can help defend their organizations against sextortion scams by using ahead-of-threat detection to spot potentially malicious domains before threat actors have the chance to use them against employees.

As always, organizations should also create an ongoing security awareness training program that teaches users to be on the lookout for social media scams and other ruses such as sextortion-based ploys.

More from

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today