In the recent times the sextortion email scams have been at
a high rise as they have proved time and time again to being quite a
significant and effective method for producing easy money for the hoodlums. A
sextortion scam is basically when an individual receives an email stating that
they have been spied upon while they were browsing adult websites.
The sextortion campaign which traps recipients into
installing the Azorult data stealing Trojan, then further downloading and
installing the GandCrab ransomware is in the highlight now.
The first infection, Azorult, will be utilized to steal data
from the user's PC, for example, account logins, cookies, documents, chat
history, and that's just the beginning. At that point it installs the GandCrab
Ransomware, which will encrypt the computer's information.
There have been numerous cases of such scams being accounted
for generally where the emails may likewise contain passwords of the users that
were leaked amid information breaches so as to make the scams look
progressively genuine.
Experts at ProofPoint detected another campaign that as
opposed to containing a bitcoin addresses to send a blackmail payment to
prompts the user to download a video they made of them indulging in certain
"exercises". The downloaded compress document, however, contains an
executable that will further install the malware onto the computer.
"However, this week Proofpoint researchers observed a
sextortion campaign that also included URLs linking to AZORult stealer that
ultimately led to infection with GandCrab ransomware," stated ProofPoint's
research.
The downloaded documents will be named like
Foto_Client89661_01.zip and the full text of the sextortion trick email is below:
This new strategy is turned out to be significantly
hazardous, as when the recipients are already terrified with the need to affirm
if a video exists. They download the document, endeavor to open the compressed
file, and thusly find themselves infected with two distinct sorts of malware.
Consequently, it is recommended for the user's to not
believe anything they receive via email from a strange address and rather do a
few inquiries on the Web to check whether others have experienced emails this
way or not.