Latest sextortion scam claims to be from the CIA

Some people think a stolen email address is of little value to a threat actor. The latest sextortion scam shows how useful it can be.

The email address is used to try to convince a victim of the authenticity of a message. The goal is to get the person curious or worried enough to click on an infected attachment, which tries to blackmail them.

And why not if the message comes from the CIA?

According to a blog from Trustwave published this morning, here’s how the con works.

The subject line reads “Your email — and then the victim’s address — has been verified Central Intelligence Agency Case #66616805”

To an unsuspecting person, the fact that their email address is in a subject line may make them think the message is real.

Image from Trustwave

“My name is Gilbert Ginley and I am a technical collection officer working for Central Intelligence Agency,” the message says. “It has come to my attention that your personal details including your email address are listed in case #66616805.”

The case, it goes on to say, is part of a large international operation set to arrest more than 2000 individuals suspected of paedophilia in 27 countries.

The attached document, it says, includes your personal details, home address, work address and list of relatives and their contact information, as well as your ISP web browsing history, online chat room logs and other data.

“The first arrests are scheduled for April 15, 2019,” it adds.

There is a password listed to help the victim open the attached ZIP file.

And if someone is foolish enough to click on the file, it launches a PDF document with a blunt blackmail note: “I read the documentation and I know you are a wealthy person who may be concerned about reputation,” it reads.

It then tells the reader to transfer the bitcoin equivalent of US$5,000 to an address.

“Upon confirming your transfer I will take care of all the files linked to you and you can rest assured no one will bother you.”

There is a hyperlink in the document to a web platform called SatoshiBox where the victim can buy bitcoin. This, says Trustwave, is the new wrinkle in such scams.

Use of an email address or something stolen and included in subject lines or the body of a message to convince victims of authenticity isn’t new. For example, last August security vendor Sophos warned scammers were including the last four digits of your phone number and/or a password in messages to prove authenticity. These would have been obtained from a data theft.

That’s why it’s important that you don’t use a password for access to more than one site, and to enable two-factor authentication for as many sensitive sites (work, bank, email) as possible. That way if an attacker has your password they still can’t get access.

 

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Howard Solomon
Howard Solomon
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times. I can be reached at hsolomon [@] soloreporter.com

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now