Earlier this month we reported on an ongoing extortion email campaign that emailed recipients their password and stated hackers had recorded the them over their webcam while they visited adult sites.

Over the past week, scammers are now utilizing a new extortion email campaign that claims the recipient's phone was hacked, includes a partial phone number of the recipient, and further states that they created videos using the recipient's webcam. It then demands $1,000 USD in bitcoins or the hacker will release the video and other information.

This new campaign was brought to my attention last week by security researcher SecGuru who has seen thousands of these email being distributed.

While the previous campaign utilized passwords found in data dumps from hacks, these emails instead use a partial phone number of the recipient. This information is used in the extortion emails to scare the recipient into thinking that the scammer actually hacked their phones and taken video of them through the phone's camera while they were on adult sites.

You can see the full text of one of these sextortion emails below.

Subject:(Part num your Hacked phone +XX XXXXXX5555)

It seems that, +XX XXXXXX5555, is your phone.
 
You may not know me and you are probably wondering why you are getting this e mail, right? actually, I setup a malware on the adult vids (porno) web-site and guess what, you visited this site to have fun (you know what I mean).
While you were watching videos, your internet browser started out functioning as a RDP (Remote Desktop) having a keylogger which gave me accessibility to your screen and web cam. after that, my software program obtained all of your contacts from your Messenger, FB, as well as email.
 
What did I do? I backuped phone. All photo, video and contacts. I created a double-screen video. 1st part shows the video you were watching (you've got a good taste haha . . .), and 2nd part shows the recording of your web cam. exactly what should you do?
 
Well, in my opinion, $1000 is a fair price for our little secret. You'll make the payment by Bitcoin (if you do not know this, search "how to buy bitcoin" in Google).
 
BTC Address: 1GYNGZLEUGkkQjHo19dHDnGE87WsAiGLLB
(It is cAsE sensitive, so copy and paste it)
 
Important: You have 48 hour in order to make the payment. (I've a unique pixel in this e mail, and at this moment I know that you have read through this email message). If I do not get the BitCoins, I will certainly send out your video recording to all of your contacts including relatives, coworkers, and so on. Having said that, if I receive the payment, I'll destroy the video immidiately. If you need evidence, reply with "Yes!" and I will certainly send out your video recording to your 6 contacts. It is a non-negotiable offer, that being said don't waste my personal time and yours by responding to this message.

According to SecGuru, we have now have four different sextortion email scam variants that are being distributed:

  1. Email without person identification
  2. Email with password
  3. Email with full name of the victim
  4. Email with phone number of the victim

Using account recovery to get partial phone numbers

SecGuru is not the only one who is seeing these scams. Didier Stevens, an ISC Handler, has also seen these emails and has confirmed that some of these partial numbers are accurate.

He also made an interesting observation.

While the previous campaign used data dumps from hacked sites to get passwords, Stevens feels that the partial phone numbers are not coming from the same types of sources.

"We don't know yet what source is used by the extortionists that provides email addresses with partial phone numbers, but I think it is unlikely to be a data breach (like with the password extortion emails). " Stevens said in a ISC handler diary post. "A classic data breach with phone numbers would contain full phone numbers, and I don't see why the extortionists would mask most of the digits."

Instead Stevens feels it may be possible that these partial numbers may be coming from password or account recovery forms such as the one from Gmail below.

Password recovery via Gmail
Password recovery via Gmail

With that said, there have been data leaks in the past that only contained partial numbers, so there is no definitive way to know where these numbers are coming from. What we do know, though, is that these sextortion scams generate a lot of money for the scammers.

Sextortion scammers raking in the moolah

The previous password extortion scam campaign made the scammers over $50k in one week. This new variant is also doing well.

After looking at only two of the bitcoin addresses seen by SecGuru in these emails, we can see that people are falling for this scam and paying the requested bitcoins. For example, the address 114uiWmL5amDjpsCGfwUMRsgTrzezjEY3P has received 2.89905807 bitcoins, which at current prices is worth over $18,000, since July 11th.  This address, though, may have been utilized in other previous variations of the scam.

Payments to 114uiWmL5amDjpsCGfwUMRsgTrzezjEY3P 
Payments to 114uiWmL5amDjpsCGfwUMRsgTrzezjEY3P

Another bitcoin address associated with this scam is 1GYNGZLEUGkkQjHo19dHDnGE87WsAiGLLB and it has received 12 payments for a total of  0.93094968 since August 10th. This comes to a total of $5,800 USD earned over a 3 day period!

SecGuru has told BleepingComputer that he has many more emails to go through to tally the totals being earned through this campaign. If the above are any indication, though, it is a lot of money.

Related Articles:

Malware dev lures child exploiters into honeytrap to extort them

Ransomware payments drop to record low of 28% in Q1 2024

Microsoft will limit Exchange Online bulk emails to fight spam

Chipmaker Nexperia confirms breach after ransomware gang leaks data

Medium bans AI-generated content from its paid Partner Program