This account has been hacked! Change all your passwords!
The 'You've been looking at porn sites' scam!
Posted: November 22, 2018
This one's my favorite so far, these scammers must have put their creative thinking caps on for this one! It is so well worded, non threatening, unverifiable, great geek terminology (that we all know) and plays on most people's insecurity about sex & porn. Of course I have changed the clients email address to a generic one.
Hello!
I have very bad news for you.
11/07/2018 - on this day I hacked your operating system and got full access to your account
It is useless to change the password, my malware intercepts it every time.
How it was:
In the software of the router to which you were connected that day, there was a vulnerability.
I first hacked this router and placed my malicious code on it.
When you entered in the Internet, my trojan was installed on the operating system of your device.
After that, I made a full dump of your disk (I have all your address book, history of viewing sites, all files, phone numbers and addresses of all your contacts).
A month ago, I wanted to lock your device and ask for a small amount of money to unlock.
But I looked at the sites that you regularly visit, and came to the big delight of your favorite resources.
I'm talking about sites for adults.
I want to say - you are a big, big pervert. You have unbridled fantasy!!!
After that, an idea came to my mind.
I made a screenshot of the intimate website where you have fun (you know what it is about, right?).
After that, I made a screenshot of your joys (using the camera of your
device) and joined all together.
It turned out beautifully, do not doubt.
I am strongly belive that you would not like to show these pictures to your relatives, friends or colleagues.
I think $793 is a very small amount for my silence.
Besides, I spent a lot of time on you!
I accept money only in Bitcoins.
My BTC wallet: 1JK55P9Lps6goSxDH13TBWbqCMi6ez4g5D
You do not know how to replenish a Bitcoin wallet?
In any search engine write "how to send money to btc wallet".
It's easier than send money to a credit card!
For payment you have a little more than two days (exactly 50 hours).
Do not worry, the timer will start at the moment when you open this letter.
Yes, yes .. it has already started!
After payment, my virus and dirty photos with you self-destruct automatically.
Narrative, if I do not receive the specified amount from you, then your device will be blocked, and all your contacts will receive a photos with your "joys".
I want you to be prudent.
- Do not try to find and destroy my virus! (All your data is already uploaded to a remote server)
- Do not try to contact me (this is not feasible, I sent you an email from your account)
- Various security services will not help you; formatting a disk or destroying a device will not help either, since your data is already on a remote server.
P.S. I guarantee you that I will not disturb you again after payment, as you are not my single victim.
This is a hacker code of honor.
From now on, I advise you to use good antiviruses and update them regularly (several times a day)!
Don't be mad at me, everyone has their own work.
Farewell.
Great isn't it! Keep in mind there is nothing they say that can be verified. except for the fact that it looks (LOOKS) like it comes from your email address, but it doesn't. Some will even have a password attached to them that is actually an old or current password depending on how vigilant you are with changing your passwords. So this is a little scarier, if it is your password in the scam email then CHANGE YOUR PASSWORD. More than likely it is a password that you've used before on another site that would have been hacked.
You can see if any of your common username and passwords are on this hacked database here: https://haveibeenpwned.com. Basically this scammer has a list of 5 billion or so hacked (and for the most part outdated) email addresses and passwords and is using a robot to send out millions of emails on a fishing expedition waiting for someone to bite.
By the way, this was the 2nd email sent to this client, the first one (that I don't have but is worded very similarly) had an email header that looked like this...
X-Kaspersky: Checking
X-Kaspersky: Checking
X-Kaspersky: Checking
X-Kaspersky: Checking
Return-Path:
Delivered-To:
Received: from host2.dphost.com.au by host2.dphost.com.au with LMTP id eEGPDK9i1luaBDAAwFJbFw for ; Mon, 29 Oct 2018 11:30:23 +1000
Return-Path:
Envelope-to:
Delivery-date: Mon, 29 Oct 2018 11:30:23 +1000
Received: from [78.30.30.111] (port=4535 helo=static.masmovil.com) by host2.dphost.com.au with esmtp (Exim 4.91) (envelope-from ) id 1gGwNk-00DCh8-Ex for ; Mon, 29 Oct 2018 11:30:23 +1000
Date: 29 Oct 2018 01:54:34 +0000
From:
X-Priority: 3
Message-ID:
To:
MIME-Version: 1.0
Content-Type: text/plain;
charset="ibm852"
Content-Transfer-Encoding: 7bit
X-Spam-Status: Yes, score=13.2
X-SpamFlt-Status: Not Detected
X-KASFlt-Status: clientwebsite.com.au:7.1.1
X-KASFlt-Status: Version: 5.5.10.77
X-KASFlt-Status: {Std_cp_850_852, cont}
X-KASFlt-Status: Status: trusted
X-KASFlt-Status: Method: white email list
X-KASFlt-Status: {received from trusted sender : white list}
X-KASFlt-Status: Rate: 0
X-Spam-Score: 132
X-KASFlt-Status: Lua profiles 130625 [Oct 29 2018]
X-KASFlt-Status: LuaCore: 204 204 2f584fc5d437d92fc6aea7edaff39b944687648d
X-SpamFlt-Phishing: Not Detected
X-MimeOLE: Produced By Microsoft MimeOLE V6.1.7601.23548
X-Spam-Bar: +++++++++++++
X-Spam-Report: Spam detection software, running on the system "host2.dphost.com.au", has identified this incoming email as possible spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see root\@localhost for details. Content preview: Hello! I'm a programmer who cracked your email account and device about half year ago. You entered a password on one of the insecure site you visited, and I catched it. Of course you can will change y Content analysis details: (13.2 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: financialwriters.com.au]
1.3 RCVD_IN_RP_RNBL RBL: Relay in RNBL, https://senderscore.org/blacklistlookup/ [78.30.30.111 listed in bl.score.senderscore.com] 0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to DNSWL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [78.30.30.111 listed in list.dnswl.org] 1.5 SPF_SOFTFAIL SPF: sender does not match SPF record (softfail) 2.0 PYZOR_CHECK Listed in Pyzor (https://pyzor.readthedocs.io/en/latest/) 2.5 BITCOIN_PAY_ME Pay me via BitCoin 2.0 RDNS_NONE Delivered to internal network by a host with no rDNS 1.0 FROM_IN_TO_AND_SUBJ From address is in To and Subject 3.0 BITCOIN_MALWARE BitCoin + malware
X-Spam-Flag: YES
Subject: SPAM is compromised. Password must be changed
I know right, you're just thinking what does it all mean anyway? The Email header can't be faked and it tells the truth about where the emails was sent from. The scammer can add your email to the 'From:' field in the email but the header will let you know where it originated.
You can see the below header which tells mails comes from 78.30.30.11, this was not my client's server IP anyway, so this means they couldn't have sent it from my clients email address. So right there, case closed!
Received: from [78.30.30.111] (port=4535 helo=static.masmovil.com) by host2.dphost.com.au with esmtp (Exim 4.91) (envelope-from ) id 1gGwNk-00DCh8-Ex for ; Mon, 29 Oct 2018 11:30:23 +1000
Wait, you want more, also in the end of that header, you can see the email software has detected this message as spam as well.
X-Spam-Report: Spam detection software, running on the system "host2.dphost.com.au", has identified this incoming email as possible spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see root\@localhost for details.
Content preview: Hello! I'm a programmer who cracked your email account and device about half year ago. You entered a password on one of the insecure site you visited, and I catched it. Of course you can will change y
Content analysis details: (13.2 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0
URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: clientwebsite.com.au]
1.3 RCVD_IN_RP_RNBL RBL: Relay in RNBL, https://senderscore.org/blacklistlookup/ [78.30.30.111 listed in bl.score.senderscore.com] 0.0
RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to DNSWL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [78.30.30.111 listed in list.dnswl.org] 1.5
SPF_SOFTFAIL SPF: sender does not match SPF record (softfail) 2.0
PYZOR_CHECK Listed in Pyzor (https://pyzor.readthedocs.io/en/latest/) 2.5
BITCOIN_PAY_ME Pay me via BitCoin 2.0
RDNS_NONE Delivered to internal network by a host with no rDNS 1.0
FROM_IN_TO_AND_SUBJ From address is in To and Subject 3.0
BITCOIN_MALWARE BitCoin + malware
Also that ip is blocked in RBL for the same kind of spamming as well and SPF check also says SOFT fail.
RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to DNSWL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [78.30.30.111 listed in list.dnswl.org]
So let's get in contact with the server or hosting company and give them an ear full! Weeeeeell, It's more than likely the email came from a server that was hacked or an email account that has a low level password like 'pass1234' and it was hacked and sent out 80,000 emails before it was closed down.
So you can imagine if last night you decided to visit a kinky adult site for the first time and the next morning you received this email. Or you're going for a loan at ANZ and the next morning you receive one of those 'Your Loan Has Been Approved, login to see more' scams. Even the smarties can get caught out.
Do I need to say this?