“I’m aware that <PASSWORD> is your password ” – Chances are you have gotten an email like this in the past year. As reported by Brian Krebs HERE, the messages varied but they followed a simple formula. Tell you HOW they know, What they know, and ask for the money.
A recently published article on TheNextWeb.com sheds new light on a spam email campaign. It seems that the attackers have caught on and are now publishing their own ‘removal’ tools.
” The firm was clear to point out that receiving the Bitcoin sextortion email doesn’t automatically mean infection, just that the recipient’s email address has been exposed in a password dump.
Researchers ironically found, however, that many sites offering products to supposedly remove the Save Yourself malware were actually peddling malware. “
Researchers find Bitcoin sextortion malware also mines Monero – TNW
Once a system is infected with this secondary malware, research found it would install a Monero crypto-currency miner, bringing yet more profits in to the attackers. In addition they found it reading and re-writing clipboard data; replacing any bitcoin wallet with the attackers [to trick users into transferring moneys]. The infection is known to spread itself to all accessible executable, making disinfection even more difficult.
Now more then ever CyberSecurity is becoming a core component of daily life. Don’t get caught off guard. Contact your IT professional for your annual risk assessment.