BSV
$71.87
Vol 74.91m
10.9%
BTC
$91185
Vol 58703.07m
1.94%
BCH
$475.41
Vol 698.34m
12.45%
LTC
$96.16
Vol 2190.47m
16.43%
DOGE
$0.37
Vol 10568.51m
2.17%
Getting your Trinity Audio player ready...

Cyber criminals keep evolving with each passing day as they seek to avoid detection from security experts. Having started off by demanding BTC in ransom, they have started switching to Litecoin according to a new report. Litecoin addresses are not as easily detectable by most firewalls, allowing the criminals to get through to their victims.

Initially, extortion claims came in the form of plain text, with the criminals claiming to have footage of the victim doing some things that they would prefer to keep private. The ransom is demanded in BTC for most cases. Usually, it’s just a hoax, but it still manages to convince quite a few victims. However, in time, businesses began installing programs that blocked any email that contained keywords related to extortion.

This led the criminals to using image files, with the BTC address being written in plain text for easy copying and pasting. Businesses soon installed programs that could detect the BTC addresses and block the emails. According to the report by Leesburg, Virginia-based cybersecurity firm Cofense, the latest maneuver involves the use of Litecoin to replace BTC.

This switch to Litecoin is just the latest trick by the criminals to avoid using any identifiable pattern which can be detected by Secure Email Gateways (SEGs). The SEGs are modified to detect keywords that the criminals use and thus, block their emails and thwart their plans.

The Cofense team has some advice for any sextortion target, “Avoiding this scam is simple. Your users can safely ignore the emails—if threat actors actually had such access and data, they would include stronger proof. Also educate users about sites such as haveibeenpwned.com, so they can know if their email address is likely to become a target.”

Crypto-related malware and ransomware attacks continue to rise as the use of crypto globally soars. As CoinGeek reported recently, one of the latest malware campaign involves a Telegram bot which replaces crypto addresses copied on the clipboard with addresses that the criminals control. Since the addresses are usually long and impossible to identify, the victim doesn’t discover what happened until it’s too late.

Recommended for you

This Week in AI: US, China clash; Amazon eyes in-house chips
China and the U.S. are butting heads anew over trade, while Amazon eyes to become a major player in the...
November 15, 2024
CREATE MORE Act and its impact on emerging tech
Philippine President Ferdinand Marcos Jr. signed the CREATE MORE Act into law, focusing on lowering corporate taxes, simplifying business processes,...
November 15, 2024
Advertisement
Advertisement
Advertisement