BSV
$53.64
Vol 29.84m
0.56%
BTC
$95645
Vol 41443.01m
-1.66%
BCH
$450.62
Vol 326.47m
-0.92%
LTC
$101.76
Vol 776.98m
2.29%
DOGE
$0.31
Vol 4599.42m
-1.24%
Getting your Trinity Audio player ready...

Cyber criminals keep evolving with each passing day as they seek to avoid detection from security experts. Having started off by demanding BTC in ransom, they have started switching to Litecoin according to a new report. Litecoin addresses are not as easily detectable by most firewalls, allowing the criminals to get through to their victims.

Initially, extortion claims came in the form of plain text, with the criminals claiming to have footage of the victim doing some things that they would prefer to keep private. The ransom is demanded in BTC for most cases. Usually, it’s just a hoax, but it still manages to convince quite a few victims. However, in time, businesses began installing programs that blocked any email that contained keywords related to extortion.

This led the criminals to using image files, with the BTC address being written in plain text for easy copying and pasting. Businesses soon installed programs that could detect the BTC addresses and block the emails. According to the report by Leesburg, Virginia-based cybersecurity firm Cofense, the latest maneuver involves the use of Litecoin to replace BTC.

This switch to Litecoin is just the latest trick by the criminals to avoid using any identifiable pattern which can be detected by Secure Email Gateways (SEGs). The SEGs are modified to detect keywords that the criminals use and thus, block their emails and thwart their plans.

The Cofense team has some advice for any sextortion target, “Avoiding this scam is simple. Your users can safely ignore the emails—if threat actors actually had such access and data, they would include stronger proof. Also educate users about sites such as haveibeenpwned.com, so they can know if their email address is likely to become a target.”

Crypto-related malware and ransomware attacks continue to rise as the use of crypto globally soars. As CoinGeek reported recently, one of the latest malware campaign involves a Telegram bot which replaces crypto addresses copied on the clipboard with addresses that the criminals control. Since the addresses are usually long and impossible to identify, the victim doesn’t discover what happened until it’s too late.

Recommended for you

Who wants to be an entrepreneur?
Embodying the big five personality traits could be beneficial for aspiring entrepreneurs, but Block Dojo shows that there is more...
December 20, 2024
UNISOT, PSU China team up for supply chain business intelligence
UNISOT revealed a new partnership with business intelligence and research firm PSU China, which will combine its data with UNISOT's...
December 20, 2024
Advertisement
Advertisement
Advertisement