Recent News

New Extortion Scam Tied to Recent Breaches

The Internet Crime Compliant Center (IC3) recently released a public service announcement about a possible link between data extortion scams and several recent breaches.

According to the announcement, hackers are e-mailing victims of the breach and threatening to release their personal information to friends, family, coworkers, and social media contacts unless they pay a ransom.

Hackers attempt to force the victims to pay them using Bitcoin, a largely anonymous online form of currency. Ransoms can be anywhere from $250-1200.

If you have received any emails like those described in the PSA, here’s what you should do:

  1. Do not open any emails or attachments from unknown senders.
  2. Do not communicate with the sender.
  3. Immediately contact your local FBI office and place a report with the IC3 at ic3.gov. Include the phrase “Extortion E-mail Scheme,” the bitcoin address, and the e-mail itself, along with any other relevant information you may have.

Here are a few tips for social media and e-mail you can employ right now to help protect you and your network:

  • Upgrade to strong, memorable and hard-to-crack passwords for all your accounts.
  • Remove all sensitive information and photos of yourself from social media and your phone.
  • Make sure all information you upload to the Internet is through a secure channel with a URL that begins with https.

Find more tips for online safety on our blog or in the PSA.

Leave a Reply

Your email address will not be published. Required fields are marked *

[wds_resources_posts hide_posted_on="" featured_posts_only="" ignore_post="8585" hide_featured_image="" tag_location="below_title" post_type="post" term_comparision="ALL" resource_cat="" resource_tag="" post_cat="" post_tag="" heading="Recent News" subheading=""]

Recent News

CAN-SPAM Gives Email a Makeover

In today’s digital world, email is one of the main ways we contact each other. 14 years ago, Congress signed a set of rules called the CAN-SPAM Act designed to protect consumer privacy and limit the amount and type of unsolicited marketing messages they receive.

Identity Protection Tips: Email Safety

Email is a common target for malicious hackers. Two of the more common techniques they use to compromise email are business email compromise and malicious document attachments. Business Email Compromise  The FBI describes Business Email Compromise, or BEC, as a financially-motivated and often sophisticated scam carried out by organized crime organizations. The technique involves impersonating a […]