Connect with us

Technology

Sextortion scams evolve with Google Maps images to intimidate victims

Published

on

Sextortion scams evolve with Google Maps images to intimidate victims

Scammers often rely on fear to steal your hard-earned money. No matter the scam, whether it’s a Microsoft call scam or government impersonation, they all attempt to scare you by claiming that something is seriously wrong with you or your devices and that only they can fix it. The latest sextortion scams targeting many in the U.S. are no exception.

These bad actors contact you via email, claiming to have compromising photos or videos of you in private situations, and demand money to delete them. What’s new is that these scammers now include images of your home to make their threats seem more convincing.

I’ve received emails from many people sharing how these scammers targeted them. Below is a breakdown of the evolved sextortion scam and tips on how to stay protected.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Illustration of a scammer at work (Kurt “CyberGuy” Knutsson)

Advertisement

How the scam works

It starts when you get an email from a scammer claiming they recorded you while you were watching adult content. They use your name and include a photo of your house or a nearby street to make it seem real.

The scammer claims to have installed a spyware called “Pegasus” on your phone and has access to everything you watch. Pegasus is a spyware developed by NSO Group, a company that sells it only to government agencies and law enforcement. 

It’s super expensive and highly unlikely that a random scammer would have access to it. Even if they did, stalking people watching adult content wouldn’t be worth their time. Plus, if they have installed the spyware on your phone, they won’t need to ask you to send money.

Once the scammer has you scared, they offer to delete the so-called footage and pretend you never existed if you pay them. They usually include a QR code for a cryptocurrency wallet and ask for Bitcoin as payment. One email I saw from a victim mentioned a ransom of about $2,000.

I’ve attached a portion of the email the victim got below. I’ve blurred out any personal info to protect their identity, but you can still check out the text.

Advertisement
Sextortion scams evolve with Google Maps images to intimidate victims

Actual sextortion scam email (Kurt “CyberGuy” Knutsson)

HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS

How do scammers know your location?

The image of your home might make the scam look real, but it’s probably just a trick. One possible reason they have that info is a data breach. Your address might have been leaked in a breach and ended up on the dark web. Scammers could have gotten hold of it and used Google Maps to find a picture of your house. Another reason could be that you put up a listing for something online, like a rental or sale ad. If you’ve shared your address publicly in an online listing, scammers might have found it that way.

Sextortion scams evolve with Google Maps images to intimidate victims

Google Maps vehicle that captures images (Kurt “CyberGuy” Knutsson)

MASSIVE FREE VPN DATA BREACH EXPOSES 360 MILLION RECORDS

Protect your privacy: Blur your house on Google Maps

Google Maps is how they get access to images of your house. But you can blur your house on the platform and prevent scammers from fearmongering. You’ll need to do this from a computer since the blurring feature isn’t available in the Google Maps app on iOS or Android. Follow these steps to learn how:

  • Go to maps.google.com and type your home address into the search bar at the top-right.
  • Click on the photo of your house that shows up.
  • You’ll see a Street View image of your place. Click Report a Problem in the bottom-right corner.
  • Adjust the view so that your home and anything else you want to blur is inside the red and black box using your mouse.
  • Select the option to blur your home from the choices given.
  • Hit Submit, and Google will review your request and blur your house if they think it’s necessary.
Sextortion scams evolve with Google Maps images to intimidate victims

Google Map-blurred home (Kurt “CyberGuy” Knutsson)

4 additional steps to stay protected from sextortion scams

Here are four additional steps you can take to stay protected from sextortion scams:

Advertisement

1) Be cautious with personal information: Avoid sharing personal information like your address, phone number or other sensitive details online. Be mindful of what you post on social media and other platforms.

2) Watch out for red flags: Scammers are mostly bluffing. For instance, the Pegasus software they claim to be using is a lie. Stay informed about common scams and how they work. Knowing what to look out for can help you recognize and avoid potential threats.

3) Change passwords: If the email includes a password, make sure you are not using it anymore, and if you are, change it as soon as possible. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc.

You should do this on another device to ensure that if the scammer actually has access to your device, they aren’t recording you setting up your new password. And you should also use strong and unique passwords that are hard to guess or crack. You can also use a password manager to generate and store your passwords securely. Changing passwords should be a part of your general cybersecurity hygiene, even if you’re not affected by a data breach.

4) Use personal data removal services: Consider investing in personal data removal services that specialize in continuously monitoring and removing your personal information from various online databases and websites. 

Advertisement

I mentioned above that scammers most likely got access to your address through a data breach. A data removal service can help you remove all this personal information from the internet. Check out my top picks for data removal services here.

WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM

Kurt’s key takeaway

Scammers use fear and deception to trick you into giving up your hard-earned money. By understanding how these sextortion scams work and knowing what to look out for, you can better protect yourself from falling victim. Remember, most of these scammers are bluffing and rely on exploiting your fears. Keep your personal information secure, be cautious about what you share online and always verify the legitimacy of any threatening messages you receive. If you encounter a scam, report it to the appropriate authorities and take steps to secure your accounts and devices. 

Have you ever encountered a similar scam or any other type of scam? How did you handle it? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Advertisement

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

North Korea linked to crypto heists of over $650 million in 2024 alone

Published

on

North Korea linked to crypto heists of over 0 million in 2024 alone

Hackers in North Korea stole a total of $659 million in crypto across several heists in 2024, according to a joint statement issued today by the US, Japan, and South Korea. The report specified five such incidents, like the $235 million theft from the Indian crypto exchange WazirX that is being newly attributed to the Lazarus Group. That organization is estimated to have stolen billions across previous attacks over the last decade, including $625 million stolen from Axie Infinity in 2022.

As recently as September 2024, the United States government observed aggressive targeting of the cryptocurrency industry by the DPRK with well-disguised social engineering attacks that ultimately deploy malware, such as TraderTraitor, AppleJeus and others. The Republic of Korea and Japan have observed similar trends and tactics used by the DPRK.

A warning issued by the FBI last September noted that their methods to gain access for delivering these payloads include “individualized fake scenarios,” such as enticing victims with prospective jobs and business opportunities. All three countries advised businesses in the industry to check out the latest warning to reduce their risk of “inadvertently hiring DPRK IT workers,” as described in this recent report by CoinDesk.

They’ve also used long-time common phishing tactics against employees of crypto firms, such as convincing impersonations of trusted contacts or prominent people of interest in related industries, with realistic photos and information likely lifted from public social media accounts of known connections.

Continue Reading

Technology

Hackers claim massive breach of company that tracks and sells Americans' location data

Published

on

Hackers claim massive breach of company that tracks and sells Americans' location data

When we talk about data privacy, tech giants like Google and Facebook are often blamed for using personal data to show ads and recommendations. Less discussed are the businesses whose entire business model revolves around collecting your data and selling it to other companies and governments. These companies often operate in legal gray areas, with the consent required to collect user data buried deep in the fine print.

What’s even more concerning is that these data brokers fail to adequately protect the data they collect. Last year, National Public Data made headlines for failing to secure 2.7 billion records of individuals whose data it had harvested. Now, hackers have reportedly stolen data from Gravy Analytics, the parent company of Venntel, which has sold vast amounts of smartphone location data to the U.S. government.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

A woman working on her laptop (Kurt “CyberGuy” Knutsson)

Advertisement

What you need to know about the breach

Hackers claim to have breached Gravy Analytics, a major location data broker and parent company of Venntel, a firm known for selling smartphone location data to U.S. government agencies. The compromise is massive, including sensitive location data that tracks precise smartphone movements, customer information and even internal infrastructure, according to a 404 Media report.

The hackers are threatening to make the stolen data public. The files contain precise latitude and longitude coordinates of the phone and the time at which the phone was there. Some even indicate what country the data has been collected from.

Hackers have claimed access to Gravy’s systems since 2018. If true, this represents a serious security lapse on the company’s part. It is baffling how companies that collect and sell user data (a practice that arguably shouldn’t be allowed in the first place) failed to protect it from being leaked.

404 Media also suggests that the hackers gained deep access to the company’s infrastructure, including Amazon S3 buckets and server root access. The exposed customer list reportedly includes major companies like Uber, Apple and Equifax as well as government contractors like Babel Street.

Hackers claim massive breach of company that tracks and sells Americans' location data

A hacker (Kurt “CyberGuy” Knutsson)

HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS

Advertisement

What this breach means for people

This data breach highlights the serious security flaws in the location data industry. Companies like Gravy Analytics and Venntel have been profiting from collecting and selling sensitive location data, often without proper user consent. They’ve prioritized profit over security, and now the privacy of millions is at risk. This data could end up on black markets, endangering individuals, especially those in vulnerable situations, by making them targets for harassment or worse.

The FTC’s recent crackdown on Gravy, announced in December, underscores their negligence. The proposed order will prohibit these companies from selling or using location data, except in specific cases like national security or law enforcement. The implications are worrying. Sensitive locations like schools and workplaces could become easy targets for those with malicious intent.

Hackers claim massive breach of company that tracks and sells Americans' location data

A person using their cellphone and working on their laptop (Kurt “CyberGuy” Knutsson)

BEWARE OF ENCRYPTED PDFs AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

5 ways to stay safe in the age of data breaches

The Gravy Analytics breach serves as a sobering reminder of the vulnerabilities in the digital age. While it’s impossible to control how every company handles data, you can take steps to minimize your exposure and protect your privacy. Here are five actionable tips to stay safe.

1) Limit app permissions: Many apps request access to location data, contacts and more, even when it’s not necessary for their functionality. Regularly review the permissions for apps on your smartphone and revoke access to anything that feels excessive. For instance, a weather app doesn’t need access to your microphone or camera.

Advertisement

2) Use a VPN: Virtual private networks (VPNs) can mask your IP address and encrypt your internet activity, making it harder for data brokers and hackers to track your online behavior. A good VPN adds an extra layer of security, especially when using public Wi-Fi networks. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

3) Opt out of data sharing where possible: Some companies allow you to opt out of having your data collected or shared. Services like Your Ad Choices and privacy settings within platforms like Google can help you reduce the amount of data collected. Check for opt-out options with any apps or services you use frequently.

4) Avoid free apps that monetize data: Free apps often generate revenue by selling user data. Instead, consider paid versions of apps that explicitly prioritize privacy. Research the company behind the app to understand its data handling policies before downloading.

5) Invest in data removal services: Data removal services can help you regain some control over your personal information by identifying and removing it from people-search websites, data broker platforms and other online databases. Check out my top picks for data removal services here.

WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED

Advertisement

Kurt’s key takeaway

Companies that collect and sell user data pose a significant threat to privacy, and when they fail to protect this data, it often ends up in the hands of even worse actors. Cybercriminals, and even some governments, can exploit this information to target individuals. It is crucial to implement stringent repercussions for these companies when they fail in their duty to safeguard user data. A mere slap on the wrist is not enough. We need real accountability to deter negligence and protect individual privacy rights.

Should companies face stronger penalties for failing to protect personal data? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading

Technology

DJI Flip official: the unique bicycle spoke folding drone starts at $439

Published

on

DJI Flip official: the unique bicycle spoke folding drone starts at 9

At $439, the DJI Flip could be a good starting point for people who don’t typically buy drones at all. You can unfold it, launch it from your hand with a single button, land it on your hand again, or optionally use joysticks, all while capturing higher quality photos and video than the immediate competition.

In August, my colleague Thomas Ricker told you how DJI rival Hover had changed the game by selling a $349 flying camera that doesn’t require people to learn joysticks; with the $199 DJI Neo, DJI looked poised to muscle in on that in a big way. But the $439 Flip not only lets you launch and film basic dronies, orbits, and follow-me shots from the drone itself, it dramatically increases camera quality, flight stability, battery life (a quoted 31 minutes), and lets you launch it faster. You just won’t be able to fly it FPV like some of us were hoping.

Not only is the Flip the first DJI drone to look like a Star Wars AT-AT walker or a penny-farthing bicycle when folded, it’s also the first to automatically power on when you unfold it, saving two button presses. And when you flip out each of its four spoke-filled full-coverage propeller guards — which DJI says are a first for its folding drones — they join an auto-braking, forward-facing 3D infrared sensor to protect the camera from any front impacts as well.

1/9

Gallery: The DJI Flip. It’s bigger than a Mini.
Advertisement

And while that camera isn’t quite as impressive as the 1.0-inch type found on DJI’s Osmo Pocket 3, I was impressed by my first results in good light! It’s smaller 1/1.3-inch 4K60 sensor with 4:3 aspect ratio is capable of taking 2.7K vertical video or 48 megapixel stills behind a fast f/1.7 aperture lens. Here are a couple of my unedited early flights, a drone selfie, and a photo, to give you an idea:

An aerial photo from the DJI Flip.

Frankly, the DJI Neo — which costs less than half as much — can’t come close to this level of performance; over the same lake and the same park, the Neo couldn’t even maintain a smooth level shot as the breeze blew its lighter frame around, and its images were muddy and washed out by comparison. The Flip has a three-axis gimbal to help maintain that stability. Also, pros can record in 10-bit D-Log M.

Advertisement

But other, pricier DJI drones could offer better performance still, plus true vertical shooting by rotating the gimbal — and it’d be hard to imagine a drone enthusiast picking the Flip instead of waiting to see what DJI’s unannounced Mini 5 might bring to the table.

“There are currently no plans to retire the Mini Series. The DJI Flip is a new entry-level drone series that will be offered alongside the DJI Neo and DJI Mini. Each of these drones are designed to meet the needs of different types of beginners,” DJI spokesperson Daisy Kong confirms to The Verge.

I am continually surprised by how large the Flip is; while it stays under the 249-gram weight limit that typically triggers government compliance standards like publicly broadcasting your location. Despite its folding arms, it doesn’t fold down smaller than a Mini so there’s no way I’m fitting it into any but the biggest cargo pants pockets I own. It’s also quite loud despite its ducted propellers — absolutely not among the quieter drones that the company sells.

And despite costing more than the $199 DJI Neo, it doesn’t support any FPV headsets to let you virtually soar like a bird.

But the Flip does cost just $439 complete with a basic RC-N3 joystick controller that lets you use your phone as a screen, plus the launch-it-from-your-hand modes; a $779 kit comes with three batteries, a carrying case, and a more capable DJI RC 2 controller with a built-in daylight visible 700-nit screen. The DJI Mini 4 Pro versions of each of same kits cost $959 and $1,099 respectively, a $320 difference.

Advertisement

The DJI Flip should be available to buy and ship today, from DJI’s website.

Photography and video by Sean Hollister / The Verge

Continue Reading

Trending