Extortion spam emails have raked in INR 1.5 Crore since August 2018

- Advertisment -
- Advertisement -
Although Bitcoin has been the most volatile in the past few years, yet this has not deterred the criminals from collecting bits from the Bitcoins. When we talk about extortion, we have seen the emergence and effectiveness of Ransomware using Bitcoins and other forms of crypto-currencies. We have also seen Crypto-Currency Miner (sic.Monero) being deployed on hacked servers/systems, so as to take advantage of the computational resources and generate crypto-currencies. However, lately, we have seen a rising trend in extortion emails, asking for Bitcoins.
Extortion spam emails have raked in INR 1.5 Crore since August 2018 eScan
These emails are in plain text format and warn the recipient of a malware being deployed on an Adult Porn Site, furthermore, in the mails, it is also explained in brief how the recipient’s, the webcam was hacked, keylogger was deployed and the login credentials were stolen. The email also explains that a video was captured while they were busy visiting the Adult Porn site and the recipient is threatened with dire consequences viz. sharing of the video with those present in the stolen address book.
Similar to Ransomware and Miner Attacks, this scam also relies on the anonymity provided by crypto-currencies. It’s a simple plain text threat, based on the premise that the recipient has visited some Porn site. The criminals have in most of the cases, successfully invoked the aspect of fear and social stigma into the psych/mind of the email recipients.
eScan’s research team has been analyzing and tracking these emails and most importantly, the Bitcoin addresses found in these emails. The Modus-Operandi of the criminals is to
  1. Create Bitcoin-Address for every Spam campaign.
  2. In case the recipient’s do pay up the extortion BTCs, the BTC is broken down and transferred to multiple Bitcoin Wallets so as to ensure that researchers find it difficult to track the transactions.
  3. The breakdown and subsequent transfer of the BTC are done a couple of times, hence at the end of the third iteration, we have close to 100 BTC wallets.
  4. Finally, all these wallets are consolidated and the BTCs transferred to one single wallet.
During the course of research, we came across numerous wallets with one of them (FJDeT2E1fWb4oZBeub4MH9ennUp5e4QG6) having received around 31 BTC and were then sent to other wallets. The criminals have sometimes transferred the BTCs to Escrow Accounts / Exchanges to further anonymize/convert the BTCs into cash. At the existing exchange rate of BTC, the wallet was worth 1,49,09,139 INR and thus the Spam Campaign can be considered highly profitable and successful.
Some of the BTC addresses of the campaign:
  1. 19YayKasVoiRcjcihqmUpjVwvWB9aGyKCC
  2. 1DtBY4zD7cK35fpbNecpxSaEuEmfu9uyVG
  3. 1BmXuzjeWdoBKhsX8kJMNBFz5uJzrc2Gvc
  4. 1HRpxFdKGc7Anb7xfpQf3tmAcH6pph2ssX
  5. 1FCaw9jXhHveRyLxB54ypCpJ2CtanVoLC1
  6. 1MJcj7MdWeKR7eT7PukLG78jcRGf4opcsD
Due to the anonymity provided it is impossible to track the identity of the Wallet Owner. Since the month of August 2018, there has been a steady increase in these extortion spam mails.
According to eScan researchers, these emails are a part of a spam campaign and pieces of advice that recipients shouldn’t reply to these emails. However, since this campaign is in its nascent stages, there is a possibility that in near future the emails might be weaponized with the usual variants.
Prevention Measures:
  1. Ensure to not reply to these emails at all.
  2. Install and Configure security modules.
  3. Enable Real-Time Monitoring of Antivirus
  4. Use Firewall IDS/IPS Intrusion prevention
  5. Users shouldn’t enable macros in documents.
  6. Organizations should deploy and maintain a backup solution.
  7. Most important, Organizations should implement MailScan at the Gateway Level for mail servers, to contain the spread of suspicious attachments.


H2S Media Team
H2S is a group of tech enthusiasts those are passionate about latest technology developments. They always like to solve own technical problems and share the same solution with others through this Website.


Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest Posts

How to install Ubuntu Cinnamon Remix 19.10 on Virtual box or PC

The Ubuntu distribution of Linux doesn’t need an introduction, and it is the favourite Linux distribution of many users,...

How to open 4 or more than 4 Windows Explorer locations on PC

When we use our computers running Windows, copying and moving files from one location to the other is something...

Top 5 Classic games that you should download on your Android mobile

Thanks to the powerful Android phones that we have in our hands in 2020, we can run a lot...

Tekken 7 Pro Tips for the Beginners to master the game

Tekken 7 game is considered as one of the most popular but very hard to master. As this is...
- Advertisement -

H1Z1 Mobile version game is about to launch

The developer has announced for H1Z1 Mobile Production: A piece of news came out form the Business Wire that...

Most misunderstood, or interchangeably used tech terms of the era

We are advancing very fast in the world of Technology and we keep seeing new peripherals and gadgets every...

- Advertisment -
- Advertisement -

You might also likeRELATED
Recommended to you