Blackmail With a Twist
Last Saturday a customer called to say she was concerned about an email she had received. I asked her to forward the email to me as I was certain it would be a type of blackmail email scam. Sure enough when I looked at the body of the email I recognised it as a common type of scam.
Here is the body of the email:
Here is the body of the email:
πΈ πππππππ π’πππ π·πΆπΆ% πππππππππ πππ πππ ππ ππππππ πΈπΊ πππππ, ππ πΈ πππ’ ππππ ππππ π’ππ ππππ π’ππ ππππ πππ ππ πππππππππππππ πππ πππ ππππ ππ π’πππ ππ‘πππππππ.
π·ππ’, π’ππ ππ πππ ππππ ππ ππππππππππ’. πππ πΈ ππππ ππππ πππππ πππππ’πππππ πππππ π’ππ. π°ππ ππ π’πππ ππππππππ πππππππ ππππ, ππππππ πππππ ππππππππ ππ π πππ ππ πππ πππ πππππππ ππππππππ’ ππ π’πππ ππππππππ ππππ ππππ π·π»π» πππ’π.
πππππ ππππππππ, π’πππ ππππππππππππ πππππ, π ππππ ππππππ ππ ππ πππ ππππ ππππππ π ππ’ πΈ ππ πππππππππ ππππ π ππππ ππ π’ππ.
ππππ πππ ππππ ππππ π’ππ π πππ ππ πππ ππππ π ππ πππππ, ππ’ ππππ πππ πππππ ππ πππππ πππππππππ ππππππ π’πππ ππππππππ ππππππππ π ππππ πππππ ππ ππππππ π πππππππππ πππππ ππππ ππ π’πππ ππππππππππππ ππππ’ ππ’ ππππππππππ π’πππ π πππππ.
(π’ππ πππ π ππππππππππ’ πππππππ ππππππππππ πππ ππππ)
πΈ ππππ πππ ππππππππ πππππππππ. πΈπ π’ππ ππππ πΈ ππ πππππππ ππππππ, ππππ πππππ’ πππππ πππ πΈ π πππ ππ ππππ ππππππ πππ ππππππππππ πππππππππ ππππππππ’ ππ π½ ππππππ π’ππ ππππ .
πΈπ πππππ ππ π’πππ πππππππ, ππ π ππππππ, ππππ, πππππππ (πΈ πππ'π ππππ ! πΌπ’ ππ’ππππ π πππ ππππππππ’ ππππππ πππ πππππππ πππππππ).
πππππ π’ππ ππ πππππππ ππ πππ£π ππππ πππ’πππ'π ππ’ππ πππππ πππππ ππ? πΈ πππππ ππππ...
π±ππ, ππ πππππ'π ππππ ππ ππ ππππ ππππ.
πΈ π ππππ ππππ ππ ππππ π’ππ π πππ ππππ, πππ ππππππππππ πππππ.
πΏπππππππ $ πΈπΆπΆπΆ ππ πππππππ πππ ππππ ππππ ππ πππ ππππππ πππππ πππππππ:
16aAB4tBJug6NC*7Li9gMNPASx5hz9hwD4B
[π²π°ππ΄ πππππππππ, ππππ’ πππ πππππ ππ, πππ ππππππ * ππππ ππ]
(πΈπ π’ππ ππ πππ ππππππππππ πππ , ππππππ πππ ππ πππππππ πππππππ. π³π πππ π ππππ ππ’ πππππππππ ππππ)
πΈπ π’ππ ππππ ππππ ππππππππππ 'ππππππππ' (π ππ’ πππ'π π π ππππ ππππ ππππ?). π°ππππ ππππ, πΈ π πππ πππππππππ πππ ππππ . πππ πππππ πππππππ π’ππ πππππ. πΈ π πππ ππππππ πππππ’πππππ πΈ ππππ πππ ππππππππππ π’ππ. πππ πππ’ ππππ ππ ππππππ π’πππ πππππππ ππππππππ’ πππ’ ππ πππ’ πππππππ’ππ π πππ ππππππππππ’ ππ ππππππππ.
πππ'ππ πππ πΈπΊ πππππ ππ πππππ ππ ππ ππ. ππππ ππππ ππππππ πππ ππ ππππ π’ππ ππ πππππππ ππππ πππππ. πΈ ππππ ππ πππππππ ππππ ππππ π πππ πππππ ππ ππ ππππ ππ π’ππ ππ πππππππ ππππ πππππ πππππππππ πππ'π πππππππ ππ πππ πππππ.
I have seen a lot of emails similar to this one, even received a few myself, and they are sent out by scumbags that hope a few of the recipients will believe that the claims are genuine and pay up. Unless you are extremely gullible or you have been visiting pornographic websites it should be very obvious that the claims in the email are false.
However, one thing about this email is different to all of the examples I have seen or received. This email has a password in the Subject field and in the first line of the body of the email:
The recipient recognised the password as belonging to a LinkedIn account. Not knowing how the scammer had obtained her email address and LinkedIn password prompted her to call me for advice.
The scammer has included this password to try and convince the recipient that all of it must be genuine because the password is the correct one for her LinkedIn account. Notice though that no part of the email specifically mentions LinkedIn and no other passwords are included.
So how has the scammer obtained this password?
The scammer has simply used a list of stolen email addresses that also include their corresponding passwords. LinkedIn had about 164 million account details stolen on the 21st May 2016 and it appears that this is the data the scammer is using to target people with this email. My customer has not used her LinkedIn account for a long time so she had not changed the password after the 2016 data breach occurred.
With so much stolen data available to scammers it is very easy to do something like this. One database of stolen data contains more than 770 million email addresses and passwords. This is valuable for hackers because some recipients will see a genuine password and assume that other claims in an email must be true. They won’t realise that the password is from a stolen list and that other claims are all bogus.
Keeping tabs on your on-line accounts.
Every single day data will be stolen from one or more on-line services. Far more email addresses and passwords are obtained in this way than from hacking into peoples computers and other devices. So it is really important that you are aware of any data loss that involves your own details. Don’t assume that the organisations that lose the data will inform you about any breach as often they don’t know for weeks or months after it has happened.
Some will also keep quiet for a period after any breach whilst they try to work out what has been stolen and how they are going to mitigate the impact on their organisation. Quite often the stolen data is found on hacking website long before the hacked organisations tell users about the problem.
One excellent service that I use and recommend is called Firefox Monitor. It is free to use and is very simple to setup. If you don’t already have a Firefox account you can sign up and then you are able to add all your email addresses to their Monitor service. If your email address is found in any stolen data located by their service you will be notified so that you can resolve the issue.
I have four email addresses being monitored by their service as you can see below:
When I signed up for the service I discovered that two of my email addresses had been found in data breaches of two services. The Firefox Monitor service made it very easy for me to resolve these two problems. It even allows me to mark them as resolved so I have a history of what services have been breached and an indication that I have dealt with it.
To join the Firefox Monitor service and add your own email addresses just go to:
https://monitor.firefox.com/
If you already have a Firefox account just sign in and then add your email addresses. If you don’t have a Firefox account its free to sign up and your details will be kept private and secure. Put your email address into this service right now so you know if it has already been found in any of the published lists of stolen data.
The folly of using one password.
Some people are foolish enough to use a single password for more than one service. Hopefully, you are not one of them. If you only use one password as soon as it is stolen the criminals will be able to access all the services that use the same password. You probably won’t find out about it being stolen until it is too late. If or when you do find out that your password has been stolen you will have to change it on every service you have used it on.
As I use unique passwords for all of my on-line services, and I have hundreds of them, when I found out about the two data breaches I only needed to change those two passwords. If you want to get an idea of how many breached services are already covered by the Firefox Monitor service go to:
https://monitor.firefox.com/breaches
Scroll down to the bottom of the page and then click the Show all button. One look at that long list of breached sites should tell you that sooner or later an on-line service you use will be hacked. Be sensible and use unique passwords for each service you sign up to and when the inevitable happens you won’t have to spend hours changing passwords.
Don’t use patterns in your passwords.
If you look at the password used in this scam email, the one used for a LinkedIn account, you should be able to see how it has been created. There is a pretty obvious pattern that any good hacker will spot and will then try to exploit. Passwords built with patterns are not as strong as they may seem as it is quite easy to configure a password cracking tool to attack a service or protected data file using guesses based on the likely pattern discerned from a stolen password. This is far easier to do than you may think.
Take a look at this short and easy to follow video on YouTube to see just how easy it is to configure password attack tools:
https://www.youtube.com/watch?v=fPHkO6T_g8A
The very first tool he describes, called Cewl, should stop you from ever using passwords with an obvious pattern in them. If it doesn’t then the second tool he describes, called Crunch, should do the trick. If you watch the video you will definitely think about how good your own passwords really are. The person who made this video is an ethical hacker and is not trying to teach people how to hack systems. You can use these tools for good or evil and in this case he is showing how they can be put to good use.
If you want advice or help to improve your own password security then get in touch.