Montel IT Support Support when you need it, peace of mind when you don't.

Blackmail With a Twist

Last Saturday a customer called to say she was concerned about an email she had received. I asked her to forward the email to me as I was certain it would be a type of blackmail email scam. Sure enough when I looked at the body of the email I recognised it as a common type of scam.

Here is the body of the email:

𝙸 πš›πšŽπššπšžπš’πš›πšŽ πš’πš˜πšžπš› 𝟷𝟢𝟢% πšŠπšπšπšŽπš—πšπš’πš˜πš— πšπš˜πš› πšπš‘πšŽ πšžπš™ πšŒπš˜πš–πš’πš—πš 𝟸𝟺 πš‘πš˜πšžπš›πšœ, πš˜πš› 𝙸 πš–πšŠπš’ πš–πšŠπš”πšŽ πšœπšžπš›πšŽ 𝚒𝚘𝚞 πšπš‘πšŠπš 𝚒𝚘𝚞 πš•πš’πšŸπšŽ 𝚘𝚞𝚝 𝚘𝚏 πšŽπš–πš‹πšŠπš›πš›πšŠπšœπšœπš–πšŽπš—πš πšπš˜πš› πšπš‘πšŽ πš›πšŽπšœπš 𝚘𝚏 πš’πš˜πšžπš› πšŽπš‘πš’πšœπšπšŽπš—πšŒπšŽ.

π™·πšŽπš’, 𝚒𝚘𝚞 𝚍𝚘 πš—πš˜πš πš”πš—πš˜πš  πš–πšŽ πš™πšŽπš›πšœπš˜πš—πšŠπš•πš•πš’. 𝚈𝚎𝚝 𝙸 πš”πš—πš˜πš  πš“πšžπšœπš πšŠπš‹πš˜πšžπš πšŽπšŸπšŽπš›πš’πšπš‘πš’πš—πš πšŠπš‹πš˜πšžπš 𝚒𝚘𝚞. π™°πš•πš• 𝚘𝚏 πš’πš˜πšžπš› πšπšŠπšŒπšŽπš‹πš˜πš˜πš” πšŒπš˜πš—πšπšŠπšŒπš πš•πš’πšœπš, πš–πš˜πš‹πš’πš•πšŽ πš™πš‘πš˜πš—πšŽ πšŒπš˜πš—πšπšŠπšŒπšπšœ 𝚊𝚜 πš πšŽπš•πš• 𝚊𝚜 πšŠπš•πš• πšπš‘πšŽ πšπš’πšπš’πšπšŠπš• πšŠπšŒπšπš’πšŸπš’πšπš’ πš˜πš— πš’πš˜πšžπš› πšŒπš˜πš–πš™πšžπšπšŽπš› πšπš›πš˜πš– πš™πšŠπšœπš 𝟷𝟻𝟻 𝚍𝚊𝚒𝚜.

πš†πš‘πš’πšŒπš‘ πš’πš—πšŒπš•πšžπšπšŽπšœ, πš’πš˜πšžπš› πš–πšŠπšœπšπšžπš›πš‹πšŠπšπš’πš˜πš— πšŸπš’πšπšŽπš˜, πš πš‘πš’πšŒπš‘ πš‹πš›πš’πš—πšπšœ πš–πšŽ 𝚝𝚘 πšπš‘πšŽ πš–πšŠπš’πš— πš›πšŽπšŠπšœπš˜πš— πš πš‘πš’ 𝙸 πšŠπš– πšŒπš˜πš–πš™πš˜πšœπš’πš—πš πšπš‘πš’πšœ 𝚎 πš–πšŠπš’πš• 𝚝𝚘 𝚒𝚘𝚞.
πš†πšŽπš•πš• πšπš‘πšŽ πš•πšŠπšœπš πšπš’πš–πšŽ 𝚒𝚘𝚞 πš πšŽπš—πš 𝚝𝚘 πšπš‘πšŽ πš™πš˜πš›πš— πš πšŽπš‹ πšœπš’πšπšŽπšœ, πš–πš’ πš–πšŠπš•πš πšŠπš›πšŽ πšŽπš—πšπšŽπš πšžπš™ πš‹πšŽπš’πš—πš πšŠπšŒπšπš’πšŸπšŠπšπšŽπš πš’πš—πšœπš’πšπšŽ πš’πš˜πšžπš› πš™πšŽπš›πšœπš˜πš—πšŠπš• πšŒπš˜πš–πš™πšžπšπšŽπš› πš πš‘πš’πšŒπš‘ πšŽπš—πšπšŽπš πšžπš™ πšœπšŠπšŸπš’πš—πš 𝚊 πš‹πšŽπšŠπšžπšπš’πšπšžπš• πšŸπš’πšπšŽπš˜ πšŒπš•πš’πš™ 𝚘𝚏 πš’πš˜πšžπš› πš–πšŠπšœπšπšžπš›πš‹πšŠπšπš’πš˜πš— πš™πš•πšŠπš’ πš‹πš’ πšŠπšŒπšπš’πšŸπšŠπšπš’πš—πš πš’πš˜πšžπš› πš πšŽπš‹πšŒπšŠπš–.
(
𝚒𝚘𝚞 𝚐𝚘𝚝 𝚊 πš’πš—πšŒπš›πšŽπšπš’πš‹πš•πš’ πšžπš—πšžπšœπšžπšŠπš• πš™πš›πšŽπšπšŽπš›πšŽπš—πšŒπšŽ πš‹πšπš  πš•πš–πšŠπš˜)

𝙸 πš‘πšŠπšŸπšŽ πšπš‘πšŽ πšŒπš˜πš–πš™πš•πšŽπšπšŽ πš›πšŽπšŒπš˜πš›πšπš’πš—πš. π™Έπš 𝚒𝚘𝚞 πšπšŽπšŽπš• 𝙸 πšŠπš– πšπš˜πš˜πš•πš’πš—πš πšŠπš›πš˜πšžπš—πš, πš“πšžπšœπš πš›πšŽπš™πš•πš’ πš™πš›πš˜πš˜πš πšŠπš—πš 𝙸 πš πš’πš•πš• πš‹πšŽ πšπš˜πš›πš πšŠπš›πšπš’πš—πš πšπš‘πšŽ πš™πšŠπš›πšπš’πšŒπšžπš•πšŠπš› πš›πšŽπšŒπš˜πš›πšπš’πš—πš πš›πšŠπš—πšπš˜πš–πš•πš’ 𝚝𝚘 𝟽 πš™πšŽπš˜πš™πš•πšŽ 𝚒𝚘𝚞 πš”πš—πš˜πš .

π™Έπš πš–πš’πšπš‘πš πš‹πšŽ πš’πš˜πšžπš› πšπš›πš’πšŽπš—πšπšœ, 𝚌𝚘 πš πš˜πš›πš”πšŽπš›πšœ, πš‹πš˜πšœπšœ, πš™πšŠπš›πšŽπš—πšπšœ (𝙸 πšπš˜πš—'𝚝 πš”πš—πš˜πš ! π™Όπš’ πšœπš’πšœπšπšŽπš– πš πš’πš•πš• πš›πšŠπš—πšπš˜πš–πš•πš’ πšŒπš‘πš˜πš˜πšœπšŽ πšπš‘πšŽ πšŒπš˜πš—πšπšŠπšŒπš πšπšŽπšπšŠπš’πš•πšœ).
πš†πš˜πšžπš•πš 𝚒𝚘𝚞 πš‹πšŽ πšŒπšŠπš™πšŠπš‹πš•πšŽ 𝚝𝚘 𝚐𝚊𝚣𝚎 πš’πš—πšπš˜ πšŠπš—πš’πš˜πš—πšŽ'𝚜 𝚎𝚒𝚎𝚜 πšŠπšπšŠπš’πš— πšŠπšπšπšŽπš› πš’πš? 𝙸 πšπš˜πšžπš‹πš πšπš‘πšŠπš...

π™±πšžπš, πš’πš πšπš˜πšŽπšœπš—'𝚝 πš‘πšŠπšŸπšŽ 𝚝𝚘 πš‹πšŽ πšπš‘πšŠπš πš™πšŠπšπš‘.

𝙸 πš πš˜πšžπš•πš πš•πš’πš”πšŽ 𝚝𝚘 πš–πšŠπš”πšŽ 𝚒𝚘𝚞 𝚊 πš˜πš—πšŽ πšπš’πš–πšŽ, πš—πš˜πš— πš—πšŽπšπš˜πšπš’πšŠπš‹πš•πšŽ πš˜πšπšπšŽπš›.

π™Ώπšžπš›πšŒπš‘πšŠπšœπšŽ $ 𝟸𝟢𝟢𝟢 πš’πš— πš‹πš’πšπšŒπš˜πš’πš— πšŠπš—πš πšœπšŽπš—πš πšπš‘πšŽπš– πš˜πš— πšπš‘πšŽ πš•πš’πšœπšπšŽπš πš‹πšŽπš•πš˜πš  πšŠπšπšπš›πšŽπšœπšœ:

16aAB4tBJug6NC*7Li9gMNPASx5hz9hwD4B

[
π™²π™°πš‚π™΄ πšœπšŽπš—πšœπš’πšπš’πšŸπšŽ, πšŒπš˜πš™πš’ πšŠπš—πš πš™πšŠπšœπšπšŽ πš’πš, πšŠπš—πš πš›πšŽπš–πš˜πšŸπšŽ * πšπš›πš˜πš– πš’πš]

(
π™Έπš 𝚒𝚘𝚞 𝚍𝚘 πš—πš˜πš πšžπš—πšπšŽπš›πšœπšπšŠπš—πš πš‘πš˜πš , πšπš˜πš˜πšπš•πšŽ πš‘πš˜πš  𝚝𝚘 πšŠπšŒπššπšžπš’πš›πšŽ πš‹πš’πšπšŒπš˜πš’πš—. π™³πš˜ πš—πš˜πš 𝚠𝚊𝚜𝚝𝚎 πš–πš’ πš’πš–πš™πš˜πš›πšπšŠπš—πš πšπš’πš–πšŽ)
π™Έπš 𝚒𝚘𝚞 πšœπšŽπš—πš πšπš‘πš’πšœ πš™πšŠπš›πšπš’πšŒπšžπš•πšŠπš› 'πšπš˜πš—πšŠπšπš’πš˜πš—' (πš πš‘πš’ πšπš˜πš—'𝚝 𝚠𝚎 πšŒπšŠπš•πš• πšπš‘πš’πšœ πšπš‘πšŠπš?). π™°πšπšπšŽπš› πšπš‘πšŠπš, 𝙸 πš πš’πš•πš• πšπš’πšœπšŠπš™πš™πšŽπšŠπš› πšπš˜πš› 𝚐𝚘𝚘𝚍 . πšŠπš—πš πš—πšŽπšŸπšŽπš› πšŒπš˜πš—πšπšŠπšŒπš 𝚒𝚘𝚞 πšŠπšπšŠπš’πš—. 𝙸 πš πš’πš•πš• πš›πšŽπš–πš˜πšŸπšŽ πšŽπšŸπšŽπš›πš’πšπš‘πš’πš—πš 𝙸 πš‘πšŠπšŸπšŽ 𝚐𝚘𝚝 πšŒπš˜πš—πšŒπšŽπš›πš—πš’πš—πš 𝚒𝚘𝚞. 𝚈𝚘𝚞 πš–πšŠπš’ πš”πšŽπšŽπš™ πš˜πš— πš•πš’πšŸπš’πš—πš πš’πš˜πšžπš› πšŒπšžπš›πš›πšŽπš—πš πš˜πš›πšπš’πš—πšŠπš›πš’ 𝚍𝚊𝚒 𝚝𝚘 𝚍𝚊𝚒 πš•πš’πšπšŽπšœπšπš’πš•πšŽ πš πš’πšπš‘ πšŠπš‹πšœπš˜πš•πšžπšπšŽπš•πš’ πš—πš˜ πšŒπš˜πš—πšŒπšŽπš›πš—πšœ.

𝚈𝚘𝚞'𝚟𝚎 𝚐𝚘𝚝 𝟸𝟺 πš‘πš˜πšžπš›πšœ πš’πš— πš˜πš›πšπšŽπš› 𝚝𝚘 𝚍𝚘 𝚜𝚘. πšˆπš˜πšžπš› πšπš’πš–πšŽ πšœπšπšŠπš›πšπšœ 𝚘𝚏𝚏 𝚊𝚜 πšœπš˜πš˜πš— 𝚒𝚘𝚞 𝚐𝚘 πšπš‘πš›πš˜πšžπšπš‘ πšπš‘πš’πšœ πšŽπš–πšŠπš’πš•. 𝙸 πš‘πšŠπšŸπšŽ πšŠπš— πšœπš™πšŽπšŒπš’πšŠπš• 𝚌𝚘𝚍𝚎 πšπš‘πšŠπš πš πš’πš•πš• πšŠπš•πšŽπš›πš πš–πšŽ 𝚊𝚜 πšœπš˜πš˜πš— 𝚊𝚜 𝚒𝚘𝚞 𝚐𝚘 πšπš‘πš›πš˜πšžπšπš‘ πšπš‘πš’πšœ πšŽπš–πšŠπš’πš• πšπš‘πšŽπš›πšŽπšπš˜πš›πšŽ πšπš˜πš—'𝚝 πšŠπšπšπšŽπš–πš™πš 𝚝𝚘 𝚊𝚌𝚝 πšœπš–πšŠπš›πš.

I have seen a lot of emails similar to this one, even received a few myself, and they are sent out by scumbags that hope a few of the recipients will believe that the claims are genuine and pay up. Unless you are extremely gullible or you have been visiting pornographic websites it should be very obvious that the claims in the email are false.

However, one thing about this email is different to all of the examples I have seen or received. This email has a password in the Subject field and in the first line of the body of the email:

Email Headers 2

The recipient recognised the password as belonging to a LinkedIn account. Not knowing how the scammer had obtained her email address and LinkedIn password prompted her to call me for advice.

The scammer has included this password to try and convince the recipient that all of it must be genuine because the password is the correct one for her LinkedIn account. Notice though that no part of the email specifically mentions LinkedIn and no other passwords are included.

So how has the scammer obtained this password?

The scammer has simply used a list of stolen email addresses that also include their corresponding passwords. LinkedIn had about 164 million account details stolen on the 21st May 2016 and it appears that this is the data the scammer is using to target people with this email. My customer has not used her LinkedIn account for a long time so she had not changed the password after the 2016 data breach occurred.

With so much stolen data available to scammers it is very easy to do something like this. One database of stolen data contains more than 770 million email addresses and passwords. This is valuable for hackers because some recipients will see a genuine password and assume that other claims in an email must be true. They won’t realise that the password is from a stolen list and that other claims are all bogus.

Keeping tabs on your on-line accounts.

Every single day data will be stolen from one or more on-line services. Far more email addresses and passwords are obtained in this way than from hacking into peoples computers and other devices. So it is really important that you are aware of any data loss that involves your own details. Don’t assume that the organisations that lose the data will inform you about any breach as often they don’t know for weeks or months after it has happened.

Some will also keep quiet for a period after any breach whilst they try to work out what has been stolen and how they are going to mitigate the impact on their organisation. Quite often the stolen data is found on hacking website long before the hacked organisations tell users about the problem.

Firefox Monitor

One excellent service that I use and recommend is called Firefox Monitor. It is free to use and is very simple to setup. If you don’t already have a Firefox account you can sign up and then you are able to add all your email addresses to their Monitor service. If your email address is found in any stolen data located by their service you will be notified so that you can resolve the issue.

I have four email addresses being monitored by their service as you can see below:


Firefox Monitor Dashboard 2

When I signed up for the service I discovered that two of my email addresses had been found in data breaches of two services. The Firefox Monitor service made it very easy for me to resolve these two problems. It even allows me to mark them as resolved so I have a history of what services have been breached and an indication that I have dealt with it.

To join the Firefox Monitor service and add your own email addresses just go to:

https://monitor.firefox.com/

If you already have a Firefox account just sign in and then add your email addresses. If you don’t have a Firefox account its free to sign up and your details will be kept private and secure. Put your email address into this service right now so you know if it has already been found in any of the published lists of stolen data.

The folly of using one password.

Some people are foolish enough to use a single password for more than one service. Hopefully, you are not one of them. If you only use one password as soon as it is stolen the criminals will be able to access all the services that use the same password. You probably won’t find out about it being stolen until it is too late. If or when you do find out that your password has been stolen you will have to change it on every service you have used it on.

As I use unique passwords for all of my on-line services, and I have hundreds of them, when I found out about the two data breaches I only needed to change those two passwords. If you want to get an idea of how many breached services are already covered by the Firefox Monitor service go to:

https://monitor.firefox.com/breaches

Scroll down to the bottom of the page and then click the Show all button. One look at that long list of breached sites should tell you that sooner or later an on-line service you use will be hacked. Be sensible and use unique passwords for each service you sign up to and when the inevitable happens you won’t have to spend hours changing passwords.

Don’t use patterns in your passwords.

If you look at the password used in this scam email, the one used for a LinkedIn account, you should be able to see how it has been created. There is a pretty obvious pattern that any good hacker will spot and will then try to exploit. Passwords built with patterns are not as strong as they may seem as it is quite easy to configure a password cracking tool to attack a service or protected data file using guesses based on the likely pattern discerned from a stolen password. This is far easier to do than you may think.

Take a look at this short and easy to follow video on YouTube to see just how easy it is to configure password attack tools:

https://www.youtube.com/watch?v=fPHkO6T_g8A

The very first tool he describes, called Cewl, should stop you from ever using passwords with an obvious pattern in them. If it doesn’t then the second tool he describes, called Crunch, should do the trick. If you watch the video you will definitely think about how good your own passwords really are. The person who made this video is an ethical hacker and is not trying to teach people how to hack systems. You can use these tools for good or evil and in this case he is showing how they can be put to good use.

If you want advice or help to improve your own password security then get in touch.

Your privacy really matters.
This website will NOT track you.

If you value your privacy I recommend that you use Firefox, Brave or Safari on an Apple device for your web browser. I also recommend using DuckDuckGo for your search engine.