{"id":2709,"date":"2018-11-29T23:31:49","date_gmt":"2018-11-30T07:31:49","guid":{"rendered":"https:\/\/computertechsreno.com\/tips\/?p=2709"},"modified":"2024-11-08T06:13:46","modified_gmt":"2024-11-08T14:13:46","slug":"email-scam-uses-data-from-breached-websites-to-make-realistic-looking-email","status":"publish","type":"post","link":"https:\/\/computertechsreno.com\/tips\/email-scam-uses-data-from-breached-websites-to-make-realistic-looking-email\/","title":{"rendered":"Email scam uses data from breached websites to craft authentic looking email &#8211; How to check if your email address was exposed"},"content":{"rendered":"\n<p><em>Updated October 2024 to include new scare tactics:<\/em><\/p>\n\n\n\n<p>An email scam that we initially wrote about in 2018 has been quickly spreading with different variants that claims to have hacked the recipient&#8217;s email account and includes a password used by the recipient. One variant further claims to have caught the recipient looking at pornographic websites, and demanding &#8220;ransom&#8221; in the form of Bitcoin cryptocurrency payment to prevent the release of webcam photos being sent to all the recipient&#8217;s contacts. Examples of the &#8220;sexstortion&#8221; emails are shown below.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/krebsonsecurity.com\/2024\/09\/sextortion-scams-now-include-photos-of-your-home\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"996\" height=\"901\" src=\"https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2018\/11\/sextortion-maps.png\" alt=\"\" class=\"wp-image-4030\" srcset=\"https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2018\/11\/sextortion-maps.png 996w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2018\/11\/sextortion-maps-500x452.png 500w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2018\/11\/sextortion-maps-150x136.png 150w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2018\/11\/sextortion-maps-768x695.png 768w\" sizes=\"auto, (max-width: 996px) 100vw, 996px\" \/><\/a><figcaption class=\"wp-element-caption\">Above: This new variation of a &#8220;sexstortion&#8221; email seen in 2024 mentions the recipient&#8217;s home address and includes a photo obtained from Google Maps street view.<\/figcaption><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2018\/11\/Screenshot-2018-11-29-07.12.15.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"431\" src=\"https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2018\/11\/Screenshot-2018-11-29-07.12.15-500x431.png\" alt=\"\" class=\"wp-image-2710\" style=\"width:755px;height:auto\" srcset=\"https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2018\/11\/Screenshot-2018-11-29-07.12.15-500x431.png 500w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2018\/11\/Screenshot-2018-11-29-07.12.15-150x129.png 150w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2018\/11\/Screenshot-2018-11-29-07.12.15-768x661.png 768w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2018\/11\/Screenshot-2018-11-29-07.12.15-1024x882.png 1024w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2018\/11\/Screenshot-2018-11-29-07.12.15.png 1730w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><figcaption class=\"wp-element-caption\">This email from 2018 claims that the sender hacked the recipient&#8217;s email account, and even includes a password obtained from a data breach.<\/figcaption><\/figure>\n<\/div>\n\n\n<p>If you&#8217;re the recipient of such an email you may think &#8220;how did someone hack into my email account, and know my password?&#8221;&nbsp;The answer: they likely didn&#8217;t hack your account.<\/p>\n\n\n\n<p>Here&#8217;s how they have information about you: Data breaches from companies such as LinkedIn, Yahoo and countless others have exposed the email addresses, passwords and street addresses of millions of users. Clever scammers have taken widely available information from the data breaches and crafted emails that contain some of that information. If <a href=\"https:\/\/computertechsreno.com\/tips\/why-your-most-important-password-is-the-one-that-secures-your-email\/\" target=\"_blank\" rel=\"noreferrer noopener\">the password used to login to your email<\/a> isn&#8217;t used anywhere else, they likely just forged the email address to make it look like it came from your own account. With the addition of potentially embarrassing information, the &#8220;sextortion&#8221; scammer asks for Bitcoin cryptocurrentcy to prevent the release of information to everybody in your contact list (which they probably don&#8217;t really have).<\/p>\n\n\n\n<p>In summary, just ignore\/delete the email and change the password on any websites that match the password in the email. You shouldn&#8217;t be using the same password on multiple sites anyways.<\/p>\n\n\n\n<p>To find out if your email address(es) have been exposed in a data breach, you can safely enter your email address in the following websites:&nbsp;<a href=\"https:\/\/monitor.mozilla.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mozilla Monitor<\/a> and <a href=\"https:\/\/HaveIBeenPwned.com\" target=\"_blank\" rel=\"noreferrer noopener\">Have I Been Pwned<\/a><\/p>\n\n\n\n<p>Also see our <a href=\"https:\/\/computertechsreno.com\/tips\/top-5-password-tips-that-you-need-to-know\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"top 5 password tips that you need to know (opens in a new tab)\">top 5 password tips that you need to know<\/a>.<\/p>\n\n\n<a href=\"https:\/\/computertechsreno.com\/tips\/email-scam-uses-data-from-breached-websites-to-make-realistic-looking-email\/print\/\" title=\"Print This Article\" rel=\"nofollow\"><img decoding=\"async\" class=\"WP-PrintIcon\" src=\"https:\/\/computertechsreno.com\/tips\/wp-content\/plugins\/wp-print\/images\/printer_famfamfam.gif\" alt=\"Print This Article\" title=\"Print This Article\" style=\"border: 0px;\" \/><\/a>&nbsp;<a href=\"https:\/\/computertechsreno.com\/tips\/email-scam-uses-data-from-breached-websites-to-make-realistic-looking-email\/print\/\" title=\"Print This Article\" rel=\"nofollow\">Print This Article<\/a>\n","protected":false},"excerpt":{"rendered":"<p>Updated October 2024 to include new scare tactics: An email scam that we initially wrote about in 2018 has been quickly spreading with different variants that claims to have hacked the recipient&#8217;s email account and includes a password used by the recipient. One variant further claims to have caught the recipient looking at pornographic websites, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,13,4],"tags":[],"class_list":["post-2709","post","type-post","status-publish","format-standard","hentry","category-passwords","category-scams","category-security"],"_links":{"self":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/2709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/comments?post=2709"}],"version-history":[{"count":20,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/2709\/revisions"}],"predecessor-version":[{"id":4044,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/2709\/revisions\/4044"}],"wp:attachment":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/media?parent=2709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/categories?post=2709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/tags?post=2709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}