The Internet Crime Complaint Center (IC3) has reported a surge in online extortion scams, particularly as more individuals spend time at home and online. Cybercriminals are exploiting increased internet usage to target potential victims, pressuring them into paying money through threats of revealing sensitive personal information. These scams often involve emails claiming to possess compromising photos or videos, threatening to share them with the victim’s contacts unless a ransom is paid. While these online extortion attempts can vary, they often share several key characteristics.
Common Signs of Online Extortion Scams
While online extortion schemes are diverse and constantly evolving, being aware of common red flags can help you identify and avoid falling victim. Scammers frequently adapt their tactics to capitalize on current events, like the COVID-19 pandemic, data breaches, or trending internet phenomena, to make their schemes appear more convincing. Here are some common indicators to watch out for:
- Unsolicited Emails with Poor Grammar: Extortion attempts frequently arrive as emails from unknown senders, often characterized by broken English and numerous grammatical errors. This is a classic sign of a phishing or scam attempt.
- Personal Information Used for Intimidation: To increase the perceived threat, scammers often include personal details in the email, such as your username or a password. This information is often obtained from data breaches and used to make the threat seem more credible.
- False Accusations of Compromising Activities: The emails typically accuse recipients of engaging in activities like visiting adult websites, infidelity, or other embarrassing situations. These accusations are designed to shock and scare the victim into compliance.
- Claims of Spyware or Hacking: Scammers commonly claim to have infected your computer with spyware or adware, or that they have “recorded” you. This is a fabricated explanation for how they supposedly obtained compromising information.
- Threats to Expose Personal Information: A core element of these scams is the threat to distribute videos or sensitive information to family, friends, colleagues, or social media contacts if the demanded ransom is not paid.
- Urgent Payment Deadlines: Scammers typically create a sense of urgency by giving a short timeframe for payment, often around 48 hours. This pressure tactic is designed to prevent victims from thinking rationally or seeking advice.
- Bitcoin Ransom Demands: Payment is almost always requested in Bitcoin or other cryptocurrencies. These virtual currencies offer a high degree of anonymity, making it difficult to trace the scammers and recover funds.
Alt text: Public service announcement from the FBI’s Internet Crime Complaint Center (IC3) warning about the rise of online extortion scams during stay-at-home orders, urging vigilance and reporting.
How to Protect Yourself from Online Extortion
Staying safe from online extortion requires a proactive approach to online security and a healthy dose of skepticism. Here are essential tips to protect yourself:
- Be Cautious with Unknown Emails: Never open emails or attachments from senders you don’t recognize. Phishing emails are a primary method for delivering malware and initiating scams.
- Regularly Monitor Your Accounts: Keep a close eye on your bank account statements and credit reports for any suspicious or unauthorized activity. Early detection is crucial for mitigating potential damage.
- Avoid Engaging with Suspicious Senders: Do not reply to or interact with unsolicited email senders. Any engagement can confirm your email address is active and potentially lead to further scam attempts.
- Limit Online Sharing of Sensitive Information: Refrain from storing sensitive or embarrassing photos or personal information online or on your mobile devices. Consider the potential risks before sharing anything private online.
- Use Strong, Unique Passwords: Employ strong and unique passwords for all your online accounts. Password managers can help you create and securely store complex passwords, reducing the risk of account compromise.
- Never Share Personal Information via Email: Be extremely wary of any emails requesting personal information, even if they appear legitimate. Legitimate organizations will rarely, if ever, request sensitive data via email.
- Maximize Social Media Privacy Settings: Ensure your social media account privacy settings are activated and set to the highest level possible. Limit the visibility of your personal information to reduce your online footprint.
- Verify Website Addresses: Always double-check the web address of websites, especially when entering sensitive information. Manually type website addresses into your browser to avoid phishing links that may mimic legitimate sites.
The FBI strongly advises against paying online extortion demands. Paying ransom only encourages further criminal activity and can potentially fund organized crime and associated violent acts.
Reporting Online Extortion Attempts
If you believe you have been targeted by an online extortion scam, it is crucial to take action. Contact your local FBI field office and file an official complaint with the IC3 at www.ic3.gov. When reporting, provide as much relevant information as possible, including the extortion email with full header details and any Bitcoin addresses mentioned. Your report can help law enforcement track and combat these cybercriminals.