Original Release Date: 4/17/2020
An old extortion email scam, first seen in early Summer 2018, has resurfaced in a new widespread campaign. In addition to receiving several incident reports from the public detailing these extortion emails, the NJCCIC’s own email security solution blocked hundreds of these extortion emails attempting to be delivered to NJ state employees. The sender of the emails claims that they have acquired the recipient’s password by means of a malware-laden adult content website. They purport to have gained access to the target’s device and used the device’s webcam to record a compromising video, further threatening to disseminate it to all of the recipient’s contacts if a bitcoin payment is not made, typically in the sum of $1,900-$2,000. The password detailed in the subject line and body of the email is a legitimate past or current password, which was likely found through publicly-available information from past data breaches and is only an attempt to invoke credibility; the recipient’s device was not compromised. These emails appear to be part of a large scale campaign as identified by various open source reporting. Of the emails attempting to deliver to NJ state employee inboxes, senders were outlook[.]com email addresses and the subject lines were in a “username : password” format. As many New Jersey citizens continue to follow Governor Phil Murphy’s stay-at-home order, threat actors are taking advantage of vulnerable users that may lack proper device and email security. The rate at which this extortion scam is proliferating suggests that these scams are successful and worth the time and resources to distribute them. The NJCCIC has not found any indication that these threats are credible, and users are advised to ignore and delete these emails.
The NJCCIC encourages users who discover signs of malicious cyber activity to report to the NJCCIC via the Cybersecurity Incident Reporting form at https://cyber.nj.gov/report