{"id":15027,"date":"2021-02-01T08:37:36","date_gmt":"2021-02-01T06:37:36","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=15027"},"modified":"2021-02-01T09:56:04","modified_gmt":"2021-02-01T07:56:04","slug":"warning-sextortion-scam","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2021\/02\/warning-sextortion-scam\/","title":{"rendered":"[:en]Warning: Sextortion scam[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<div>There is a &#8220;sextortion&#8221; email making the rounds at the moment and with many personnel and students still working andstudying from home, many are concerned about the risks.<\/div>\n<div>\u00a0<\/div>\n<div>&#8220;The device has been successfully hacked&#8221; is a new \u2018sextortion\u2019 email scam for 2021. This email scam, like most sextortion scams, relies on \u201csocial engineering\u201d, a process through which the scammers induce shame, panic or guilt. The scammers (the authors of the email) claim that they obtained material compromising the user (because of a computer hack, email account hack, router hack, etc) and threaten to publish it if the ransom is not paid. None these claims are true in any way; they are just deception.<\/div>\n<div>\u00a0<\/div>\n<div>The \u201cThe device has been successfully hacked\u201d email message says that someone successfully hacked the recipient\u2019s device and monitored it for a long time. The hacker claims that this was made possible by a virus installed on the device when the user visited the adult site. Using this virus, the hacker was able to record a video that compromises the user, and gained access to the user\u2019s personal contacts, instant messengers, and social networks. If the recipient pays $1300 in Bitcoin, the hacker promises to delete all the data. Next, the scam email contains the bitcoin address to which the ransom should be transferred. This email is just a sextortion scam, and all the statements are fake.\u00a0<\/div>\n<div>\u00a0<\/div>\n<div>What to do when you receive the &#8220;The device has been successfully hacked&#8221; SCAM:<\/p>\n<div>\n<ul>\n<li>Do not panic.<\/li>\n<li>Do not pay a ransom.<\/li>\n<li>If there\u2019s a link in the scam email, do not click it, otherwise you might unwittingly install malware or ransomware on your computer.<\/li>\n<\/ul>\n<div>The mail will come from several e-mail addresses, which might very from user to user. Scammers use thousands of &#8220;throw-away&#8221; e-mail addresses to send out these scams.<\/div>\n<\/div>\n<div>\u00a0<\/div>\n<div>\n<div>\n<div>If you do get such an e-mail use one of the two methods below to report it to IT Cyber Security as soon as possible. This way IT can filter and block the senders<\/div>\n<div>\n<hr \/>\n<p><strong>By reporting it on the ICT Partner Portal.\u200b\u200b<\/strong><\/p>\n<p>Go to https:\/\/servicedesk.sun.ac.za\/jira\/servicedesk\/customer\/portal\/6\/create\/115.\u00a0<\/p>\n<p>Fill in your information and add the email as an attachment. Your request will automatically be logged on the system.\u200b\u200b<\/p>\n<p>If you have accidentally responded to the phisher and already provided them with your personal details, it is vitally important that you immediately go to the USERADM page (either http:\/\/www.sun.ac.za\/password or www.sun.ac.za\/useradm and change your password immediately.)<\/p>\n<p>Make sure the new password is completely different and is a strong password that will not be easily guessed, as well as changing the passwords on your social media and private e-mail accounts, especially if you use the same passwords on these accounts. Contact the IT HelpDesk if you are still unsure.<\/p>\n<p style=\"text-align: right;\">[ARTICLE BY DAVID WILES]<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] There is a &#8220;sextortion&#8221; email making the rounds at the moment and with many personnel and students still working andstudying from home, many are concerned about the risks. \u00a0 &#8220;The device has been successfully hacked&#8221; is a new \u2018sextortion\u2019 email scam for 2021. This email scam, like most sextortion scams, relies on \u201csocial engineering\u201d, [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20382,3256,29187],"tags":[],"class_list":["post-15027","post","type-post","status-publish","format-standard","hentry","category-email","category-news","category-security-2"],"publishpress_future_action":{"enabled":false,"date":"2026-05-08 15:01:40","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/15027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=15027"}],"version-history":[{"count":2,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/15027\/revisions"}],"predecessor-version":[{"id":15029,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/15027\/revisions\/15029"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=15027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=15027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=15027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}