Sextortion Attempts Rising In Southern Nevada

The E-mail Scam Threatens Embarassment Unless You Pay Up

April 16, 2020 - 4:28 pm

scyther5/Getty Images


The Las Vegas Metropolitan Police Department - Cyber Investigative Group (CIG) with the assistance of the FBI Cyber Task Force have been made aware of an increase in sextortion emails.

What Is Sextortion?  

Sextortion is a type of email scam where cybercriminals attempt to extort money from victims by claiming to have a recording of them engaged in intimate acts.  The attackers demand that victims send a specified amount of money or risk having the alleged recordings sent to every contact in their address book. The emails express a sense of urgency by demanding the victims pay the extortion amount within 24 or 48 hours. These email scams often include passwords and phone numbers that recipients may have used or are currently using to give the impression the attackers have access to a great deal of their personal information (possibly obtained from a compromise in a major data security breach some time ago, which exposed details for millions of users). The goal is to make victims fear their computers might have been hacked and used to observe potentially compromising activities. Cybercriminals will play on emotions to scam victims out of their money, and this is why it is crucial that you assess the situation and not just give your money away in a panic.

How To Protect Yourself From Sextortion Attempts

1. Never send money, digital currency, buy a gift card or do anything to comply with the demands in the email. 
2. Avoid using ‘password’, ‘Password123’, ‘12345’, and other most commonly used passwords. Change passwords often. Ensure your passwords are strong, unique and contain at least an uppercase, a lowercase, a number and a special character and is over 10 digits long. Never use the same password on multiple sites.
3. Enable multi-factor authentication wherever possible. Also, use different passwords for work and personal accounts. 
4. Keep webcams covered when you are not using them. 
5. Check to see if your email was compromised in a security data breach:      