Scammers have used sexual content as bait to gain access to users' personal data. The trick, in fact, is the Raccoon Stealer malware, which helps hackers break into the victim's desktop to steal credentials, credit card information, cryptocurrency e-wallets and more. Although it is similar to other scams, the practice differs by the way the user is attracted: an email promises to expose the nudes of a friend's girlfriend. By clicking on the image, which appears blurred, the person allows the malware in question to invade your computer, as revealed by IBM X-Force Threat Intelligence, last Monday (9).
READ: Understand scam that makes ATM 'spit' money
Malware promises to disclose friends' nudes and deceives users Photo: Pond5
Want to buy cell phones, TV and other electronics at a discount? Take advantage of Consumer Week offers at Compare TechTudo
The e-mails sent to attract the victim have different subjects, such as your friend's confidential information has been stolen, your colleague's account is compromised and we have access to your friend's account. In the text, the scammers identify themselves as the Red Skull hacker team and ask for US $ 500 (approximately R $ 2,360, in the current quote of the American currency) for the alleged nudes: If you ignore us, we guarantee that we will send the photos to all your contacts, appears in the message. In some cases, in the body of the email it says How he did not pay, and how you were on your contact list, this email has reached you.
See also: how to stay invisible on WhatsApp Web
How to stay invisible on WhatsApp Web
The nude in question appears as a blurred image to instigate the person to click and, thus, accept that the malware invades your computer. In this way, hackers end up provoking the user's curiosity and achieve more success than through threats. If accepted, the malware will be deployed and will install Raccoon Stealer, which is capable of invading approximately 60 programs. At the moment, IBM X-Force Threat Intelligence is working to prevent attacks.
The alleged nude appears blurred along with some instructions that, if followed, will install the malware on the computer Photo: Reproduction / IBM X-Force
To prevent this, it is important to be suspicious of emails containing malicious content and of suspicious origin. Also, do not follow the steps outlined in the message body and search the content of the text for possible reports from other users.