Beware Of Cyber Criminals Demanding Payments In Bitcoin

Cyber-crime syndicates have resorted to transactions using crypto currency or Bitcoin money to avoid detection by the authorities.

Bitcoin transactions would not leave money trail that could point to their destinations, compared to cash transactions where the amount could be recovered later.

The syndicates would send random emails to individuals and blackmail them by threatening to murder, leak personal information, expose extra marital affairs, report offences related to browsing pornography websites to the authorities, among others.

The modus operandi has put the Federal Police Commercial Crime Investigation Department on alert.

It has recently reached out to the public and reminded netizens of such syndicates through a post on one of its Facebook pages, Cyber Crime Alert Royal Malaysia Police.

According to the FB page, the suspects were able to obtain victims’ email addresses, done randomly, through spoofing before sending threats to them.

“In the email, the suspects would instruct the victims to transfer certain amount to Bitcoin Wallet Address given or risk having their secrets exposed on the Internet.

“Fearing this, the victims would transfer digital money to the account,” it said in an FB status.

It is learnt that the syndicate, known as cryptoblackmail, had the same motive as with the other cyber-crime syndicates, which was to dupe victims by driving them to a state of panic and guilty.

The only difference is that the syndicate would ask victims to pay in crypto currency, where the destination of the money would go untraceable once a transaction is made.

It is more difficult for authorities to track down the Bitcoin Wallet Address owners.

It is a different story for online banking as the authorities are able to trace account owners who have received the money.

New Straits Times:

You Might Also Read:

Blackmail Emails Demand Bitcoin Payment

« The US Is Buying Phone Hacking Tools For Ghana’s Police
Dark Web Dealers Voluntarily Ban Deadly Fentanyl »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Mimecast

Mimecast

Mimecast delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365 including archiving, continuity and security.

TitanHQ

TitanHQ

TitanHQ offers ultimate protection from internet based threats and powerful Web filtering functionalities to SMBs, Service Providers and Education sectors around the World.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

StepStone

StepStone

StepStone is one of the leading online job platforms in Germany, and other countries, covering all industry sectors including IT and cybersecurity.

Forgepoint Capital

Forgepoint Capital

ForgePoint Capital is a premier venture investor for early stage cybersecurity companies.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

Kiberna

Kiberna

Kiberna are a small but niche company specialising in data driven security to manage your cyber risks.

Strata Identity

Strata Identity

Strata is pioneering identity orchestration to unify on-premises and cloud-based authentication and access systems for consistent identity management in multi-cloud environments.

eaziSecurity

eaziSecurity

eaziSecurity has built an eco-system of technology and services that bring enterprise scale security solutions to the SME marketplace.

Avrem Technologies

Avrem Technologies

Avrem Technologies is a business IT and cybersecurity consulting firm. We design, implement, manage and monitor the networks, servers, computers and software that our clients rely on each day.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

The Hacking Games

The Hacking Games

The Hacking Games' Mission is to inspire, educate and mobilise a generation of ethical hackers to make the world a safer place.

Clarity

Clarity

Clarity is an AI cybersecurity startup that protects against deepfakes and new social engineering and phishing attack vectors accelerated by the rapid adoption of Generative AI.

WaveLink

WaveLink

WaveLink offers low risk, results-oriented Engineering Services and best-of-class Technical Support Services. Areas of expertise include cyber and security engineering.

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.

Iron EagleX

Iron EagleX

Iron EagleX deliver engineering solutions in cloud computing, big data, cyber, and machine learning technologies to US Government customers.