Beware Of Cyber Criminals Demanding Payments In Bitcoin

Cyber-crime syndicates have resorted to transactions using crypto currency or Bitcoin money to avoid detection by the authorities.

Bitcoin transactions would not leave money trail that could point to their destinations, compared to cash transactions where the amount could be recovered later.

The syndicates would send random emails to individuals and blackmail them by threatening to murder, leak personal information, expose extra marital affairs, report offences related to browsing pornography websites to the authorities, among others.

The modus operandi has put the Federal Police Commercial Crime Investigation Department on alert.

It has recently reached out to the public and reminded netizens of such syndicates through a post on one of its Facebook pages, Cyber Crime Alert Royal Malaysia Police.

According to the FB page, the suspects were able to obtain victims’ email addresses, done randomly, through spoofing before sending threats to them.

“In the email, the suspects would instruct the victims to transfer certain amount to Bitcoin Wallet Address given or risk having their secrets exposed on the Internet.

“Fearing this, the victims would transfer digital money to the account,” it said in an FB status.

It is learnt that the syndicate, known as cryptoblackmail, had the same motive as with the other cyber-crime syndicates, which was to dupe victims by driving them to a state of panic and guilty.

The only difference is that the syndicate would ask victims to pay in crypto currency, where the destination of the money would go untraceable once a transaction is made.

It is more difficult for authorities to track down the Bitcoin Wallet Address owners.

It is a different story for online banking as the authorities are able to trace account owners who have received the money.

New Straits Times:

You Might Also Read:

Blackmail Emails Demand Bitcoin Payment

« The US Is Buying Phone Hacking Tools For Ghana’s Police
Dark Web Dealers Voluntarily Ban Deadly Fentanyl »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

Idemia

Idemia

Idemia is a global leader in security and identity solutions.

National Association of State Chief Information Officers (NASCIO)

National Association of State Chief Information Officers (NASCIO)

NASCIO's Cybersecurity Committee focuses helps state CIOs to formulate high-level security and data protection policies and technical controls.

Massive Alliance

Massive Alliance

Massive is a global service agency providing internet monitoring, data & security threat surveillance and reputation management.

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

Go Grow

Go Grow

Go Grow is a business oriented accelerator program at Copenhagen School of Entrepreneurship. Targeted technologies include IoT, AI and Cybersecurity.

HacWare

HacWare

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

Advent One

Advent One

Advent One are recognised for solving intricate dilemmas, not only making technology work but building foundations that customers can grow upon in an effective and secure way.

Responsive Technology Partners

Responsive Technology Partners

Responsive Technology Partners provides superior IT support services including cybersecurity and compliance, telephony, cloud services, cabling, access control, and camera systems.

Arcserve

Arcserve

Defend your data with Arcserve all-in-one data protection and management solutions designed to be the right fit for your business, regardless of size or complexity.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

Forward Networks

Forward Networks

Forward Networks - transforming networks to be more reliable, agile, and secure.

CyberGrape

CyberGrape

CyberGrape is a client centric managed services company, providing enterprise leading security solutions and helping companies through their IT risk and security challenges.