Beware Of Cyber Criminals Demanding Payments In Bitcoin

Cyber-crime syndicates have resorted to transactions using crypto currency or Bitcoin money to avoid detection by the authorities.

Bitcoin transactions would not leave money trail that could point to their destinations, compared to cash transactions where the amount could be recovered later.

The syndicates would send random emails to individuals and blackmail them by threatening to murder, leak personal information, expose extra marital affairs, report offences related to browsing pornography websites to the authorities, among others.

The modus operandi has put the Federal Police Commercial Crime Investigation Department on alert.

It has recently reached out to the public and reminded netizens of such syndicates through a post on one of its Facebook pages, Cyber Crime Alert Royal Malaysia Police.

According to the FB page, the suspects were able to obtain victims’ email addresses, done randomly, through spoofing before sending threats to them.

“In the email, the suspects would instruct the victims to transfer certain amount to Bitcoin Wallet Address given or risk having their secrets exposed on the Internet.

“Fearing this, the victims would transfer digital money to the account,” it said in an FB status.

It is learnt that the syndicate, known as cryptoblackmail, had the same motive as with the other cyber-crime syndicates, which was to dupe victims by driving them to a state of panic and guilty.

The only difference is that the syndicate would ask victims to pay in crypto currency, where the destination of the money would go untraceable once a transaction is made.

It is more difficult for authorities to track down the Bitcoin Wallet Address owners.

It is a different story for online banking as the authorities are able to trace account owners who have received the money.

New Straits Times:

You Might Also Read:

Blackmail Emails Demand Bitcoin Payment

« The US Is Buying Phone Hacking Tools For Ghana’s Police
Dark Web Dealers Voluntarily Ban Deadly Fentanyl »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

Rockwell Automation

Rockwell Automation

Rockwell Automation offer industrial security solutions to protect the integrity and availability of your complex automation solutions.

CSIRT Panama

CSIRT Panama

CSIRT Panama is the national Computer Incident Response Team for Panama.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

UNIDIR Cyber Policy Portal

UNIDIR Cyber Policy Portal

The UNIDIR Cyber Policy Portal is an online reference tool that maps the cybersecurity and cybersecurity-related policy landscape.

SYSGO

SYSGO

SYSGO is the leading European provider of real-time operating systems for critical embedded applications in the Internet of Things (IoT).

HacWare

HacWare

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

Saudi Information Technology Company (SITE)

Saudi Information Technology Company (SITE)

SITE is a forward-thinking enterprise, which aims at revitalizing Saudi Arabia’s digital infrastructure, cybersecurity, software development, and big data and analytics capabilities.

Disecto Technologies

Disecto Technologies

At Disecto, we provide SaaS based Data Discovery, Classification and a remediation solution for data privacy compliance.

Anetac

Anetac

Developed by seasoned cybersecurity experts, the Anetac Identity and Security Platform protects threat surface exploited via service accounts.

AC3

AC3

AC3 is a leading secure cloud services provider, focused on turning your technology challenges into real results.

Vivid Computing Solutions

Vivid Computing Solutions

At Vivid Computing Solutions we provide comprehensive solutions that keep your business running efficiently and securely.