Beware Of Cyber Criminals Demanding Payments In Bitcoin

Cyber-crime syndicates have resorted to transactions using crypto currency or Bitcoin money to avoid detection by the authorities.

Bitcoin transactions would not leave money trail that could point to their destinations, compared to cash transactions where the amount could be recovered later.

The syndicates would send random emails to individuals and blackmail them by threatening to murder, leak personal information, expose extra marital affairs, report offences related to browsing pornography websites to the authorities, among others.

The modus operandi has put the Federal Police Commercial Crime Investigation Department on alert.

It has recently reached out to the public and reminded netizens of such syndicates through a post on one of its Facebook pages, Cyber Crime Alert Royal Malaysia Police.

According to the FB page, the suspects were able to obtain victims’ email addresses, done randomly, through spoofing before sending threats to them.

“In the email, the suspects would instruct the victims to transfer certain amount to Bitcoin Wallet Address given or risk having their secrets exposed on the Internet.

“Fearing this, the victims would transfer digital money to the account,” it said in an FB status.

It is learnt that the syndicate, known as cryptoblackmail, had the same motive as with the other cyber-crime syndicates, which was to dupe victims by driving them to a state of panic and guilty.

The only difference is that the syndicate would ask victims to pay in crypto currency, where the destination of the money would go untraceable once a transaction is made.

It is more difficult for authorities to track down the Bitcoin Wallet Address owners.

It is a different story for online banking as the authorities are able to trace account owners who have received the money.

New Straits Times:

You Might Also Read:

Blackmail Emails Demand Bitcoin Payment

« The US Is Buying Phone Hacking Tools For Ghana’s Police
Dark Web Dealers Voluntarily Ban Deadly Fentanyl »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CionSystems

CionSystems

CionSystems provides identity, access and authentication solutions to improve security and streamline IT infrastructure management.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Arc4dia Labs

Arc4dia Labs

Arc4dia have developed SNOW, a cyber security solution to combat the world’s most sophisticated cyber threats.

SightGain

SightGain

SightGain is the only integrated risk management solution focused on cybersecurity readiness using real-world attack simulations in your live environment.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

Single Point of Contact

Single Point of Contact

Single Point of Contact is a Managed IT Services provider that helps businesses to achieve a seamless and secure IT environment.

DataStealth

DataStealth

DataStealth is a data protection platform that allows organizations to discover, classify, and protect their most sensitive data and documents.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.

Cytex

Cytex

Cytex is the All-in-One solution for SMB data protection & compliance needs.

Sage IT

Sage IT

Sage IT offer a wide range of professional and consulting services to help organizations overcome the challenges of today's ever-changing business environment.