What is extortion?
Sextortion is when someone employs non-physical forms of coercion to extort sexual favors or use sex a form of blackmail to get money from someone. In this particular case, we’ll be referring to sextortion as a cybercrime. Someone gets access to your personal data i.e nudes, sextape or private chats. This is the used to threaten the victim with the aim to of achieving a particular goal. The End game of Sextortion is more often or not always money Sextortion is not new, it’s been around since the dark ages, BUT it’s now on the rise and
is easier than ever to execute.
Why is there a rise?
The ever-growing world wide web!
In 2020 alone, there was a 60% increase in numbers of accounts created on social media. Internet is no-longer a luxury, it’s a necessity. Meetings switched to zoom, people searched more about COVID19, they YouTube how to learn new skills and home schooled.
The internet of things:
Almost everything is connected to the internet now. Your smart watch, baby monitor, CCTV, Smart phones, laptops, Gaming consoles, TVs etc. Online data storage options: Cloud storage is big business now, there is a growing need for storage for those large email attachments, files being sent remote due to remote working, and galleries in our phones.
The pandemic has caused desperate
Weak platform security
In Reference to all the above, there is one common factor the need to have passwords and security on platforms. It’s common for people to have similar passwords across multiple platforms.
This has allowed for effortless data / platform breaches.
The rise of Encrypted social platforms.
Whereas it’s good to have end to end encryption, This protects your personal chat data, BUT also protects the hackers data. They will share links with noobs. It’s hard for authorities to infiltrate these chatrooms and investigate breaches.
Key to note:
• Very poor cyber security culture
• There biggest cause of sextortion is weak platform or device security.
• People use similar passwords across multiple platforms.
• They don’t read through their email (Especially the fine print)
• Poor organisation security
• Over reliance on Public WIFI in offices
How will they obtain your data or private content?
• The “complicated way” Spammers will deploy a collection of botnets (Compromised network of computers) from a remoter server/s.
• These compromised/ infected devices will then send out over 1000 emails a day to other devices on compromised networks or with malware.
• A hacker or “sextorter” will share a booby trap file that you’re enticed to open. Once you click on a link, usually spam mail, malware will be installed on your devices, devices. This will grant the hacker remote control of your devices.
They’ll get access to your webcam, search history, bank details, location, email calendar, cloud storage etc.
• Be careful with screen recorders, this are now available on app stores and some are pre-installed on smartphones, IOS and Android.
Malware exists in over 20% of web spam, and this is more often or not in emails Malware is available online on the dark web or in chatrooms.
• Catfish account direct messages (DMs): We are in the era trolls, parody accounts and online the Catfish.
These accounts will pretend to be a female/ male and what they will do is share only fans links, or links to their sensual content on other 3rd party platforms.
People who are into that kind of content will click on these links and eventually get their data breached. The other way that this is happening is through DMs that they send you, asking you to share a video of you pleasing yourself or image of you nude.
“If you don’t respond or send, I am going to please someone else”
What to do in the case of sextortion?
• DON’T CREATE COMPROMISING CONTENT
• Don’t send more photos in the scenario that you’re being blackmailed
• When you’re being blackmailed in this way, never give them the money
• Inform authority immediately
• Reach out to someone with knowledge on how to deal with online data breaches
• Change your password regardless.
It’s not always about the money.
Sometimes it is Revenge Porn, these are scenarios of relationship or rejected advances from men and women
It is a form of Sexual assault, the victim is constantly used for sexual favors.
Who are the easy targets?
Online users with weak security Public figures
Some examples: TV Presenters, Musicians, Actors, CEOs, MDs, News Anchors, socialites etc
Why are they easy targets?
Public figures have public lives. Their personal data is amost easy to find; Location, Phone number, Email address, these could have been leaked online. These compiled only the web servers.
There platforms and data is managed by relatives or Friends. These people usually don’t have the technical knowledge to foresee attacks or even know how to retrieve stolen accounts.
What type of content will be used to target you?
• Account Verification links
• Advertisement links
• Job offers
• Emails that contain Malware; SOS mail and the famous Nigerian prince
• WhatsApp links
• Click bait
• Stream links
• Web meeting chats
• Links shared on public streams
• APK files shared on software sites
How to prevent some of these;
• Two factor Authentication apps
• Sequence your passwords them.
• Avoid Public WIFIs unless you have good platform security
• Pay attention to your email text, READ it DON’t Click it. Especially emails claiming to
verify account, complete login
• DON’T DOWNLOAD THINGS FROM PEOPLE YOU DON’T KNOW
• Have an Extra layer of security; use backup codes, face login, finger print, voice
• Avoid random WhatsApp groups; activate invite from non-contacts
• Remove auto video or Image download
• Consult as much as possible, build knowledge base on cyber crime
• Avoid redeemable campaigns that are driven by link sharing mechanics
• Be careful with Promo codes
• Get into a culture of secure backups
• Format your drive/ card whenever you sell or lose a device
• Tape your webcam.
What are some of the consequences of sextortion?
• Jail time for attacker
• Loss of money from victim or organisation
• More cyber crime
• Suicide for victim
Research on subject has been something of interest to me since I joined media. Many friends reach out with similar complaints from these attacks.
Collaborating data from a series of cases I have personally handled and consultation from security agencies like CID, Forensics organisations and data provided by security firms in Africa etc.
Past case studies of those who have faced such attacks:
Samson Kasumba, Douglas Lwanga, Ndaula Stanley, MC Ollo, Catherine, Martha Kay, Anita Fabiola etc.
Food for thought
The Internet was designed to be an open highway of information, for it to be secure seems contradictory to their nature.
Danze Edwin is currently the Head of Digital Marketing at Next Media Services. He is a radio show host and TV Host on NBS TV’s on Another Round Ug. He’s worked for various brands such as The Sylvia Owori, African Woman Magazine as a social media manager, Digital Manager at Fireworks Advertising, Brainchild Burson
Marsteller in 2017 he joined NBS Television as the Head of Digital Marketing.
Danze is trained in Digital Marketing by BBC World Service, Voice of America – U.S Agency for Global Media and DW and studied Industrial and Fine Arts from Makerere University. He was born in 1988. Kampala, Uganda