Categories: Security

What Are Sextors?

Do you know what sextors are? Also known as virtual rape, the term sextortion is the result of the combination of the words “sex” and “extortion.” Characterized as a kind of cyber crime, “sextorting” is when someone maliciously has access to third party personal materials – such as “nudes” and intimate videos – and threatens to post them on the Internet in exchange for money or favors. 

“Most of the time, blackmail is done by people close to the victim or who she has had some kind of intimate relationship with, such as an ex-boyfriend. But the crime can also be committed by hackers who gain access to the user’s cell phone or computer.” Explains Emilio Simoni, director of dfndr lab, PSafe’s digital security lab.

Women Are the Main Victims

Virtual rape is growing and becoming increasingly common on the internet. According to the experts, 40.9% of sextortion victims are girls and women, who can suffer serious consequences from exposure, such as embarrassment, financial damage, and even depression. This is because cybercriminals disclose the victim’s intimate content to people in their social life, such as friends and family.

How Do Sextors Strike?

Cybercriminals are always aware of new user behaviors in the digital world. They see the vulnerabilities of their potential victims as opportunities to create new attacks. Therefore, Simoni stresses that you need to be aware of what sextors are and how are the various tactics used to apply it.

Social Engineering

Social engineering is widely used in sextortion. It is the main method that scammers use to gain trust and persuade someone. “This kind of strategy is advantageous to the perpetrator because it is much easier to convince people to relinquish their data and intimate content than to have the trouble of hacking it,” says Simoni. After getting the content, the hacker starts asking for amounts of money not to disclose the compromising materials. The victim, being emotionally vulnerable, gives in to blackmail more easily.

Phishing

This type of practice is characterized by sending emails with flashy headlines that are hard to ignore. Some of these emails may contain fake offers or giveaways and upon access, the victim is hacked. “These attacks are often used by hackers because they go viral quickly, as victims unknowingly share the scam with their friends,” Simoni says.

Scammers

Fake profiles are not new, and you have probably interacted with some. Photos and videos are constantly being targeted by malicious people, and with scammers, it’s no different. Scammers use social engineering and usually try the romantic approach. Therefore, too attractive profiles, such as successful, widowed, and sometimes claiming to be handsome military men, may conceal a false identity.

What Measures Are Needed to Protect Yourself?

Shame, lack of knowledge, and fear are the main weapons of criminals. The dfndr lab experts have come up with some steps to keep your intimate life safe on the internet.

  1. Don’t send photos or personal content over the internet
  2. The internet allows scammers to remain anonymous, so don’t believe everyone you know online. Be wary of people approaching you through social networks, especially if they ask for financial help or access to information or photos of you.
  3. If you often access your email from your phone, increase your attention. There are cyber attacks designed exclusively to infect smartphones, so it’s vital to remain aware. “Ideally, use an antivirus that offers complete protection. Dfndr security, for example, sends you alerts whenever you receive or access a malicious link, a phishing scam, or if there’s an attempt to clone your WhatsApp, ”explains Simoni. You can download dfndr security for free here.

 

  1. Enable security mechanisms such as two-factor authentication. So even if a hacker finds your password, they still won’t be able to access your important accounts.
  2. It’s very important to report cases of sextors that happen to people you know or to you directly. Appeal to Internet companies such as social networks, and Google to remove content that violates privacy and is online harassment. If you are a victim, always report the crime to the local and authoriites and review state cyber-stalking and cybercrime laws. There are avenues for you take action.
PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Share
Published by
PSafe Newsroom
Tags: sextorsion

Recent Posts

Vulnerabilities in Cyber Security: what they are and how to fix them?

Learn all about one of the hackers' favorite breach method and keep your company safe…

1 year ago

3 ways to recover deleted photos on Android

Have you ever wondered how to recover deleted photos on Android? After all, the lack…

1 year ago

What is worm?

Digital worms are among the most serious threats in the wild kingdom of the Internet.

2 years ago

Spoofing: What’s it all about?

Spoofing is a fairly sophisticated virtual scam that can fool even the most cautious and…

2 years ago

Careful With That QR Code! Five Steps For QR Code Safety

Five Steps to Reduce QR Code Risk! Step one? Read this article…

2 years ago

Pharming: Phishing’s Nasty Big Brother

Pharming is creating a new, dangerous brand of impostor syndrome. Check how to avoid pharming…

2 years ago