Pay Up Or Else – Danze Edwin on Sextortion
10 October 2021
Share

pic credit: FBI

By Danze Edwin | Sextortion is when someone employs non-physical forms of coercion to extort sexual favours or use sex a form of blackmail to get money from someone.


In this particular case, we’ll be referring to sextortion as a cybercrime. Someone gets access to your personal data i.e nudes, sextape or private chats. This is then used to threaten the victim with the aim to achieve a particular goal.


The End game of Sextortion is more often or not always money. Sextortion is not new, it’s been around since the dark ages, BUT it’s now on the rise and is easier than ever, to execute.


Why is there a rise? The ever-growing world wide web! In 2020 alone, there was a 60% increase in numbers of accounts created on social media. Internet is no-longer a luxury, it’s a necessity.


Meetings switched to zoom, people searched more about COVID19; they also went on YouTube to learn how to build new skills.


The internet of things: Almost everything is connected to the internet now. Your smart watch, baby monitor, CCTV, Smart phones, laptops, Gaming consoles, TVs etc.

Online data storage options: Cloud storage is big business now, there is a growing need
for storage for those large email attachments, files being sent around due to remote working, and galleries in our phones.


Unemployment! The pandemic has created desperation.

Weak platform security
In Reference to all the above, there is one common factor the need to have passwords
and security on platforms. It’s common for people to have similar passwords across
multiple platforms. This has allowed for effortless data / platform breaches.

panel – file

The rise of Encrypted social platforms. 

Whereas it’s good to have end to end encryption, This protects your personal chat data, BUT also protects the hackers data. They will share links with noobs. It’s hard for authorities to infiltrate these chatrooms and investigate breaches

Key to note:

  • Very poor cyber security culture 
  • There biggest cause of sextortion is weak platform or device security.
  • People use similar passwords across multiple platforms.
  • They don’t read through their email (Especially the fine print) 
  • Poor organisation security 
  • Over reliance on Public WIFI in offices

How will they obtain your data or private content?

  • The “complicated way” Spammers will deploy a collection of botnets (Compromised network of computers) from a remoter server/s.
  • These compromised/ infected devices will then send out over 1000 emails a day to other devices on compromised networks or with malware.
  • A hacker or “sextorter” will share a booby trap file that you’re enticed to open. Once you click on a link, usually spam mail, malware will be installed on your devices, devices. This will grant the hacker remote control of your devices. 

They’ll get access to your webcam, search history, bank details, location, email calendar, cloud storage etc.

  • Be careful with screen recorders, this are now available on app stores and some are pre-installed on smartphones, IOS and Android.

Key insight:

Malware exists in over 20% of web spam, and this is more often or not in emails Malware is available online on the dark web or in chatrooms.

  • Catfish account direct messages (DMs): We are in the era trolls, parody accounts and online the Catfish.

These accounts will pretend to be a female/ male and what they will do is share only fans links, or links to their sensual content on other 3rd party platforms. People who are into that kind of content will click on these links and eventually get their data breached. 

The other way that this is happening is through DMs that they send you, asking you to share a video of you pleasing yourself or image of you nude.

 “If you don’t respond or send, I am going to please someone else”

What to do in the case of sextortion?

  • DON’T CREATE COMPROMISING CONTENT
  • Don’t send more photos in the scenario that you’re being blackmailed
  • When you’re being blackmailed in this way, never give them the money
  • Inform authority immediately
  • Reach out to someone with knowledge on how to deal with online data breaches
  • Change your password regardless

Who are the easy targets?

Online users with weak security

Public figures 

Some examples: TV Presenters, Musicians, Actors, CEOs, MDs, News Anchors, socialites etc  

Why are they easy targets?

Public figures have public lives. Their personal data is amost easy to find; Location, Phone number, Email address, these could have been leaked online. These compiled only the web servers.

There platforms and data is managed by relatives or Friends. These people usually don’t have the technical knowledge to foresee attacks or even know how to retrieve stolen accounts

What type of content will be used to target you?

  • Account Verification links
  • Advertisement links
  • Job offers
  • Emails that contain Malware; SOS mail and the famous Nigerian prince
  • WhatsApp links
  • Click bait 
  • Stream links
  • Web meeting chats
  • Links shared on public streams
  • APK files shared on software sites

How to prevent some of these;

  • Two factor Authentication apps • Sequence your passwords them.
  • Avoid Public WIFIs unless you have good platform security
  • Pay attention to your email text, READ it DON’t Click it. Especially emails claiming to verify account, complete login
  • DON’T DOWNLOAD THINGS FROM PEOPLE YOU DON’T KNOW 
  • Have an Extra layer of security; use backup codes, face login, finger print, voice activation.

Why are they easy targets?
Public figures have public lives. Their personal data is almost easy to find; Location,
Phone number, Email address, these could have been leaked online. These compiled
only the web servers.


There platforms and data is managed by relatives or Friends. These people usually don’t have the technical knowledge to foresee attacks or even know how to retrieve stolen accounts.


What type of content will be used to target you?
• Account Verification links
• Advertisement links
• Job offers
• Emails that contain Malware; SOS mail and the famous Nigerian prince
• WhatsApp links
• Click bait
• Stream links
• Web meeting chats
• Links shared on public streams
• APK files shared on software sites
How to prevent some of these;
• Two factor Authentication apps
• Sequence your passwords them.
• Avoid Public WIFIs unless you have good platform security
• Pay attention to your email text, READ it DON’t Click it. Especially emails claiming to verify account, complete login
• DON’T DOWNLOAD THINGS FROM PEOPLE YOU DON’T KNOW
• Have an Extra layer of security; use backup codes, face login, finger print, voice activation.

Avoid random WhatsApp groups; activate invite from non-contacts
• Remove auto video or Image download
• Consult as much as possible, build knowledge base on cyber crime
• Avoid redeemable campaigns that are driven by link sharing mechanics
• Be careful with Promo codes
• Get into a culture of secure backups
• Format your drive/ card whenever you sell or lose a device
• Tape your webcam


What are some of the consequences of sextortion?
• Jail time for attacker
• Loss of money from victim or organisation
• More cyber crime
• Suicide for victim
Article information:
Research on subject has been something of interest to me since I joined media.
Many friends reach out with similar complaints from these attacks.
Collaborating data from a series of cases I have personally handled and consultation
from security agencies like CID, Forensics organisations and data provided by security firms in Africa etc
Past case studies of those who have faced such attacks: Samson Kasumba, Douglas Lwanga, Ndaula Stanley, MC Ollo, Catherine, Martha Kay, Anita Fabiola etc.

Food for thought
The Internet was designed to be an open highway of information, for it to be secure
seems contradictory to their nature.


Useful links:
https://respect.international/sextortion-infographic-from-a-survey-of-1631-victims/


https://twitter.com/deejahn/status/1442505402625708034?s=20/


About Danze Edwin

Danze Edwin is currently the Head of Digital Marketing at Next Media Services.
He is a radio show host and TV Host on NBS TV’s on Another Round Ug.
He’s worked for various brands such as The Sylvia Owori, African Woman Magazine as a
social media manager, Digital Manager at Fireworks Advertising, Brainchild Burson
Marsteller in 2017 he joined NBS Television as the Head of Digital Marketing