For more tips on how to defend against ransomware and other extortion-based threats, please click here.Online sexual activity can involve various activities, such as viewing explicitly sexual materials, participating in an exchange of ideas about sex, exchanging sexual messages, and online interactions with at least one other person with the intention of becoming sexually aroused.
One day, Samir, (Not his real name.) a young Palestinian man living abroad, receives a friend request from a girl on Facebook. During their chat, the two have their webcams turned on but only talk via chat.
She is 23 and says she is living with her older sister in Sidon, Lebanon. The girl reveals she is sexually attracted to Samir. She then begins performing sexual acts on herself and asks if he would reciprocate. At the end of their conversation, the girl asks Samir what he does. She’s impressed: “Listen, I’m a man, and I recorded a video of you [during your chat with the girl]….
He also thinks the video would likely go to his loved ones’ junk mail and that they wouldn’t click on a link from a suspicious sender anyway. One week later, the man reaches out to Samir and says he’s about to upload the video onto You Tube. The video goes up, and Samir gets to work: “I keep reporting the video.
Each time I’m watching the number of views to see if anyone else has viewed it. “From what I can tell, all the views were mine, except for one.
Indeed, people consider cybersex to have a high degree of psychological reality—but many do not consider it to be consider it to be infidelity.
Many of them believe cybersex to be similar to pornography—an extension of fantasy that actually helps to keep them from physical affairs with other people.
So you look for their weaknesses, and you exploit them. You see someone who looks like a sheikh, carrying the Koran, and you think, ‘There’s no way he’ll fall for this – but let’s try him anyway.’ And when you try, he falls for it.” Those tools help Omar earn 500 USD a day from the scam.
The other weakness is when they are married, for example. Users can protect themselves against sextortionists like the one that targeted Samir by following some best practices for social networking sites.
(Not his real name, either.) Fraudsters like Omar lurk on Facebook in search of victims.
When they find a target, they connect with them via video call on Skype or Facebook.
As Omar says the entire scam takes about one hour and consists of three 20-minute segments: chatting, filming the video, and threatening the user.