Adult web sites
When it infects a computer, this malware secretly records your screen — and any compromising material that might be on display.
We’ll tell you how you can steer clear of this freaky piece of software.
Sextortion is a known problem that has only grown more difficult to contain.
Now, a new breed of trojan is taking bolder steps to secure its blackmail material.
That said, since the malware propagates itself via spam, the best defense is to avoid opening strange emails like the plague.
Odds are, if a message is offering a “free” i Phone, i Pad, or laptop, it’s probably not real.
Since ESET started monitoring the threat, they’ve noticed frequent changes to the malware’s code as features are added and dropped.
Some say it’s everywhere anyway, so why be so concerned?As mentioned above, the malware is rapidly changing.It may not be long at all before it makes the inevitable jump across the pond.Save 90% on 5TB of cloud backup when you sign up today. Some say it’s harmless, that neither the viewer nor the subject is at risk because no one is physically hurt.It’s no secret that there are eyes all over the web keeping tabs on your every move — and it’s not all spyware and ad trackers doing it, either.In fact, some of the biggest names in tech routinely monitor your activity in order to learn about you, recommend content, and sell products and services to you. Our most intimate activities are the kind of material that unscrupulous marketers and cybercriminals are dying to get a hold of — and when they do, the end result is usually blackmail or worse.Usually, these messages are part of a typical “click this link to win an i Phone” type of scam, but some of the messages contain content normally found in sextortion emails.Unlike many of its brethren, Varenyky isn’t playing around when it comes to recording users.Although much of the malware’s current sextortion threats are just bluster, Varenyky actually installs sophisticated spyware on its victim’s computers that pays close attention to browser activity.When it detects a known adult phrase or website being typed into a search bar, it automatically fires up its screen-recording tools in the background — capturing any activity and sending it back to an unknown source on the Tor network. The malware also captures usernames and passwords that are saved in the victim’s browser — which are then paired with any recordings or activity data.