Spoofing Sextortion Email: Hi your account is infected.
By now you, a friend or a colleague would have received the Sextortion email. Relax and stay calm.
In March I received several frantic calls from clients who have been spoofed and/or received the Sextortion email. Through guilt of their browsing habits some clients reacted and panicked and attempted to pay the Bitcoin.
See below example:
Spoofing Sextortion Email:
Remain calm and do the following:
Don’t Pay the Spoofing Sextortion Email Bitcoin.
Run a full virus scan on your local machine.
Hosting via your c-panel or request a scan by your hosting company of your email server.
Hosting via C-panel: Enable DKM and SPF.
Change your Password to 12 characters or more of mixed cases, numbers and symbols.
Habits to avoid Spoofing Sextortion Email:
Change your password frequently.
Run full virus scans on your computer weekly.
Avoid adding your primary email address on online blogs and posts. Try type (at) and (dot)com instead of @ and .com to avoid malicious bots from harvesting your address.
Use a generic Gmail or Hotmail email address to sign up to everything on-line from sign up forms, applications or downloads.
Only use your primary email to communicate with people you know or trust.
DKIM: is a means of verifying incoming email. It ensures that incoming messages are unmodified and are from the sender from whom they claim to be. This feature works to prevent incoming spam messages.
The SPF system allows you to specify servers and IP addresses that are authorized to send mail from your domain(s). This feature works to prevent outgoing spam messages.