MORE

    Pay up or else! Danze Edwin on Sextortion

    Sextortion is when someone employs non-physical forms of coercion to extort sexual favors or use sex as a form of blackmail to get money from someone. In this particular case, we’ll be referring to sextortion as a cybercrime. Someone gets access to your personal data i.e nudes, sextape, or private chats. This is used to threaten the victim with the aim of achieving a particular goal. 

    - Advertisement -

    The End game of Sextortion is more often or not always money. Sextortion is not new, it’s been around since the dark ages, BUT it’s now on the rise and is easier than ever to execute. 

    ALSO READ: Understanding UCC’s NetQ-Ug internet Speed Test app

    - Advertisement -

    The rise of Sextortion 

    The ever-growing worldwide web! In 2020 alone, there was a 60% increase in the number of accounts created on social media. Internet is no longer a luxury, it’s a necessity.  

    Meetings switched to zoom, people searched more about COVID19, they YouTube how to learn new skills and homeschooled. 

    The internet of things: Almost everything is connected to the internet now. Your smartwatch, baby monitor,  CCTV, Smartphones, laptops, gaming consoles, TVs, etc.  

    Online data storage options: Cloud storage is big business now, there is a growing need  for storage for those large email attachments, files being sent remote due to remote  working, and galleries in our phones 

    Unemployment!  The pandemic has caused desperate weak platform security.  In reference to all the above, there is one common factor the need to have passwords and security on platforms. It’s common for people to have similar passwords across multiple platforms. This has allowed for effortless data/platform breaches.

    The rise of Encrypted social platforms 

    Whereas it’s good to have end-to-end encryption, This protects your personal chat data,  But also protects the hacker’s data. They will share links with noobs. It’s hard for  authorities to infiltrate these chatrooms and investigate breaches 

    Key to note: 

    • Very poor cyber security culture  

    • There biggest cause of sextortion is a weak platform or device security. • People use similar passwords across multiple platforms. 

    • They don’t read through their email (Especially the fine print)  

    • Poor organization security  

    • Over-reliance on Public WIFI in offices 

    How will they obtain your data or private content? 

    • The “complicated way” Spammers will deploy a collection of botnets (A compromised network of computers) from a remoter server/s. 

    • These compromised/ infected devices will then send out over 1000 emails a day to other devices on compromised networks or with malware.

    • A hacker or “sextorter” will share a booby trap file that you’re enticed to open.  Once you click on a link, usually spam mail, malware will be installed on your devices, devices. This will grant the hacker remote control of your devices.  

    They’ll get access to your webcam, search history, bank details, location, email calendar, cloud storage, etc. 

    • Be careful with screen recorders, these are now available on app stores and some are pre-installed on smartphones, IOS and Android. 

    Key insight: 

    Malware exists in over 20% of web spam, and this is more often or not in emails Malware is available online on the dark web or in chatrooms. 

    • Catfish account direct messages (DMs): We are in the era of trolls, parody accounts, and online the catfish. 

    These accounts will pretend to be female/ male and what they will do is share only fans’ links or links to their sensual content on other 3rd party platforms.  People who are into that kind of content will click on these links and eventually get their data breached.  

    The other way that this is happening is through DMs that they send you, asking you to share a video of you pleasing yourself or an image of you nude. 

    “If you don’t respond or send, I am going to please someone else” 

    What to do in the case of sextortion 

    • DON’T CREATE COMPROMISING CONTENT 

    • Don’t send more photos in the scenario that you’re being blackmailed • When you’re being blackmailed in this way, never give them the money • Inform authority immediately 

    • Reach out to someone with knowledge on how to deal with online data breaches • Change your password regardless

    Victims are less likely to report outside of their inner circle. 

    It’s not always about the money. 

    Sometimes it is Revenge Porn, these are scenarios of relationships or rejected advances  from men and women 

    It is a form of Sexual assault, the victim is constantly used for sexual favors 

    How it affects people  

    Who are the easy targets? 

    Online users with weak security 

    Public figures 

    Some examples: TV Presenters, Musicians, Actors, CEOs, MDs, News Anchors, socialites  etc

    Why are they easy targets? 

    Public figures have public lives. Their personal data is almost easy to find; Location,  Phone number, Email address, these could have been leaked online. These compiled only the web servers. 

    There are platforms and data that are managed by relatives or friends. These people usually don’t  have the technical knowledge to foresee attacks or even know how to retrieve stolen  accounts 

    What type of content will be used to target you? 

    • Account Verification links 

    • Advertisement links 

    • Job offers 

    • Emails that contain Malware; SOS mail and the famous Nigerian prince • WhatsApp links 

    • Clickbait 

    • Stream links 

    • Web meeting chats 

    • Links shared on public streams 

    • APK files shared on software sites 

    How to prevent some of these; 

    • Two-factor Authentication apps 

    • Sequence your passwords. 

    • Avoid Public WIFIs unless you have good platform security 

    • Pay attention to your email text, READ it DON’t Click it. Especially emails claiming to verify an account, complete login 

    • DON’T DOWNLOAD THINGS FROM PEOPLE YOU DON’T KNOW  • Have an Extra layer of security; use backup codes, face login, fingerprint, voice  activation

    • Avoid random WhatsApp groups; activate invite from non-contacts • Remove auto video or Image download 

    • Consult as much as possible, build the knowledge base on cybercrime • Avoid redeemable campaigns that are driven by link sharing mechanics • Be careful with Promo codes 

    • Get into a culture of secure backups 

    • Format your drive/ card whenever you sell or lose a device 

    • Tape your webcam 

    What are some of the consequences of sextortion? 

    • Jail time for the attacker 

    • Loss of money from victim or organization 

    • More cybercrime 

    • Suicide for the victim 

    Article information: 

    Research on the subject has been something of interest to me since I joined media. Many friends reach out with similar complaints from these attacks. 

    Collaborating data from a series of cases I have personally handled and consultation  from security agencies like CID, Forensics organizations and data provided by security  firms in Africa, etc 

    Past case studies of those who have faced such attacks: 

    Samson Kasumba, Douglas Lwanga, Ndaula Stanley, MC Ollo, Catherine, Martha Kay,  Anita Fabiola, etc

    Food for thought 

    The Internet was designed to be an open highway of information, for it to be secure seems contradictory to its nature.  

    About Danze Edwin 

    Danze Edwin is currently the Head of Digital Marketing at Next Media Services.  He is a radio show host and TV Host on NBS TV’s on Another Round Ug. 

    He’s worked for various brands such as The Sylvia Owori, African Woman Magazine as a  social media manager, Digital Manager at Fireworks Advertising, Brainchild Burson  Marsteller in 2017 he joined NBS Television as the Head of Digital Marketing.

    Danze is trained in Digital Marketing by BBC World Service, Voice of America – U.S  Agency for Global Media and DW and studied Industrial and Fine Arts from Makerere  University. He was born in 1988. Kampala, Uganda

    - Advertisement -

    IN THIS STORY STREAM

    Techjaja Staff
    Techjaja Staff
    A Techjaja 'bot' Profile

    Fresh Tech

    Winnie Njore: Leveraging Technology To Improve Tax Compliance In Uganda

    Tax compliance is a critical issue for many countries,...

    Kenya is raising license fees for satellite communication service providers. Here’s why

    In a move that's sending shockwaves through Kenya's burgeoning...

    How to calculate your ride-hailing trip cost in Kampala

    Kampala, just like other capital and business cities, is...

    How to replace a lost/stolen SIM card in Uganda

    The world has reached that level of development that...

    How to register for Digital Number Plates in Uganda

    Uganda has taken a leap into the future of...
    - Advertisment -

    Discover more from Techjaja

    Subscribe now to keep reading and get access to the full archive.

    Continue reading