Two ways sex cams
When the victim opened the email, she found sexually explicit photos of herself attached and information that detailed where she worked.
Following that were details of her personal life: her husband and her three kids. The demand made this hack different: This computer intrusion was not about money.
Unlike its close cousin, the form of nonconsensual pornography known as “revenge porn,” the problem of sextortion has not received sustained press attention or action in numerous state legislatures, in part because with few exceptions, sextortion victims have chosen to remain anonymous, as the law in most jurisdictions permits. The 78 cases we reviewed alone involve at least 1,397 victims, and this is undoubtedly just the tip of the iceberg.
We searched dockets and news stories for criminal cases in which one person used a computer network to extort another into producing pornography or engaging in sexual activity.
We found nearly 80 such cases involving, by conservative estimates, more than 3,000 victims. Prosecutors colloquially call this sort of crime “sextortion.” And while not all cases are as sophisticated as this one, a great many sextortion cases have taken place―in federal courts, in state courts, and internationally―over a relatively short span of time.
The malware Mijangos wrote was sophisticated, and he told federal authorities that he designed it specifically to be undetectable to antivirus programs.
He then, according to court documents, “used [those] intimate images or videos of female victims he stole or captured to ‘sextort’ those victims, threatening to post those images or videos on the Internet unless the victims provided more.” Mijangos’s threats were not idle.
Later in the day, to underscore his seriousness, the hacker followed up with another email threatening the victim: “You have six hours.” This victim knew her correspondent only as [email protected], but the attacker turned out to be a talented 32-year-old proficient in multiple computer languages.