Back about 30 years ago, I pretty much used the same password on all of
the different systems I logged in on. After a few years, particularly
after I started logging on to websites rather than unix boxes, I started
implementing various password security plans.
One of the things I'd have was a low security password that I'd use for
websites that I didn't really care if they got pwned. Particularly if I
didn't trust the people who ran the website to not do something stupid
like store passwords in the clear, or something malevolent like
recording email and password and trying to log onto my banking site.
Over the past couple of days I've gotten two slightly different copies
of basically the same email that includes my low security password. I'm
not upset, I'm only surprised that it took so long for someone to try
this scam on me. At this point, I don't even know which obsolete website
it might have come from, because I don't use the low security password
anymore, I've got a different algorithm for creating passwords rather
than just low, medium and high security passwords.
So, just as it is important to have a good backup strategy, one without
a single point of failure, it's also good to have some sort of password
strategy.
For my own entertainment, I replied to the first of the emails, the one
I got yesterday. The reasons that what the scammer is claiming won't
work are hinted at in some of my replies.
Karola Corey wrote on 7/10/18 1:29 PM:
> I am aware, pwd123, is your pass word. You may not know me and you are
> probably wondering why you are getting this e-mail, right?
It is a password.
>
> Well, I actually setup a malware on the adult vids (pornography) site
Interesting, which one.
> and you know what, you visited this website to have fun (you know
what I mean). While you were watching videos, your browser began
operating as a RDP (Remote Desktop) that has a keylogger which gave me
access to your
Which machine. What hardware? What operating system and version? What IP
address?
> display screen and cam. Just after that, my software collected your
entire contacts from your Messenger, Facebook, and email.
In that case you should be able to send me several sample contacts.
>
> What did I do?
>
> I made a double-screen video. 1st part shows the video you were
viewing (you've got a good taste lmao), and second part displays the
recording of your webcam.
Ooh, kinky! I'd like to see it. I might share it on some of the sites I
hang out on.
>
> What should you do?
>
> Well, in my opinion, $1900 is a reasonable price for our little
secret. You will make the payment via Bitcoin (if you don't know this,
search "how to buy bitcoin" in Google).
>
> BTC Address: 1JHwenDp9A98XdjfYkHKyiE3R99Q72K9X4
> (It is cAsE sensitive, so copy and paste it)
>
> Note:
>
> You have one day in order to make the payment. (I've a unique pixel
in this email message, and right now I know that you have read through this
Interesting, how does that unique pixel work on an smtp text based mail
client.
> mail). If I don't receive the BitCoins, I will definitely send your
video recording to all of your contacts including members of your
family, colleagues, and so forth. Having said that, if I do get paid,
I'll destroy the video immidiately. If you want to have evidence, reply
with "Yes!" and I definitely will send your video to your 5 friends.
This is the non-negotiable offer, so don't waste my personal time and
yours by replying to this e mail.
--
Larry Colen [email protected] http://red4est.com/lrc
https://www.flickr.com/photos/ellarsee/collections/72157612824732477/
--
PDML Pentax-Discuss Mail List
[email protected]
http://pdml.net/mailman/listinfo/pdml_pdml.net
to UNSUBSCRIBE from the PDML, please visit the link directly above and follow
the directions.