Back about 30 years ago, I pretty much used the same password on all of the different systems I logged in on. After a few years, particularly after I started logging on to websites rather than unix boxes, I started implementing various password security plans.

One of the things I'd have was a low security password that I'd use for websites that I didn't really care if they got pwned. Particularly if I didn't trust the people who ran the website to not do something stupid like store passwords in the clear, or something malevolent like recording email and password and trying to log onto my banking site.

Over the past couple of days I've gotten two slightly different copies of basically the same email that includes my low security password. I'm not upset, I'm only surprised that it took so long for someone to try this scam on me. At this point, I don't even know which obsolete website it might have come from, because I don't use the low security password anymore, I've got a different algorithm for creating passwords rather than just low, medium and high security passwords.

So, just as it is important to have a good backup strategy, one without a single point of failure, it's also good to have some sort of password strategy.

For my own entertainment, I replied to the first of the emails, the one I got yesterday. The reasons that what the scammer is claiming won't work are hinted at in some of my replies.


Karola Corey wrote on 7/10/18 1:29 PM:
> I am aware, pwd123, is your pass word. You may not know me and you are
> probably wondering why you are getting this e-mail, right?

It is a password.
>
> Well, I actually setup a malware on the adult vids (pornography) site

Interesting, which one.

> and you know what, you visited this website to have fun (you know what I mean). While you were watching videos, your browser began operating as a RDP (Remote Desktop) that has a keylogger which gave me access to your

Which machine. What hardware? What operating system and version? What IP address?

> display screen and cam. Just after that, my software collected your entire contacts from your Messenger, Facebook, and email.

In that case you should be able to send me several sample contacts.

>
> What did I do?
>
> I made a double-screen video. 1st part shows the video you were viewing (you've got a good taste lmao), and second part displays the recording of your webcam.

Ooh, kinky! I'd like to see it. I might share it on some of the sites I hang out on.
>
> What should you do?
>
> Well, in my opinion, $1900 is a reasonable price for our little secret. You will make the payment via Bitcoin (if you don't know this, search "how to buy bitcoin" in Google).
>
> BTC Address: 1JHwenDp9A98XdjfYkHKyiE3R99Q72K9X4
> (It is cAsE sensitive, so copy and paste it)
>
> Note:
>
> You have one day in order to make the payment. (I've a unique pixel in this email message, and right now I know that you have read through this

Interesting, how does that unique pixel work on an smtp text based mail client.

> mail). If I don't receive the BitCoins, I will definitely send your video recording to all of your contacts including members of your family, colleagues, and so forth. Having said that, if I do get paid, I'll destroy the video immidiately. If you want to have evidence, reply with "Yes!" and I definitely will send your video to your 5 friends. This is the non-negotiable offer, so don't waste my personal time and yours by replying to this e mail.



--
Larry Colen           [email protected]          http://red4est.com/lrc
https://www.flickr.com/photos/ellarsee/collections/72157612824732477/

--
PDML Pentax-Discuss Mail List
[email protected]
http://pdml.net/mailman/listinfo/pdml_pdml.net
to UNSUBSCRIBE from the PDML, please visit the link directly above and follow 
the directions.

Reply via email to