Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Robot wins half marathon faster than human record
    • Analysis of 200 education dept-endorsed school apps finds most are selling BS when it comes to the privacy of children’s data
    • Spoofed Tankers Are Flooding the Strait of Hormuz. These Analysts Are Tracking Them
    • Polymarket is in talks to raise $400M at a ~$15B post-money valuation, up from $9B in October 2025, but below Kalshi’s $22B valuation from March 2026 (The Information)
    • Today’s NYT Connections: Sports Edition Hints, Answers for April 20 #574
    • Will Humans Live Forever? AI Races to Defeat Aging
    • AI evolves itself to speed up scientific discovery
    • Australia’s privacy commissioner tried, in vain, to sound the alarm on data protection during the u16s social media ban trials
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Monday, April 20
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»Technology»Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn
    Technology

    Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn

    Editor Times FeaturedBy Editor Times FeaturedSeptember 3, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    Sextortion-based hacking, which hijacks a sufferer’s webcam or blackmails them with nudes they’re tricked or coerced into sharing, has lengthy represented one in all the most disturbing forms of cybercrime. Now one specimen of broadly obtainable spy ware has turned that comparatively guide crime into an automatic function, detecting when the consumer is looking pornography on their PC, screenshotting it, and taking a candid picture of the sufferer by way of their webcam.

    On Wednesday, researchers at safety agency Proofpoint printed their analysis of an open-source variant of “infostealer” malware referred to as Stealerium that the corporate has seen utilized in a number of cybercriminal campaigns since Might of this 12 months. The malware, like all infostealers, is designed to contaminate a goal’s laptop and robotically ship a hacker all kinds of stolen delicate information, together with banking info, usernames and passwords, and keys to victims’ crypto wallets. Stealerium, nonetheless, provides one other, extra humiliating type of espionage: It additionally screens the sufferer’s browser for net addresses that embrace sure NSFW key phrases, screenshots browser tabs that embrace these phrases, pictures the sufferer by way of their webcam whereas they’re watching these porn pages, and sends all the photographs to a hacker—who can then blackmail the sufferer with the specter of releasing them.

    “On the subject of infostealers, they usually are on the lookout for no matter they’ll seize,” says Selena Larson, one of many Proofpoint researchers who labored on the corporate’s evaluation. “This provides one other layer of privateness invasion and delicate info that you simply undoubtedly would not need within the arms of a specific hacker.”

    “It is gross,” Larson provides. “I hate it.”

    Proofpoint dug into the options of Stealerium after discovering the malware in tens of 1000’s of emails despatched by two totally different hacker teams it tracks (each comparatively small-scale cybercriminal operations), in addition to a lot of different email-based hacking campaigns. Stealerium, unusually, is distributed as a free, open supply device obtainable on Github. The malware’s developer, who goes by the named witchfindertr and describes themselves as a “malware analyst” primarily based in London, notes on the web page that this system is for “academic functions solely.”

    “How you employ this program is your duty,” the web page reads. “I can’t be held accountable for any unlawful actions. Nor do i give a shit how u use it.”

    Within the hacking campaigns Proofpoint analyzed, cybercriminals tried to trick customers into downloading and putting in Stealerium as an attachment or an internet hyperlink, luring victims with typical bait like a pretend fee or bill. The emails focused victims inside firms within the hospitality business, in addition to in schooling and finance, although Proofpoint notes that customers outdoors of firms had been additionally seemingly focused however would not be seen by its monitoring instruments.

    As soon as it is put in, Stealerium is designed to steal all kinds of information and ship it to the hacker by way of providers like Telegram, Discord, or the SMTP protocol in some variants of the spy ware, all of which is comparatively commonplace in infostealers. The researchers had been extra shocked to see the automated sextortion function, which screens browser URLs an inventory of pornography-related phrases equivalent to “intercourse” and “porn,” which could be personalized by the hacker and set off simultaneous picture captures from the consumer’s webcam and browser. Proofpoint notes that it hasn’t recognized any particular victims of that sextortion perform, however the existence of the function suggests it was seemingly used.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Spoofed Tankers Are Flooding the Strait of Hormuz. These Analysts Are Tracking Them

    April 20, 2026

    Nothing Phone (4a) Pro Review: A Close Second

    April 20, 2026

    The Influencers Normalizing Not Having Sex

    April 20, 2026

    Our Favorite Apple Watch Has Never Been Less Expensive

    April 19, 2026

    The 11 Best Fans to Buy Before It Gets Hot Again (2026)

    April 19, 2026

    Hisense U7SG TV Review (2026): Better Design, Great Value

    April 19, 2026

    Comments are closed.

    Editors Picks

    Robot wins half marathon faster than human record

    April 20, 2026

    Analysis of 200 education dept-endorsed school apps finds most are selling BS when it comes to the privacy of children’s data

    April 20, 2026

    Spoofed Tankers Are Flooding the Strait of Hormuz. These Analysts Are Tracking Them

    April 20, 2026

    Polymarket is in talks to raise $400M at a ~$15B post-money valuation, up from $9B in October 2025, but below Kalshi’s $22B valuation from March 2026 (The Information)

    April 20, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Castlery Promo Code: Save Up to 15% in April 2026

    April 3, 2026

    AI mania pushes Nvidia to record $4 trillion valuation

    July 9, 2025

    Today’s NYT Mini Crossword Answers for Sept. 24

    September 24, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.