Feeds

Sinister scams 'sextort' social networkers

Mass nude pic trap

Securing Web Applications Made Simple and Scalable

A rash of cases in which men use their hacking skills to extort sexually explicit images from women and girls is bringing new attention to the risks of storing sensitive data on social networks and internet-connected devices.

The most recent “sextortion” plot to be detailed in a court of law is that of George Samuel Bronk, a 23-year-old California man accused of appropriating nude and sexually explicit images of at least 170 women, Sgt. Kelly Dixon of the California Highway Patrol's Computer Crimes Division told The Register. He was arraigned on Tuesday in California state court in Sacramento on more than 30 counts, including hacking, possession of child pornography and impersonation. He didn't enter a plea, Dixon said.

Investigators have identified more than 20 victims whose images are included in the cache of stolen pictures and videos. In some cases, Bronk allegedly contacted the women and threatened to make the images public unless they supplied him with more nude pictures. He was caught after a Connecticut woman told her state police department that sexually explicit photographs of her had been posted to her Facebook page. Police ultimately fingered Bronk by linking his IP address to the woman's hacked Facebook and email accounts.

A Canadian man, 30-year-old Daniel Lesiewicz, admitted to luring hundreds of girls aged 13 to 18 into a similar trap, according to news reports. At a sentencing hearing last month, prosecutors said he used compromised Facebook accounts to pose as some of the victims' friends and convinced the girls to undress in front of their webcams. He then threatened to publish the images unless they gave him more.

In some cases, he terrorized the girls by calling their cellphones from what appeared to be their own numbers. One victim, who was 17 at the time, testified that she was so humiliated that she quit her summer job and dropped out of advanced college classes. Another victim attempted suicide, The Montreal Gazette reported. Sentencing has been postponed until later this month.

Earlier this week, the FBI's field office in Los Angeles sought help from the public in identifying more victims of Luis Mijangos, 31, of Santa Ana, California, who in June was arrested and accused of using infected computers to capture nude pictures and videos of about 230 individuals, at least 44 of whom were juveniles.

According to prosecutors, Mijangos used peer-to-peer file-sharing networks to trick his victims into installing software that gave him complete control of their machines. He then rifled through the hard drives for intimate images and other incriminating data, which he would use to extort sexually explicit videos from the victims, court documents allege. He has pleaded not guilty to charges that include extortion.

Crimes like these may be unusually plentiful in the news right now, but they're hardly new. In 2006, Adrian Ringland, then 36, from Ilkeston, Derbyshire, admitted blackmailing teenage girls into sending him explicit pictures after infecting their PCs with malware. He was sentenced to 10 years in prison.

The list of similar offenses goes on and on and on.

That the reports only seem to be increasing suggests that many people still don't understand the risks of storing photos and information online. Many of the victims' accounts were compromised by by correctly guessing the security questions used when an account holder forgets her password. In other instances, racy photos were nicked from compromised email accounts or computers. Those who collect such images would do well to keep them on drives that aren't attached to the net at all. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.