Feeds

Send Bitcoin or we'll hate-spam you on Yelp, say crims

Extortion letters demand cryptocurrency from pizza parlours

Beginner's guide to SSL certificates

Businesses are being served printed 'Notice of Extortion' letters demanding Bitcoins to avoid 'severe and irreparable' damage to their reputation.

A handful of US Pizza restaurants have reported the scam to local newspapers, and to Reddit. The letters appear to come from the same extortionist.

The letters demanded payment of one Bitcoin (US$578) within a month or have the fee escalated to three coins (US$1730).

The villains threatened a laundry list of attacks for non-payment ranging from "negative online reviews" and complaints to the US Better Business Bureau, to denial of service attacks against telephones, mercury contamination and various reports to police of false financial crimes and drug production allegedly taking place at the victim business.

"Because many of the actions we take are catastrophic and irreversible, it is advised pay the tribute before the deadline is reached," the letters read.

Victim businesses refused to pay the extortion while Reddit users laughed at the 16 threats within the letter pointing out they functioned as a handy list of federal crimes which could see the attackers jailed should they be captured.

Others have suggested the attackers may be tracked using printer stenography, a technique that makes it possible to identify the make and model of printers used to create a document.

The owner of US pizza business GRPD Pizza and Delivery Mike Raymond told local station 24 Hour News 8 he thought the extortion letter was a joke.

"They’re taking your lunch money, and we’re not going to let them," he said.

Digital wallets linked to the letters did not appear to have recieved payments.

The letters were the latest vector for delivering Bitcoin ransoms, a favourite for online fraudsters due to the anonymity the currency afforded.

Such threats were typically issued by ransomware scammers demanding payment to unlock encrypted victim files, and by hackers threatening to leak sensitive information or launch distributed denial of service attacks unless money was paid. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Desperate VXers enslave FREEZERS in DDoS bot
Updated Spike malware targets Asia
Heatmiser digital thermostat users: For pity's sake, DON'T SWITCH ON the WI-FI
A stranger turns up YOUR heat with default password 1234
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.