Ransom scam messages include disturbing emails from people demanding ransom payments or other actions. Some of these messages now include pictures of people’s homes or other personal details in an attempt to personalize them and give an appearance of legitimacy.
These messages are generally empty threats. If a malicious group gains remote access to your computer, they can steal your credentials and empty your bank account so they will not send a ransom demand. Photos of homes are typically taken from Google Maps, Street View, and other public information. Unfortunately, these malicious groups have a lot of time to gather information because of payments from others, so these attacks are not likely to end soon.
If you receive a ransom message like this, put it in your spam folder and ignore it. If you wish to report the message, there is a link to the FBI’s tip page at the bottom of this posting.
There is a similar issue with ransomware, where criminals gain access to a computer remotely but then steal data and encrypt your hard drive. In those cases, paying any ransom is still a terrible idea. Even companies that spend millions of dollars for ransoms only get their data unlocked a fraction of the time. Additionally, the thieves can break right back in to demand more ransoms and sell your data and credentials to other thieves. The proper fix is to get new computers and restore data from backups.
It is also good to be aware that sextortion and ransom scams can be an even worse issue for children. The links below might be helpful. They include an article reviewing some of these attacks from Krebs on Security and a guide from the FBI for those who wish to learn more.
Part of the tactics of these attacks is to embarrass people; don’t let the criminals have power over you.
Sextortion Scams Now Include Photos of Your Home
https://krebsonsecurity.com/
FBI page on Sextortion & children
https://www.fbi.gov/how-we-
FBI Financially Motivated Ransom Attacks page with information on reporting these messages
https://www.fbi.gov/how-we-