![]() ![]() But as the scam develops, there's a good chance it may include credentials from a fresh breach, according to Krebs. ![]() "It is likely that this improved sextortion attempt is at least semi-automated: My guess is that the perpetrator has created some kind of script that draws directly from the usernames and passwords from a given data breach at a popular Web site that happened more than a decade ago, and that every victim who had their password compromised as part of that breach is getting this same email at the address used to sign up at that hacked Web site."įor now, the scammers seem to be using really old passwords - maybe one you haven't used in years.
0 Comments
Leave a Reply. |