{"id":13511,"date":"2019-06-18T21:25:48","date_gmt":"2019-06-19T01:25:48","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/spam-extortion-reputation\/13511\/"},"modified":"2020-03-27T15:50:53","modified_gmt":"2020-03-27T11:50:53","slug":"spam-extortion-reputation","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/spam-extortion-reputation\/13511\/","title":{"rendered":"Spammers are threatening companies&#8217; websites"},"content":{"rendered":"<p>Extortionists are constantly inventing new blackmail strategies. Until recently, their main trick was \u201csextortion,\u201d which you may already have <a href=\"https:\/\/www.kaspersky.com\/blog\/cia-sextortion\/\" target=\"_blank\" rel=\"noopener nofollow\">read about<\/a>. However, as happens with most cyberthreats, criminals\u2019 attention began to shift from users to organizations. That is not surprising \u2014 there is much more money in business.<\/p>\n<p>Not long ago, our spam filters began catching a new version of blackmail letters. At this time, they threaten to undermine the reputation of the websites of small and medium-size companies. The scheme is quite simple: They send letters to victims\u2019 public addresses (or submit them using their website \u201ccontact us\u201d form), demanding a transfer of a small (by business standards) amount of 0.3 to 0.5 bitcoins to their bitcoin wallet. (At the time of this writing, the amount was never more than the equivalent of $4,200).<\/p>\n<h2>What are they threatening?<\/h2>\n<p>These cybercriminals are trying to impress their victims with large numbers. Their threats are as follows:<\/p>\n<ul>\n<li>They will submit offensive letters signed by the victim\u2019s company to 33 million sites with web contact forms.<\/li>\n<li>They will send out annoying advertising letters with promises of free iPhones to 19 million addresses.<\/li>\n<li>They will continue the assault with aggressive spam on 35 million forums.<\/li>\n<\/ul>\n<p>As a result, they say, the Spamhaus project will recognize the victim\u2019s site as a source of spam and will block it forever, completely undermining the reputation of the site and the company.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/06\/19052801\/spam-extortion-reputation-letter.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13514\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/06\/19052801\/spam-extortion-reputation-letter.png\" alt=\"Typical letter with demands\" width=\"879\" height=\"791\"><\/a><\/p>\n<h2>How real are the threats?<\/h2>\n<p>The short answer is, they are not real at all. The amount of work that hackers would have to undertake for a disinformation campaign like the one outlined would require too much time and effort to be profitable. Spammers\u2019 only hope is to frighten the recipient enough to pay.<\/p>\n<p>In fact, if the company decides to pay, all it accomplishes is getting added to the list of victims who tend to cooperate with extortionists. By demonstrating that you are ready to agree to their demands, you are making your company more likely to receive similar letters in the future.<\/p>\n<h2>What should you do?<\/h2>\n<p>If you receive such a message, it may be tempting to act, but you should not. However, to avoid similar letters in the future, use a <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">security solution<\/a> that can block spam mailing at the server level.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>A new spam mailing threatens the reputations of small businesses websites. <\/p>\n","protected":false},"author":40,"featured_media":13512,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[2040,240,521],"class_list":{"0":"post-13511","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-extortion","10":"tag-spam","11":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/spam-extortion-reputation\/13511\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/spam-extortion-reputation\/16003\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/spam-extortion-reputation\/17899\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/spam-extortion-reputation\/16035\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/spam-extortion-reputation\/14776\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/spam-extortion-reputation\/18695\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/spam-extortion-reputation\/17481\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/spam-extortion-reputation\/22939\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/spam-extortion-reputation\/6062\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/spam-extortion-reputation\/27362\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/spam-extortion-reputation\/11955\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/spam-extortion-reputation\/10882\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/spam-extortion-reputation\/19503\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/spam-extortion-reputation\/23460\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/spam-extortion-reputation\/22821\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/spam-extortion-reputation\/22766\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/spam\/","name":"spam"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13511"}],"version-history":[{"count":6,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13511\/revisions"}],"predecessor-version":[{"id":16253,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13511\/revisions\/16253"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13512"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}