{"id":18194,"date":"2021-04-12T15:59:26","date_gmt":"2021-04-12T11:59:26","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/cryptoscam-in-lightshot\/18194\/"},"modified":"2021-04-12T15:59:50","modified_gmt":"2021-04-12T11:59:50","slug":"cryptoscam-in-lightshot","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/cryptoscam-in-lightshot\/18194\/","title":{"rendered":"Screenshots as cryptoscam in Lightshot"},"content":{"rendered":"<p>Cryptocurrency scams seem to be gaining momentum by the day. Hard on the heels of scammers tricking Discord users by offering <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptoscam-in-discord\/38661\/\" target=\"_blank\" rel=\"noopener nofollow\">nonexistent coins on fake exchanges<\/a>, inventing stories about lucky winners on <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptoscam-in-discord-fake-news-services\/38764\/\" target=\"_blank\" rel=\"noopener nofollow\">fake news sites<\/a>, and simulating <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptoscam-in-discord-fake-dex-airdrop\/39140\/\" target=\"_blank\" rel=\"noopener nofollow\">helicopter money<\/a>, a new scheme is exploiting Lightshot\u2019s screen-sharing tool to get money from overly curious cryptoinvestors.<\/p>\n<h2>Convenient doesn\u2019t mean safe<\/h2>\n<p>Lightshot is a tool for creating, customizing, and quickly sending screenshots. It consists of an app for Windows, macOS, or Ubuntu and the prnt.sc cloud portal and lets users share screenshots quickly and easily: One click or shortcut sends an image to the cloud and returns an URL for sharing.<\/p>\n<p>Anyone can see published screenshots without <a href=\"https:\/\/www.kaspersky.com\/blog\/identification-authentication-authorization-difference\/37143\/\" target=\"_blank\" rel=\"noopener nofollow\">authentication<\/a>; you don\u2019t even need a Lightshot account. That makes the service fast and convenient but not very secure.<\/p>\n<p>Moreover, to view a screenshot, you don\u2019t even need the exact link; the URLs are sequential, so if you replace a character in one of them with the next in order, for example, another image will open. The process can even be automated. A simple script for brute-forcing URLs and downloading content from them takes just a few minutes to write.<\/p>\n<p>Such openness is not a bug; the service warns users that <a href=\"https:\/\/app.prntscr.com\/privacy.html\" target=\"_blank\" rel=\"nofollow noopener\">every uploaded image is public<\/a>. However, given that leaks of valuable information through Lightshot regularly <a href=\"https:\/\/www.wired.co.uk\/article\/lightshot-chrome-screenshot-app\" target=\"_blank\" rel=\"nofollow noopener\">make the news<\/a>, clearly not everyone reads the fine print.<\/p>\n<h2>How to leak data in Lightshot<\/h2>\n<p>So what if screenshots enter the public domain? Who cares about sharing gaming records or jokes from work messages? Think creatively: Lightshot users can <a href=\"https:\/\/securelist.com\/dox-steal-reveal\/99577\/\" target=\"_blank\" rel=\"nofollow noopener\">dox<\/a> themselves in any of at least three very plausible ways.<\/p>\n<p>Take, for example, an employee who snaps a screenshot of an interface to get help with setting up a new program. Sounds fine. Now, what if a confidential document is open, partially hidden under the application window? Or if someone shares a hilariously stupid work e-mail with a trusted friend, just for a laugh? Or someone shows off an intimate chat but forgets to blur names and addresses?<\/p>\n<p>Made public in Lightshot, those screenshots could spell serious trouble. Online troublemakers <a href=\"https:\/\/www.reddit.com\/r\/InternetIsBeautiful\/comments\/1ufnqw\/so_today_me_and_my_friend_invented_a_new_game_nsfw\/\" target=\"_blank\" rel=\"nofollow noopener\">hunt<\/a> for revealing photos for fun; trolls can use them for harassment; and cybercriminals can use the threat of exposure to extort money from victims.<\/p>\n<h2>A trap for busybodies<\/h2>\n<p>At the same time, even those who keep valuable data private and always check screenshots for unwanted extras may find the service still has a few pitfalls. For example, on any given day the Lightshot portal might contain screenshots with details for accessing a cryptocurrency wallet. Sometimes, the screenshots appear to suggest the account was shared deliberately. Some display requests for help. Some are bizarre and unrelated \u2014 we even saw a suicide note.<\/p>\n<div id=\"attachment_39226\" style=\"width: 1410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/12155934\/cryptoscam-in-lightshot-screenshot-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-39226\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/12155934\/cryptoscam-in-lightshot-screenshot-1.png\" alt=\"Screenshots of correspondence showing credentials for fake cryptocurrency accounts\" width=\"1400\" height=\"866\" class=\"size-full wp-image-18195\"><\/a><p id=\"caption-attachment-39226\" class=\"wp-caption-text\">Screenshots of correspondence showing credentials for fake cryptocurrency accounts<\/p><\/div>\n<p>In other cases it looks like the \u201ccredentials\u201d got on Lightshot as if by accident or carelessness. For example, we saw screenshots that appeared to be password recovery e-mails for cryptocurrency wallets.<\/p>\n<div id=\"attachment_39227\" style=\"width: 1930px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/12155943\/cryptoscam-in-lightshot-screenshot-2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-39227\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/04\/12155943\/cryptoscam-in-lightshot-screenshot-2.png\" alt=\"Fake password reset e-mails for equally fake cryptocurrency accounts\" width=\"1920\" height=\"1605\" class=\"size-full wp-image-18197\"><\/a><p id=\"caption-attachment-39227\" class=\"wp-caption-text\">Fake password reset e-mails for equally fake cryptocurrency accounts<\/p><\/div>\n<p>If a user goes to the URL in the screenshot in pursuit of easy pickings, they will find themselves on a website posing as a cryptocurrency exchange. Entering the credentials gets them into a fake account that appears to hold an impressive amount of cryptocurrency, say, 0.8 BTC (more than $45,000 at the time of posting). And from inside the account, the victim can try to withdraw the funds and transfer them to their own account.<\/p>\n<p>In that case, the exchange asks for a small commission. It\u2019s mere peanuts compared with the full sum, but it\u2019s fake and will do nothing but line the scammers\u2019 pockets. And, of course, \u201cpeanuts\u201d is relative: A commission of 0.001\u20130.0015 BTC, for example, at current bitcoin rates, comes to approximately $60\u2013$90.<\/p>\n<p>All in all, the scheme seems to work well, and it does have a certain elegance. At the time of posting, about 0.1 BTC (roughly $6,000) had been transferred to the \u201ccommissions\u201d wallet.<\/p>\n<h2>How to save your money and secure your data<\/h2>\n<p>Convenience does not mean security or privacy \u2014 often quite the opposite. Lightshot is a prime example. Here are a few tips for working safely with screenshots:<\/p>\n<ul>\n<li>Before installing Lightshot, consider whether you really want to share screenshots by making them public;<\/li>\n<li>If you decide to go ahead, remember that confidential information \u2014 banking details, passwords, other personal information \u2014 is the bread and butter of cybercriminals. Use <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-privacy-security\/38444\/\" target=\"_blank\" rel=\"noopener nofollow\">secure channels<\/a> to share it, not Lightshot, or better still, don\u2019t share it at all;<\/li>\n<li>If you\u2019ve already used Lightshot and now regret sharing something, get the URL by searching your messages, go there, and click <em>Report abuse<\/em>; or send a request to <a href=\"mailto:support@skillbrains.com\" target=\"_blank\" rel=\"nofollow noopener\">support@skillbrains.com<\/a>;<\/li>\n<li>Use your operating system\u2019s built-in tools and shortcuts for creating screenshots. In Windows, use the Snipping Tool or the Print Screen button; Mac users can press Cmd-Shift-3 to save a full-screen capture or Cmd-Shift-4 to select an area to screenshot.<\/li>\n<\/ul>\n<p>To be clear, we do not recommend logging in to others\u2019 accounts, even just out of curiosity. And to avoid accidentally giving your login credentials to phishers, use a <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">reliable security solution<\/a> that will alert you if you stray onto a suspicious website.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-banking\">\n","protected":false},"excerpt":{"rendered":"<p>Scammers set a Lightshot trap for greedy cryptoinvestors.<\/p>\n","protected":false},"author":2648,"featured_media":18199,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[2088,1505,80,2442,43,695,521],"class_list":{"0":"post-18194","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-tips","9":"tag-cryptocurrencies","10":"tag-fraud","11":"tag-lightshot","12":"tag-privacy","13":"tag-scam","14":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cryptoscam-in-lightshot\/18194\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cryptoscam-in-lightshot\/22713\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cryptoscam-in-lightshot\/24524\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cryptoscam-in-lightshot\/22562\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cryptoscam-in-lightshot\/21607\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cryptoscam-in-lightshot\/25034\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cryptoscam-in-lightshot\/24319\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cryptoscam-in-lightshot\/30447\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cryptoscam-in-lightshot\/9518\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cryptoscam-in-lightshot\/39224\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cryptoscam-in-lightshot\/16742\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cryptoscam-in-lightshot\/17303\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/cryptoscam-in-lightshot\/14669\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cryptoscam-in-lightshot\/26491\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cryptoscam-in-lightshot\/30435\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cryptoscam-in-lightshot\/23739\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cryptoscam-in-lightshot\/29086\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cryptoscam-in-lightshot\/28884\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/scam\/","name":"scam"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2648"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18194"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18194\/revisions"}],"predecessor-version":[{"id":18198,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18194\/revisions\/18198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18199"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}