Scammers often play on fear to steal your hard-earned money. Whatever the type of scam, whether it’s a Microsoft phone scam or a government impersonation, they’ll try to scare you by claiming that you or your device has a serious problem and that only they can fix it. The latest sextortion scam targeting many people in the United States is no exception.
These bad actors will contact you via email, claiming to have compromising photos or videos of you in private situations, and demand money to have them removed. What’s new is that these scammers are now including images of your home to make their blackmail more convincing.
Many of you have emailed us to tell us how these scammers are targeting you. Below are more details on the evolved sextortion scams and tips on how to protect yourself.
For security alerts and expert tips, sign up for KURT’s newsletter, The Cyberguy Report, here.
Illustration of a scammer at work (Kurt “Cyberguy” Knutson)
How the scam works
It starts with receiving an email from a scammer claiming to have recorded you while watching adult content. The scammer uses your name and attaches photos of your house or a nearby street to make it look like it’s real.
The scammers claim that they will install spyware called “Pegasus” on your phone and have access to everything you watch. Pegasus is a spyware developed by the NSO Group, a company that sells exclusively to government and law enforcement agencies.
This is very expensive and it is highly unlikely that a random scammer would ever have access to this. Even if they did, stalking someone who is watching adult content is a waste of time. Plus, if they have spyware installed on your phone, they don’t need to ask you for money.
After scaring you, the scammers offer to pay you money to have the so-called footage deleted and pretend you never existed. Typically, they include a QR code for a cryptocurrency wallet and ask for Bitcoin as payment. One email I saw from a victim included a ransom of around $2,000.
We have attached some of the emails victims received below. We have obscured personal information to protect their privacy, but you can still see the text of the email.


Sextortion scam emails in action (Kurt “Cyberguy” Knutson)
What ruthless hackers stole from 110 million AT&T customers
How do scammers know where you are?
While the scam might seem real when you see a picture of your home, it’s probably just a trick. One reason a scammer could have gotten hold of that information is a data leak. Your address could have been leaked and ended up on the dark web. The scammer could have gotten hold of it and used Google Maps to find pictures of your house. Another reason could be that you listed something online, like a rental or sales ad. If you made your address public in an online listing, the scammer could have found your address that way.


A Google Maps vehicle taking an image (Kurt “Cyberguy” Knutson)
Massive free VPN data breach exposes 360 million records
Protect your privacy: Blur your home on Google Maps
Google Maps is how scammers get access to images of your home. But you can blur your home on the platform to stop scammers from scaring you. You’ll need to do this from a computer, as the blurring feature isn’t available in the Google Maps app for iOS or Android. Follow these steps to learn how:
Go to maps.google.com and enter your home address in the search bar at the top right. Click on the photo of your home that appears. You’ll see a Street View image of your location. Click (Report a Problem) in the bottom right corner. Use your mouse to adjust the view so your home and anything else you want to blur are inside the red and black box. Select the option to blur your home from the choices provided. Click (Submit) and Google will review your request and blur your home if it deems it necessary.


Blurred house on Google Maps (Kurt “Cyberguy” Knutson)
4 Extra Steps to Protect Yourself from Sextortion Scams
Here are four additional steps you can take to protect yourself from sextortion scams:
1) Be careful with your personal information: Avoid sharing personal information online such as your address, phone number, and other sensitive information. Be careful with what you post on social media and other platforms.
2) Watch out for warning signs: Scammers are often bluffing. For example, the Pegasus software they claim to use is a lie. Stay informed about common scams and how they operate. Knowing what to look out for can help you recognize and avoid potential threats.
3) Change your passwords: If your email contains a password, make sure you are not using it anymore and if you are, change it as soon as possible. On another device (laptop or desktop), you should change the passwords for all important accounts like email, banking, social media, etc.
You should do this on a different device so that even if a fraudster actually gets access to your device, they can’t record you setting a new password. You should also use a strong, unique password that’s hard to guess or crack. You can also use a password manager to securely generate and store your passwords. Even if you haven’t been affected by a data breach, changing your passwords should be part of your general cybersecurity practices.
4) Use a personal data removal service: Consider investing in a personal data removal service that specializes in continuously monitoring and deleting personal information from various online databases and websites.
As I mentioned above, the scammers most likely gained access to your address through a data breach. Data removal services can help you remove all this personal information from the internet. Check out the data removal services I recommend here.
World’s largest database of stolen passwords uploaded to crime forum
Important points about the cart
Scammers use fear and deception to trick you out of your hard-earned money. Understanding how sextortion scams work and knowing what to look out for can help protect you from becoming a victim. Remember, most of these scammers are bluffing and exploiting your fears. Keep your personal information safe, be careful about what you share online, and always check if any threatening messages you receive are legitimate. If you fall victim to a scam, report it to the appropriate authorities and take steps to protect your accounts and devices.
Have you encountered a similar scam or any other type of scam? How did you deal with it? Contact us at Cyberguy.com/Contact.
For more tech tips and security alerts, subscribe to the free CyberGuy Report newsletter by visiting Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what story you’d like us to feature.
Follow Kurt on his social channels:
Answers to the CyberGuy’s most frequently asked questions:
New Arrivals from Cart:
Copyright 2024 CyberGuy.com. All Rights Reserved.