The “Send me Bitcoin” Scam Continues

This scam I mentioned quite a while ago. It has continued to pick up steam – plowing its way through every part of the Internet. It IS a SCAM. Do NOT pay it. We’ve had numerous people contact us that they are receiving such messages.

Here is is below in English and Chinese:

ENGLISH

Hello there!

You may have noticed that I sent an email from your account.
This means I have full access to your device.

I have been watching it for a few months.
The truth is that you are infected with malware through an adult website you have visited.

If you are not familiar with this, I will explain.
I created high quality spyware. It allows me to gain full access and control over your device.
This means I can see everything on the screen, turn on the camera and microphone, but you don’t know.

I can also access all your contacts and all communications.

Why is your antivirus software not detecting malware?
Answer: My malware uses the driver, I update the signature every 4 hours so that your anti-virus software is silent.

I made a video showing how you can satisfy yourself in the left half of the screen, and in the right half you will see the video you watched.
One Key! All of your contacts in email and social networks will receive this video! Your life will change forever!
I can also post access to all email communications and messengers you use.

If you want to stop this ʌ
Transfer the $362 amount to my bitcoin address (if you don’t know how to do this, please write to Google: “Buy Bitcoin”).

My bitcoin address (BTC wallet) is: *********************************

After receiving the payment, I will delete the video and you will never hear my voice again.
I will give you 50 hours (more than 2 days) to pay.
I received a notification from this letter and the timer will work when you see the letter.

It doesn’t make sense to file a complaint somewhere because it can’t be tracked like my Bitcoin address.
I have not made any mistakes.

If I find that you shared this message with others, the video will be distributed immediately.

Good luck, goodbye!

CHINESE

你好!

您可能已经注意到,我从您的帐户发送了一封电子邮件。
这意味着我可以完全访问您的设备。

我已经看了好几个月了。
事实是,您通过您访问过的成人网站感染了恶意软件。

如果您对此不熟悉,我会解释。
我创建了高质量的间谍软件。 它允许我获得对您设备的完全访问权限和控制权。
这意味着我可以在屏幕上看到所有内容,打开相机和麦克风,但您不知道。

我也可以访问您的所有联系人和所有通信。

为什么您的防病毒软件没有检测到恶意软件?
回答::我的恶意软件使用驱动程序,我每4小时更新一次签名,以便您的防病毒软件无声。

我制作了一个视频,展示了你如何在屏幕的左半部分让自己满意,在右半部分,你会看到你观看的视频。
一键! 您在电子邮件和社交网络中的所有联系人都将收到此视频! 你的生活将永远改变!
我还可以发布您使用的所有电子邮件通信和信使的访问权限。

如果你想阻止这个ʌ
将362美元的金额转入我的比特币地址(如果您不知道如何做到这一点,请写信给Google:“购买比特币”)。

我的比特币地址(BTC钱包)是:**********************************

收到付款后,我将删除该视频,您将永远不会再听到我的声音。
我给你50个小时(超过2天)付款。
我收到了这封信的通知,当你看到这封信时,计时器会起作用。

在某处提交投诉没有意义,因为无法像我的比特币地址那样跟踪此电子邮件。
我没有犯任何错误。

如果我发现您与其他人分享了此消息,则视频将立即分发。

祝你好运,再见!

AND IT IS IN MANY OTHER LANGUAGES AS WELL!

The Web Corner – Web Developer Checklist

It’s increasingly difficult sorting good companies from bad ones on the Internet. There are still ways to find the best, reliable web development companies. We’ve compiled this recommended checklist as a starting point. The order these are in isn’t necessarily important since ALL points are important!

Check to see if your web development company:

will ensure that YOU own your website when it’s paid for
is legitimately registered to do business within its State: NH MA ME VT
has been in business for at least 10 years
has several or more people
carries workman’s compensation on its employees
carries liability insurance
maintains a committed presence in networking groups
is accredited and has a good rating with the Better Business Bureau (https://BBB.org)
understands your community and reciprocates by referring business to you
has a phone contact where one can at least leave messages
has an email contact where one can send information
provides automatic site updates at no additional ongoing charge
backs up websites every night for at least a month
provides website encryption (SSL) at no additional ongoing charge
does not require hosting or domain contracts
does not overcharge you by selling sell inflated monthly maintenance plans
provides partial hour web work billing (9 minutes work charged 9/60 of hourly rate)
can respond to most maintenance requests in 3-4 days
has general familiarity with trademark and copyright issues
is proficient with WordPress through experience and training

Over upcoming weeks check here for details about each. Contact us with any questions, we exist to serve you!

The Web Corner – Checking Web Content

Whether face to face or on the web, there’s only one chance to make a first impression. This short checklist contains “must haves” for a website. It’s unbelievable to leave them off a website. We’ve seen web developers as well as web do-it-yourselfers not provide the following.

Phone number – You’ve lost credibility right away if there is no phone number. Many people – yes even today – understand that talking actually accomplishes more faster.

Contact email – We recommend posting an email address. Some use forms keeping email hidden. Forms are easily “spammed” making more work.

Business location – Tell visitors at least what city you’re in. Customers wanting to deal locally appreciate this.

Hours of operation – Whether you expect foot traffic or take appointments, there’s nothing worse than guessing whether you’re open or not.

Who to deal with – Let visitors know who they can deal with. Staff shrouded in anonymity don’t appear helpful.

Aesthetics – Websites should appear clear and organized. Visitors expect some things in certain places – like navigation. Make it easy find items/topics and get around the site.

Website success happens by building visitors’ confidence in your business. Providing as much information as possible will help immensely with this process. Contact your web services provider for assistance. They, just like we at CharlesWorks, should be there to help.

The Web Corner – Email Update Scam

Last week I wrote about possible dangers of “FREE” offerings.

While verbiage varies, the end result is the same if you follow their link: headaches of an unimaginable magnitude for you!

Here’s an example of many I see each day in our company emails:
____________________________________________
Dear  charles@charlesworks.com ,

Your mailbox quota is full.
This may cause your mailbox to be disabled or you may no longer be able to receive more emails

to continue using your mailbox. You will need to upgrade your mailbox quota immediately. This service is free.

 Re-update your account 

Note: Failure to update your account might lead to permanent deactivation of your account.

Thanks,
The Security team. 2019

____________________________________________

Clicking lands you on an extremely convincing page. One wanting me to enter my email login information even had “© 2018 CharlesWorks” in it.

These work based on two principles: Offering the FREE “we’ll fix it” service and threat of imminent services loss. Together they convince you to bite. Especially that sense of urgency! Remember the world isn’t going to halt if you don’t act right away – it can wait until you deal with it properly.

Companies don’t have you “verify” your email account this way. If anything seems fishy concerning your email, call your email provider and ask for assistance. That’s what you pay them for!

The Web Corner – SSL hype

Let’s broach the topic of SSL (Secure Socket Layers) and their importance on the web.

Using SSL is like sending certified mail through the post office. Mailing certified letters requires a signature by the receiver. The sender knows it got to the right place. SSL is instantaneous!

SSL is a security protocol (specified way of doing things) that helps guarantee that the browser you are typing information into is actually connecting with the website you believe you are connected to. This is extremely important when doing online banking, sharing private or personal information, or using your credit card. SSL is important regardless of the device (phone-tablet-laptop-computer) you’re using.

Besides ensuring you’re reaching the correct destination, SSL is MOST important when using devices through public WiFi (hotspots). They can be “snooped” by hackers. “Snooped” means hackers can sit in a parking lot near a place with WiFi and easily record all data communications happening. It is a hacker’s gold mine for people not security conscious.

Businesses expect to pay roughly $70-$199/year plus installation for SSL on a website. At CharlesWorks, it’s part of the hosting – with NO additional ongoing charges.

SSL is important! Feel free to contact us for more information.

The Web Corner – Email Extortions

With 20+ years in the web business, scams and schemes to steal from people still amaze me.

Several web clients have made me aware of a scam to frighten them into making a bitcoin payment.

They’re from addresses like “Anonymous Hacker” or even your own email. Subjects are “You have been hacked” or similar. They gloat they’ve infected you through some (usually unsavory) site you visited. They explain how they did it in terms most folks don’t understand – making you think they are really an expert – and frighten you into believing they’re monitoring your computer.

They threaten to send very personal items and even videos of you to everyone you know unless you comply with the demand within some short time period. They warn if you report them, they’ll distribute the “dirt” on you immediately.

We try to force these messages to spam on our servers. Sometimes they get through. We reassure several people each week they are a scam because they usually are.

However, devices DO get hacked. If you truly believe you’ve been hacked, you should see your IT person or someone who specializes in “cleaning” computers ASAP. We can recommend folks who can help.

The Web Corner – Email Etiquette

We’ve gone off the deep end attempting to communicate entirely via email. Are we saying what we mean so say?

The “Subject:” should reflect the current content – especially in replies where the original idea has changed.

To ensure questions are responded to, keep the message simple and stick to expecting one answer about one question. People generally do not answer multiple questions.

Use a courteous greeting and closing. Email does NOT have voice inflection. Words appear demanding when you USE ALL CAPITAL LETTERS or numerous exclamation points – or terse when you treat email like text messages.

Including the previous message helps recipients understand your response. Generalities cause confusion and unnecessary back and forths.

It’s polite to include a “signature” with your name, your affiliation, your phone number and perhaps your address to enable easy followup.

Attachments are not meant to blast information to many. A giant file to a huge group is wasteful and rude. Large emails over phones is frustrating.

Messages requiring immediate attention are best dealt with via phone calls. Don’t assume people check email constantly.

Check the recipients list. Replying to ALL sends to ALL recipients. It might be shared with unexpected recipients.

Be careful what your message contains!

The Web Corner – Email Security

Compromised email can be an important component of identity theft. People take much of today’s electronic communications for granted.

Think about what’s connected to your email accounts – activities like shopping and even online banking to name a couple. Hackers getting into your email can give them an open doorway into many aspects of your financial and personal life. The losses incurred through compromised email can be enormous.

Good security practices are great deterrents. Start by using strong passwords to mitigate such losses.

Wireless connections can be “sniffed”, meaning hackers can wait nearby and record the information being sent and received over the connection.

Always access your email using encryption. Encryption makes it close to impossible to decode the wireless traffic. With email clients like Outlook, Thunderbird, Apple Mail or even a mail apps on phones, make sure encryption is turned on. With webmail through web browsers be careful to access it using https:// to ensure an encrypted email server connection.

Free wireless hotspots are a haven for hackers. You are pretty safe as long as you are using encrypted connections.

If you don’t understand how to set up and use encryption, call your web hosting, email or device provider for help. Don’t risk potential losses.

The Web Corner – Spam

We get many questions about spam (Junk E-mail). Spam clutters up your email. It’s also used to deliver online scams and malware/viruses.

A common question is “Any idea of why I’m seeing spam emails in my Inbox?” Spammers most likely got your email address from your friends or acquaintances – people you know and correspond with – whose computers or phones were compromised. Their contact lists get added to the spammers lists. Spammers also get emails from when we purchase online and from finding email addresses on websites.

Spam is difficult to avoid. One way to handle it is to hit the delete key. That’s much the same as just throwing junk mail away that’s delivered by the mail carrier.

However, spam email can be filtered. The good news is that better than 98% can be filtered into a junk email folder.

One filtering problem is determining which are actually spam – Home Depot, Lowe’s, Staples or other vendors are spam to many and not spam to others. Good mail servers allow users to “mark” items as not spam in that case.

There are numerous email servers that behave in just as many ways handling spam. If spam is an issue, check with your email provider about your options for handling it.

Charles Oropallo (Charles@CharlesWorks.com) started CharlesWorks in Peterborough NH in 1998. His team does website design, hosting, search engine optimization (SEO) and related web services.

The Web Corner – Passwords

In keeping with the basics, a common issue we see at CharlesWorks involving our web clients in general has to do with passwords.

A trick to remember with passwords is to keep them simple yet complex and different enough so they aren’t easily guessed. A very good way to have a secure password is to use words or combinations of words that mean something to you but not anyone else. It’s also more secure if you use a capital letter where one would not normally be expected. Here’s an example of making a typical word into a secure word just by changing which Letters within the word are capitalized:
PeteRborOugh

Or you could go a step further by using numbers in place of some of the letters so you have both numbers and capital letters:
Pet8Rbor0ugh

To really beef up security, in this example we’ll make it 2 words separated by a hyphen or a number:
hEll064bYe

Using a couple words in this manner will pass the security requirements for many systems. You can use a couple words that you can remember and therefore don’t have to write down anywhere.

Needless to say, post-its on your monitor should be avoided. Hopefully this CharlesWorks tip will help get you away from that habit!

Charles Oropallo (Charles@CharlesWorks.com) started CharlesWorks in Peterborough NH in 1998. His team does website design, hosting, search engine optimization (SEO) and related web services.