Intimidation tactics in sextortion scams are evolving with the use of Google Maps images.

How to outsmart a scammer

Intimidation tactics in sextortion scams are evolving with the use of Google Maps images.
Intimidation tactics in sextortion scams are evolving with the use of Google Maps images.

Scammers frequently use fear to trick you out of your money. Regardless of the scam, whether it's a Microsoft phone call or a government impersonation, they all try to scare you by stating that something is seriously wrong with you or your devices and that only they can fix it. The latest sextortion scams targeting many in the U.S. are no different.

The scammers now include images of your home in their threats, in addition to compromising photos or videos of you in private situations, and demand money to delete them.

Many individuals have shared via email how they were targeted by scammers. The following is a detailed analysis of the evolved sextortion scam and advice on how to safeguard yourself.

Sextortion scams evolve with Google Maps images to intimidate victims
Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)

How the scam works

When you receive an email from a scammer stating that they have recorded you while you were viewing adult content, they use your name and a photo of your house or a nearby street to make it appear authentic.

The spyware "Pegasus," developed by NSO Group and sold exclusively to government agencies and law enforcement, has allegedly been installed on your phone by a scammer, giving them access to everything you watch.

The cost of the item is extremely high, and it is unlikely that a scammer would have access to it. Even if they did, it wouldn't be worth their time to stalk people watching adult content. Additionally, if they have installed spyware on your phone, they won't need to ask you for money.

The scammer threatens to expose embarrassing footage if the victim does not pay them in Bitcoin through a cryptocurrency wallet. One victim's email stated a ransom of approximately $2,000.

The victim received an email with a portion of the text, which I have blurred out to protect their identity, but you can still view it.

Sextortion scams evolve with Google Maps images to intimidate victims
Actual sextortion scam email (Kurt "CyberGuy" Knutsson)

How do scammers know your location?

Your home's image may appear authentic, but it's likely a scam. One possible reason for this is a data breach. Your address may have been leaked and is now on the dark web. Scammers could have obtained your address through a breach and used Google Maps to find a picture of your house. Alternatively, you may have shared your address publicly through an online listing, such as a rental or sale ad, and scammers found it that way.

Sextortion scams evolve with Google Maps images to intimidate victims
Google Maps vehicle that captures images (Kurt "CyberGuy" Knutsson)

Protect your privacy: Blur your house on Google Maps

To prevent scammers from fearmongering using Google Maps, you can blur your house's image on the platform. However, this feature is only available on a computer and not in the Google Maps app on iOS or Android. Follow these steps to learn how to blur your house's image on Google Maps.

  • Search for your home address on Google Maps by typing it into the search bar located in the top-right corner.
  • Click on the photo of your house that shows up.
  • You can view a Street View image of your location by clicking on the "Report a Problem" button in the bottom-right corner.
  • Using your mouse, adjust the view so that your home and any other desired elements are inside the red and black box.
  • Select the option to blur your home from the choices given.
  • If Google deems it necessary, they will blur your house.
Sextortion scams evolve with Google Maps images to intimidate victims
Google Map-blurred home (Kurt "CyberGuy" Knutsson)

4 additional steps to stay protected from sextortion scams

To further safeguard yourself from sextortion scams, consider taking these four additional steps:

Exercise caution when disclosing personal information: Be careful not to reveal sensitive details such as your address or phone number online. Be aware of the content you publish on social media and other platforms.

Be cautious of scammers: While they may appear to be legitimate, many are actually lying. For example, the Pegasus software they claim to use is not real. Stay up-to-date on common scams and how they operate. By being aware of what to watch out for, you can identify and avoid potential threats.

3) Ensure that you no longer use the password provided in the email and update it immediately on another device, such as your laptop or desktop, for all important accounts, including email, banking, and social media.

To ensure your privacy, avoid using the same device to set up a new password. Instead, use a different device and create a strong and unique password that is difficult to guess or crack. You can also use a password manager to securely generate and store your passwords. Changing passwords regularly is essential for maintaining good cybersecurity hygiene, even if you haven't experienced a data breach.

Consider investing in services that specialize in removing your personal information from online databases and websites.

Scammers may have obtained your address through a data breach. A data removal service can assist in removing all personal information from the internet. Check out my top recommendations for data removal services.

Kurt’s key takeaway

Scammers exploit fear and deception to trick you into giving away your money. To avoid falling victim, learn about sextortion scams and what to watch out for. Most scammers are bluffing and rely on exploiting your fears. Keep your personal information safe, be careful about what you share online, and always verify the legitimacy of any threatening messages. If you encounter a scam, report it and take steps to secure your accounts and devices.

Have you ever experienced a similar scam or any other type of scam? Please share how you handled it by writing to Cyberguy.com/Contact.

To receive my tech tips and security alerts, sign up for my free CyberGuy Report Newsletter at Cyberguy.com/Newsletter.

Let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

by Kurt Knutsson, CyberGuy Report

tech

A revolutionary device may enable you to identify microplastics in your beverages.

A revolutionary device may enable you to identify microplastics in your beverages.

tech
Become a proficient user of Google Workspace and Microsoft Office.

Become a proficient user of Google Workspace and Microsoft Office.

tech
Nearly 300,000 customers' information was exposed in the Avis Rent A Car cyberattack.

Nearly 300,000 customers' information was exposed in the Avis Rent A Car cyberattack.

tech
Human window washers on skyscrapers are being replaced by robots.

Human window washers on skyscrapers are being replaced by robots.

tech
A poll has shown that most Americans do not trust information about elections that is generated by artificial intelligence.

A poll has shown that most Americans do not trust information about elections that is generated by artificial intelligence.

tech
How to safeguard your baby monitor from hackers?

How to safeguard your baby monitor from hackers?

tech
The origin of the bizarre "hello" text messages.

The origin of the bizarre "hello" text messages.

tech
Over 900,000 Medicare beneficiaries are at risk of data breach.

Over 900,000 Medicare beneficiaries are at risk of data breach.

tech
Humans can teach robots to sense human touch without the need for artificial skin.

Humans can teach robots to sense human touch without the need for artificial skin.

tech
Apple's daring advancement in AI technology: The release of the iPhone 16, AirPods, and watches.

Apple's daring advancement in AI technology: The release of the iPhone 16, AirPods, and watches.

tech
Conduct a 5-minute phone privacy audit to prevent spying.

Conduct a 5-minute phone privacy audit to prevent spying.

tech
Scams and people search sites: a dangerous intersection

Scams and people search sites: a dangerous intersection

tech
Reach your destination effortlessly with this advanced self-driving sleep pod.

Reach your destination effortlessly with this advanced self-driving sleep pod.

tech
US political campaigns face increased digital attacks from Iranian hackers.

US political campaigns face increased digital attacks from Iranian hackers.

tech
A Chinese robo-helper can perform a variety of tasks, including cleaning, cooking, and even shooting hoops.

A Chinese robo-helper can perform a variety of tasks, including cleaning, cooking, and even shooting hoops.

tech
Four effective strategies for reducing expenses.

Four effective strategies for reducing expenses.

tech