Discussion:
[GTALUG] blackmail
D. Hugh Redelmeier via talk
2018-08-04 04:47:09 UTC
Permalink
I received a blackmail message by email. It claimed that they hacked my
system and had compromising videos from my computer's camera.

As proof, they gave me what they claimed was my password. But I only used
that password on two sites: canadacomputers.com and
xpresscanada.com (a long-dead Canada Computers site).

So I'm not worried.

I informed CC about three weeks ago. They seemed to ignore the
report. I phoned again two weeks ago, and they were interested. I
told them if I didn't hear that they'd informed their customers that
I'd publicize this security breach.

I've heard nothing else. So I presume that they have not announced it
to their customers.

Today I got another blackmail message with the same password.

What do you think that I should do?

PS: my password is a random string generated by mkpasswd(1) so it would
not have been discovered by an online exhaustive search. They most likely
filched the password file from CC.

PPS: I'm glad that I don't reuse passwords!
---
Talk Mailing List
talk
ac via talk
2018-08-04 05:55:42 UTC
Permalink
have you configured pyzor, etc AND 'scoring' in your spamassassin?

essentially : Spam is dead. (So, you do not have to receive these
'blackmail' emails)

For scoring : I use superblock.ascams.com - at 5.5
(If you are listed here you are sending spam, phish, virus, spyware)
Then I use bl.spamcopnet also at 5.5
(If you are listed here you are sending spam)
And I use the barracuda lists at 3.3
I also use block.ascams.com and at 3.0 (sometimes 3.5)
(this has all the spammy social media and spam mailing lists)

Then I drop anything over 12 (sometimes 13, sometimes 14 - depending
if the Internet is angry or not so angry)

Email servers with a good reputation - sails through - email servers
with a poor reputation is marked as spam (anything over say 6 and
anything over 12-14 is auto bounced

For individual business domains, drop is sometimes set to 6 or 7 - so
these accounts literally see no spam ever - for the legit emails that
are blocked - the sending server is usually placed under pressure to
'clean up' their reputation... - and if they are not - they lose clients :)

hth

Andre

On Sat, 4 Aug 2018 00:47:09 -0400 (EDT)
Post by D. Hugh Redelmeier via talk
I received a blackmail message by email. It claimed that they hacked
my system and had compromising videos from my computer's camera.
As proof, they gave me what they claimed was my password. But I only
used that password on two sites: canadacomputers.com and
xpresscanada.com (a long-dead Canada Computers site).
So I'm not worried.
I informed CC about three weeks ago. They seemed to ignore the
report. I phoned again two weeks ago, and they were interested. I
told them if I didn't hear that they'd informed their customers that
I'd publicize this security breach.
I've heard nothing else. So I presume that they have not announced it
to their customers.
Today I got another blackmail message with the same password.
What do you think that I should do?
PS: my password is a random string generated by mkpasswd(1) so it
would not have been discovered by an online exhaustive search. They
most likely filched the password file from CC.
PPS: I'm glad that I don't reuse passwords!
---
Talk Mailing List
https://gtalug.org/mailman/listinfo/talk
---
Talk Mailing List
***@gtalug.org
https://gtalug.org/ma
Giles Orr via talk
2018-08-04 12:10:32 UTC
Permalink
Post by D. Hugh Redelmeier via talk
I received a blackmail message by email. It claimed that they hacked my
system and had compromising videos from my computer's camera.
As proof, they gave me what they claimed was my password. But I only used
that password on two sites: canadacomputers.com and
xpresscanada.com (a long-dead Canada Computers site).
So I'm not worried.
I informed CC about three weeks ago. They seemed to ignore the
report. I phoned again two weeks ago, and they were interested. I
told them if I didn't hear that they'd informed their customers that
I'd publicize this security breach.
I've heard nothing else. So I presume that they have not announced it
to their customers.
Today I got another blackmail message with the same password.
What do you think that I should do?
PS: my password is a random string generated by mkpasswd(1) so it would
not have been discovered by an online exhaustive search. They most likely
filched the password file from CC.
PPS: I'm glad that I don't reuse passwords!
Someone at work got a similar email claiming that the emailer had
compromising video footage (it was a work account - no cams and very
improbable anyway). It demanded bitcoin and gave a hash to deliver it to.
But it didn't show a password, so yours is a somewhat nastier and more
effective variant. Ours claimed to have footage of the person's
"senescence." OMG - you caught me aging?! (Okay, not quite what it means.)

As for the password thing ... I really haven't figured out what best
practice is on time between notification-of-breach to public reveal. (I
went after the Science Centre about their use of SSL2 on their website -
where they take people's credit cards - so I have had a peripherally
related experience with problem/notification/reveal
https://www.gilesorr.com/blog/science-centre-ssl.html ). I'd say a month?
But I'd probably start the clock from your three weeks ago email. Although
if you didn't tell them _when_ you were going to reveal, that's not totally
fair. But it's also weighed against the public damage that's arguably
being caused by these emails.

The Canada Computers password database breach could have been years ago.
But if it was, did they make that known? Did they even know? <sigh>

P.S. And I'm glad I've never purchased from their website, only their
stores.
--
Giles
https://www.gilesorr.com/
***@gmail.com
Mauro Souza via talk
2018-08-04 12:27:46 UTC
Permalink
Don't worry about this kind of email. It's a know scam.

It's very easy to get hand of a stolen password database, and as most
people only have one or two passwords, claim you hacked them and have
compromising info. But they don't have, don't worry.
Post by D. Hugh Redelmeier via talk
I received a blackmail message by email. It claimed that they hacked my
system and had compromising videos from my computer's camera.
As proof, they gave me what they claimed was my password. But I only used
that password on two sites: canadacomputers.com and
xpresscanada.com (a long-dead Canada Computers site).
So I'm not worried.
I informed CC about three weeks ago. They seemed to ignore the
report. I phoned again two weeks ago, and they were interested. I
told them if I didn't hear that they'd informed their customers that
I'd publicize this security breach.
I've heard nothing else. So I presume that they have not announced it
to their customers.
Today I got another blackmail message with the same password.
What do you think that I should do?
PS: my password is a random string generated by mkpasswd(1) so it would
not have been discovered by an online exhaustive search. They most likely
filched the password file from CC.
PPS: I'm glad that I don't reuse passwords!
Someone at work got a similar email claiming that the emailer had
compromising video footage (it was a work account - no cams and very
improbable anyway). It demanded bitcoin and gave a hash to deliver it to.
But it didn't show a password, so yours is a somewhat nastier and more
effective variant. Ours claimed to have footage of the person's
"senescence." OMG - you caught me aging?! (Okay, not quite what it means.)

As for the password thing ... I really haven't figured out what best
practice is on time between notification-of-breach to public reveal. (I
went after the Science Centre about their use of SSL2 on their website -
where they take people's credit cards - so I have had a peripherally
related experience with problem/notification/reveal
https://www.gilesorr.com/blog/science-centre-ssl.html ). I'd say a month?
But I'd probably start the clock from your three weeks ago email. Although
if you didn't tell them _when_ you were going to reveal, that's not totally
fair. But it's also weighed against the public damage that's arguably
being caused by these emails.

The Canada Computers password database breach could have been years ago.
But if it was, did they make that known? Did they even know? <sigh>

P.S. And I'm glad I've never purchased from their website, only their
stores.
--
Giles
https://www.gilesorr.com/
***@gmail.com
D. Hugh Redelmeier via talk
2018-08-04 13:24:04 UTC
Permalink
| From: Mauro Souza via talk <***@gtalug.org>

| Don't worry about this kind of email. It's a know scam.

The email proves that my password is in the wild. In no way does that
prove it won't be used in other ways.

As I said, I wasn't worried for my own security (except as regards
my Canada Computer account). I did change my CC password and checked
for scary activity on that account. (Come to think of it, I didn't
check if "I" left spammy comments or reviews on their site.

I'm worried for all other Canada Computer account holders, some of whom
are less careful about reusing passwords.

I'm worried that Canada Computer is not acting responsibly when informed
of a security problem.
---
Talk Mailing List
***@gtalug.org
https
Mauro Souza via talk
2018-08-04 14:06:46 UTC
Permalink
I had one of my passwords compromised from some random service six years
ago, and since that I use a password manager. Every account I own (the ones
I remember, BTW) have unique, random and very long passwords (70 chars or
more). So if one leaks, I just change one.

No matter what password manager you use (I have Enpass), you will have
almost unbreakable passwords. And subscribe to Have I Been Pwned (something
like that), so you are informed when the password or hash you have is seen
somewhere.
Post by D. Hugh Redelmeier via talk
| Don't worry about this kind of email. It's a know scam.
The email proves that my password is in the wild. In no way does that
prove it won't be used in other ways.
As I said, I wasn't worried for my own security (except as regards
my Canada Computer account). I did change my CC password and checked
for scary activity on that account. (Come to think of it, I didn't
check if "I" left spammy comments or reviews on their site.
I'm worried for all other Canada Computer account holders, some of whom
are less careful about reusing passwords.
I'm worried that Canada Computer is not acting responsibly when informed
of a security problem.
---
Talk Mailing List
https://gtalug.org/mailman/listinfo/talk
Karen Lewellen via talk
2018-08-04 16:42:32 UTC
Permalink
Hope this helps you feel better, or gives you a giggle.
I got the same e-mail, referencing an old password. Likewise the claim
that they have video footage from my computer cameras save that I do not
have computer cameras, and I use dos, and I experience blindness so unless
that adult site they claim I visited came with audio descriptions...well.
I promised to pay them after they shared my story with the New York Times.
Kare
Post by Mauro Souza via talk
Don't worry about this kind of email. It's a know scam.
It's very easy to get hand of a stolen password database, and as most
people only have one or two passwords, claim you hacked them and have
compromising info. But they don't have, don't worry.
Post by D. Hugh Redelmeier via talk
I received a blackmail message by email. It claimed that they hacked my
system and had compromising videos from my computer's camera.
As proof, they gave me what they claimed was my password. But I only used
that password on two sites: canadacomputers.com and
xpresscanada.com (a long-dead Canada Computers site).
So I'm not worried.
I informed CC about three weeks ago. They seemed to ignore the
report. I phoned again two weeks ago, and they were interested. I
told them if I didn't hear that they'd informed their customers that
I'd publicize this security breach.
I've heard nothing else. So I presume that they have not announced it
to their customers.
Today I got another blackmail message with the same password.
What do you think that I should do?
PS: my password is a random string generated by mkpasswd(1) so it would
not have been discovered by an online exhaustive search. They most likely
filched the password file from CC.
PPS: I'm glad that I don't reuse passwords!
Someone at work got a similar email claiming that the emailer had
compromising video footage (it was a work account - no cams and very
improbable anyway). It demanded bitcoin and gave a hash to deliver it to.
But it didn't show a password, so yours is a somewhat nastier and more
effective variant. Ours claimed to have footage of the person's
"senescence." OMG - you caught me aging?! (Okay, not quite what it means.)
As for the password thing ... I really haven't figured out what best
practice is on time between notification-of-breach to public reveal. (I
went after the Science Centre about their use of SSL2 on their website -
where they take people's credit cards - so I have had a peripherally
related experience with problem/notification/reveal
https://www.gilesorr.com/blog/science-centre-ssl.html ). I'd say a month?
But I'd probably start the clock from your three weeks ago email. Although
if you didn't tell them _when_ you were going to reveal, that's not totally
fair. But it's also weighed against the public damage that's arguably
being caused by these emails.
The Canada Computers password database breach could have been years ago.
But if it was, did they make that known? Did they even know? <sigh>
P.S. And I'm glad I've never purchased from their website, only their
stores.
--
Giles
https://www.gilesorr.com/
---
Talk Mailing List
https://gtalug.org/mailman/listinfo/talk
---
Talk Mailing List
***@gtalug.org
https://g
D. Hugh Redelmeier via talk
2018-08-04 14:10:33 UTC
Permalink
| From: Giles Orr via talk <***@gtalug.org>

| Someone at work got a similar email claiming that the emailer had
| compromising video footage (it was a work account - no cams and very
| improbable anyway). It demanded bitcoin and gave a hash to deliver it to.

Same.

| But it didn't show a password, so yours is a somewhat nastier and more
| effective variant.

Yes. The password was even in the Subject. That would probably get
the attention of most people. It didn't work in my case because my
passwords look like line noise and are not well-known to me. Imagine
if your password were, say, your first pet's name.

| Ours claimed to have footage of the person's
| "senescence." OMG - you caught me aging?! (Okay, not quite what it means.)

Some of the delights of spam are the pretentious language fails. (I
know, "people in glass houses...".)

| As for the password thing ... I really haven't figured out what best
| practice is on time between notification-of-breach to public reveal. (I
| went after the Science Centre about their use of SSL2 on their website -
| where they take people's credit cards - so I have had a peripherally
| related experience with problem/notification/reveal
| https://www.gilesorr.com/blog/science-centre-ssl.html ).

I read that previously. It added to my general sense of despair.
Often when you mention your blog it prompts me to binge read it to
catch up. Thanks!

(I recommend that TLUGers have a look at Giles' blog and not just
this one entry.)

| I'd say a month?
| But I'd probably start the clock from your three weeks ago email. Although
| if you didn't tell them _when_ you were going to reveal, that's not totally
| fair. But it's also weighed against the public damage that's arguably
| being caused by these emails.

Both times that I talked to Canada Computers, I told them that if I
didn't get a response within a week, that I would consider other
avenues of disclosure. I did not say that the response had to be
their ultimate reaction to the breach, just that I needed some
response.

My email to TLUG is clearly a disclosure. I posted it two weeks after
I talked with a technical person at CC. I realized that my earlier
discussion with a Customer Service Rep might not get through, which is
why I phoned again instead of publicly disclosing. BTW, the CSR had
mentioned that she had received a similar call before.

I imagine that mailing the TLUG list is not the most appropriate
disclosure. I was hoping for suggestions for additional disclosure.

| The Canada Computers password database breach could have been years ago.
| But if it was, did they make that known? Did they even know? <sigh>

Exactly.

That's why I mentioned xpresscanada.com even though that site died
many years ago.

| P.S. And I'm glad I've never purchased from their website, only their
| stores.

How retailers handled web sites has changed a lot in the many years
that CC has had a web site. Perhaps their security is better now.
Perhaps not.
---
Talk Mailing List
t
D. Hugh Redelmeier via talk
2018-08-04 13:14:38 UTC
Permalink
| From: ac via talk <***@gtalug.org>

| essentially : Spam is dead. (So, you do not have to receive these
| 'blackmail' emails)

Thanks for the hints on spam.

This particular email contained valuable information: that Canada
Computers had been hacked. So I'm glad that it got through to me. I
don't want it filtered out.
ac via talk
2018-08-04 13:50:25 UTC
Permalink
On Sat, 4 Aug 2018 09:14:38 -0400 (EDT)
Post by D. Hugh Redelmeier via talk
| essentially : Spam is dead. (So, you do not have to receive these
| 'blackmail' emails)
Thanks for the hints on spam.
This particular email contained valuable information: that Canada
Computers had been hacked. So I'm glad that it got through to me. I
don't want it filtered out.
no, not really. by the time you receive the type of email you have, it is way too late.

The email you received is from a bulk mailer and the syndicates already
know that the information that they have your password is only of importance
to be used to scare you into paying.

Cyber crime is a business. It has costs, risks, returns and
information/data is all important. The only time you will receive your
password as part of a ransom email is when there is no value left in
the data itself.

So, it is in fact pointless, useless and wasteful spam.

That you think your blackmail email contained valuable data is funny :)

How sure are you that it was Canada Computers? Are you saying that that
was the only place you used that password? And, is it a current
password (dollars to donuts says: no...) and with Google hacked, Yahoo
hacked, Microsoft hacked, it matters very little anyway... Change your
passwords every 30 days (or less) and never use the same password
twice (or even anywhere else) - If they sent me my google/yahoo/etc
password - I would even be able to tell you from which week it came :)

hth

Andre

---
Talk Mailing List
***@gtalug.org
D. Hugh Redelmeier via talk
2018-08-04 14:25:29 UTC
Permalink
| From: ac via talk <***@gtalug.org>

| no, not really. by the time you receive the type of email you have, it is way too late.

Probably. But the information that a site was hacked should still be
useful to the site.

| How sure are you that it was Canada Computers? Are you saying that that
| was the only place you used that password?

Yes. (I said that in my original posting.)

| And, is it a current
| password (dollars to donuts says: no...)

It was. No longer.

| and with Google hacked, Yahoo
| hacked, Microsoft hacked, it matters very little anyway... Change your
| passwords every 30 days (or less)

I find that too much bother. Experts have waffled on this policy.

| and never use the same password
| twice (or even anywhere else) - If they sent me my google/yahoo/etc
| password - I would even be able to tell you from which week it came :)

For real security, use something other than passwords. But that
doesn't seem to be in place for most sites.

Single-sign-on makes multi-factor authentication more feasible. I don't
trust the monopoly power of single-sign-on providers. And I don't
trust the resulting "one compromise to rule them all" ecosystem. And
I'm not attached at the hip to a mobile phone (SMS is the usual second
factor for consumers).

I can imagine that client certificates for TLS could help, and I
assume that the TLS supports this feature. But I don't know that
any important sites expoit them. And the certificate hierarchy
provides for monopoly abuse.
---
Talk Mailing List
***@gtalug.org
D. Hugh Redelmeier via talk
2018-08-06 20:07:23 UTC
Permalink
| From: D. Hugh Redelmeier via talk <***@gtalug.org>

| Single-sign-on makes multi-factor authentication more feasible. I don't
| trust the monopoly power of single-sign-on providers. And I don't
| trust the resulting "one compromise to rule them all" ecosystem. And
| I'm not attached at the hip to a mobile phone (SMS is the usual second
| factor for consumers).

reddit got compromised when their second factor was carried by SMS:

<https://arstechnica.com/information-technology/2018/08/password-breach-teaches-reddit-that-yes-phone-based-2fa-is-that-bad/>
---
Talk Mailing List
***@gtalug.org
https://gtalug.org/mailm

Stephen via talk
2018-08-04 15:07:10 UTC
Permalink
Post by D. Hugh Redelmeier via talk
I received a blackmail message by email. It claimed that they hacked my
system and had compromising videos from my computer's camera.
As proof, they gave me what they claimed was my password. But I only used
that password on two sites: canadacomputers.com and
xpresscanada.com (a long-dead Canada Computers site).
Is it not terrible practise to store unencrypted passwords on a web site?
--
Stephen
---
Talk Mailing List
***@gtalug.org
Kevin Cozens via talk
2018-08-04 15:36:32 UTC
Permalink
Post by Stephen via talk
Is it not terrible practise to store unencrypted passwords on a web site?
It is terrible practice and no one should ever do that in this day and age.
Unfortunately there are still some publically accessible sites that do it.
--
Cheers!

Kevin.

http://www.ve3syb.ca/ | "Nerds make the shiny things that
https://www.patreon.com/KevinCozens | distract the mouth-breathers, and
| that's why we're powerful"
Owner of Elecraft K2 #2172 |
#include <disclaimer/favourite> | --Chris Hardwick
---
Talk Mailing List
***@gtalug.org
https://gtalug.org/mailman/listi
D. Hugh Redelmeier via talk
2018-08-04 16:59:57 UTC
Permalink
| From: Stephen via talk <***@gtalug.org>

| Is it not terrible practise to store unencrypted passwords on a web site?

Yes.

But even if you hash them (best practice) with a slow hash function
(best practice but not as common as one would hope) with salt (also
best practice), they may well be crackable off-line using GPUs and
rainbow tables.

Most peoples' passwords area easy to brute force. I would have
thought mine was a bit tough.
---
Talk Mailing List
***@gtalug.org
https://gtalug.org/mailman/listinf
William Park via talk
2018-08-04 20:41:28 UTC
Permalink
Post by D. Hugh Redelmeier via talk
PS: my password is a random string generated by mkpasswd(1) so it would
not have been discovered by an online exhaustive search. They most likely
filched the password file from CC.
For non-essential sites, I use "secret password" that I can remember,
plus the "site name" which I can also remember. So far, no blackmail.
--
William Park <***@yahoo.ca>
---
Talk Mailing List
***@gtalug.org
https://gtalug.org/mailman
Michael Galea via talk
2018-08-05 17:23:48 UTC
Permalink
Post by D. Hugh Redelmeier via talk
I received a blackmail message by email. It claimed that they hacked my
system and had compromising videos from my computer's camera.
As proof, they gave me what they claimed was my password. But I only used
that password on two sites: canadacomputers.com and
xpresscanada.com (a long-dead Canada Computers site).
So I'm not worried.
I informed CC about three weeks ago. They seemed to ignore the
report. I phoned again two weeks ago, and they were interested. I
told them if I didn't hear that they'd informed their customers that
I'd publicize this security breach.
I've heard nothing else. So I presume that they have not announced it
to their customers.
Today I got another blackmail message with the same password.
What do you think that I should do?
PS: my password is a random string generated by mkpasswd(1) so it would
not have been discovered by an online exhaustive search. They most likely
filched the password file from CC.
PPS: I'm glad that I don't reuse passwords!
---
Talk Mailing List
https://gtalug.org/mailman/listinfo/talk
I also received such an email, which was amusing because my desktop
doesn't have a camera.. so I ignored it.

I gpg encrypt my master password file. If any of the systems that have a
copy (and I do keep copies) were stolen, I can be assured that my
passwords are still private.

In addition to the passwords, I store a few dozen lines of random
characters, from which I draw new passwords from.

My default template for a passwords entry is:
<entry Name_Of_Entry>
user =
password =
url =
</entry>
which makes cut n paste of desktop convenient.

My workflow is to use a bash script to accept the master password and
use it to decrypt the gpg file to a random temp file, and then launch
vim on it. When vim terminates I check the temp file and re-gpg it if it
has changed.

I am aware that I am vulnerable for the time that I am reading a
password from the file.

I have my wife follow my the same procedure on win10 desktop with an
openoffice encrypted file (oo also uses strong encryption).
My wife was a big password re-user, but clicking on a desktop icon to
open a odt file to get her old/new password info is within her
capabilities.
--
Michael Galea
Loading...