digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

853
active users

#wankstortion

1 post1 participant0 posts today

The slime also evolves, apparently. Today nxdomain.no/~peter/wankstortio (nxdomain.no/~peter/wankstortio) inboxed, as far as I can recall the first #wankstortion message received here over #IPv6 (and likely inboxed for that reason, bypassing the IPv4 only #spamd).

See "The Despicable, No Good, Blackmail Campaign Targeting ... Imaginary Friends?" nxdomain.no/~peter/despicable_ and links therein for some background #cybercrime #scams #sextortion #bitcon #bitcoin #cryptotulips #cryptocurrency #extortion #teksavvy

Looking for something else entirely I notice there is a #wankstortion campaign in progress (~600 hosts) targeting (of course) the imaginary friends aka spamtraps, again.

Is that even worth reporting on in more detail these days?

(data accumulating in nxdomain.no/~peter/wankstortio as usual, previous reported in nxdomain.no/~peter/despicable_, MO repeating)

nxdomain.noIndex of /~peter/wankstortion/

This morning had me notice a new episode of the type described in "The Despicable, No Good, Blackmail Campaign Targeting ... Imaginary Friends?" nxdomain.no/~peter/despicable_ (or prettified, tracked bsdly.blogspot.com/2022/12/the), the first in quite a while, I might add.

Data so far to be perused at nxdomain.no/~peter/wankstortio (now refreshed & gzipped).

nxdomain.noThat grumpy BSD guy: The Despicable, No Good, Blackmail Campaign Targeting ... Imaginary Friends?

A post in my linkedin feed reminded me that when I first wrote about #wankstortion (aka #sextortion) spam back in 2019, it was a well-known and well-explored problem and we had quickly concluded that the only thing those jokers had was a list of mail addresses. And of course that list had a goodly chunk of my #spamtraps in it.

For some reason, these campaigns keep turning up. My 2022 piece nxdomain.no/~peter/despicable_ (or with trackers bsdly.blogspot.com/2022/12/the) has links to the older story too.

www.nxdomain.noThat grumpy BSD guy: The Despicable, No Good, Blackmail Campaign Targeting ... Imaginary Friends?

I just noticed

40.83.2.68 - - [05/Aug/2023:12:27:44 +0200] "GET /~peter/wankstortion/20210106_wankstortion_message73e86b03477f2%40hireassociation.co.uk_i_recorded_you_bsdly%40bsdly.net.txt HTTP/1.1" 200 6746 "-" "Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; GPTBot/1.0; +openai.com/gptbot)"

- will we see "convincing" #wankstortion coming out of #openai #gptbot? (background - bsdly.blogspot.com/2022/12/the trackerless nxdomain.no/~peter/despicable_) #sextortion #scams #spam

platform.openai.comOpenAI PlatformExplore developer resources, tutorials, API docs, and dynamic examples to get the most out of OpenAI's platform.

Even mindless scams evolve.

For the first time since january a #wankstortion spam inboxed, wankstortion/20230312_settle_your_debt_peter\@bsdly.net.txt and was added to the archive.

This time they reference a CVE for the oddest reason.

Anyway for the general case my previous writeup nxdomain.no/~peter/despicable_ still applies (bsdly.blogspot.com/2022/12/the or medium.com/coinmonks/the-despi for nicer format but trackers).

nxdomain.noThat grumpy BSD guy: The Despicable, No Good, Blackmail Campaign Targeting ... Imaginary Friends?

At the moment at least 170 hosts have been identified as sending dirty video extortion mail (aimed at my spamtraps), see the newest files in nxdomain.no/~peter/wankstortio for more detail. Might blog later, see bsdly.blogspot.com/2020/02/the or nxdomain.no/~peter/the_numbers (trackerless) about earlier attempts #sextortion #wankstortion #cybercrime #spam #scam #extortion

nxdomain.noIndex of /~peter/wankstortion/