{"id":1041,"date":"2026-04-26T21:21:43","date_gmt":"2026-04-26T19:21:43","guid":{"rendered":"https:\/\/www.docsnet.it\/?p=1041"},"modified":"2026-04-26T21:21:48","modified_gmt":"2026-04-26T19:21:48","slug":"vecchia-ma-efficace-lestorsione-via-email-sextortion-scareware-che-chiede-pagamento-in-criptovalute","status":"publish","type":"post","link":"https:\/\/www.docsnet.it\/index.php\/vecchia-ma-efficace-lestorsione-via-email-sextortion-scareware-che-chiede-pagamento-in-criptovalute\/","title":{"rendered":"Vecchia ma efficace: l\u2019estorsione via email (sextortion\/scareware) che chiede pagamento in criptovalute"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Introduzione<\/h2>\n\n\n\n<p>Questo tipo di truffa \u2014 un\u2019email che minaccia di esporre video o immagini compromettenti a meno che non venga pagata una somma in criptovalute \u2014 circola da quasi un decennio e continua a ingannare molte persone. Il messaggio che riceve il destinatario \u00e8 studiato per creare panico, senso di vergogna e urgenza, spingendo alla reazione impulsiva. Di seguito spiego come funziona lo schema, perch\u00e9 rimane efficace, come riconoscerlo e cosa fare concretamente se lo si riceve.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Come funziona lo schema<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Invio\u00a0massivo:\u00a0i\u00a0truffatori\u00a0inviano\u00a0milioni\u00a0di\u00a0email\u00a0generiche\u00a0a\u00a0indirizzi\u00a0raccolti\u00a0da\u00a0database,\u00a0fughe\u00a0di\u00a0dati\u00a0e\u00a0tecniche\u00a0di\u00a0scraping.<\/li>\n\n\n\n<li>Tecnica\u00a0del\u00a0ricatto:\u00a0la\u00a0mail\u00a0afferma\u00a0di\u00a0avere\u00a0registrazioni\u00a0compromettenti\u00a0(video\/immagini)\u00a0ottenute\u00a0tramite\u00a0malware,\u00a0webcam\u00a0o\u00a0contenuti\u00a0trovati\u00a0online.<\/li>\n\n\n\n<li>Prova\u00a0apparente:\u00a0spesso\u00a0includono\u00a0una\u00a0password\u00a0reale\u00a0del\u00a0destinatario\u00a0(presa\u00a0da\u00a0una\u00a0vecchia\u00a0violazione\u00a0di\u00a0dati)\u00a0per\u00a0aumentare\u00a0la\u00a0credibilit\u00e0.<\/li>\n\n\n\n<li>Richiesta\u00a0di\u00a0pagamento\u00a0in\u00a0criptovaluta:\u00a0chiedono\u00a0un\u00a0trasferimento\u00a0rapido\u00a0in\u00a0Bitcoin\u00a0o\u00a0altra\u00a0criptovaluta,\u00a0accompagnato\u00a0da\u00a0un\u00a0conto\u00a0alla\u00a0rovescia\u00a0o\u00a0da\u00a0minacce\u00a0di\u00a0invio\u00a0ai\u00a0contatti.<\/li>\n\n\n\n<li>Scarso\u00a0dettaglio\u00a0tecnico:\u00a0nonostante\u00a0le\u00a0affermazioni,\u00a0quasi\u00a0sempre\u00a0non\u00a0esiste\u00a0alcun\u00a0materiale\u00a0compromettente\u00a0effettivamente\u00a0collegato\u00a0alla\u00a0vittima.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Perch\u00e9 questa truffa funziona da anni<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paura\u00a0e\u00a0vergogna:\u00a0il\u00a0timore\u00a0della\u00a0diffamazione\u00a0spinge\u00a0molte\u00a0vittime\u00a0a\u00a0pagare\u00a0senza\u00a0verificare.<\/li>\n\n\n\n<li>Uso\u00a0di\u00a0password\u00a0reali:\u00a0includere\u00a0credenziali\u00a0(spesso\u00a0datate)\u00a0crea\u00a0l\u2019illusione\u00a0che\u00a0l\u2019hacker\u00a0abbia\u00a0avuto\u00a0accesso\u00a0diretto.<\/li>\n\n\n\n<li>Anonimato\u00a0delle\u00a0criptovalute:\u00a0i\u00a0pagamenti\u00a0in\u00a0Bitcoin\u00a0sembrano\u00a0irreversibili\u00a0e\u00a0difficili\u00a0da\u00a0tracciare,\u00a0scoraggiando\u00a0le\u00a0vittime\u00a0dal\u00a0cercare\u00a0aiuto.<\/li>\n\n\n\n<li>Bassa\u00a0barriera\u00a0operativa:\u00a0gli\u00a0schemi\u00a0sono\u00a0automatizzati\u00a0e\u00a0a\u00a0basso\u00a0costo\u00a0per\u00a0i\u00a0truffatori,\u00a0che\u00a0inviano\u00a0milioni\u00a0di\u00a0messaggi\u00a0per\u00a0ottenere\u00a0poche\u00a0vittime.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Segnali che indicano una truffa e non un vero compromesso<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Password\u00a0\u201cprovante\u201d\u00a0proviene\u00a0da\u00a0una\u00a0vecchia\u00a0fuga\u00a0di\u00a0dati:\u00a0puoi\u00a0verificarla\u00a0su\u00a0siti\u00a0che\u00a0archiviano\u00a0breach\u00a0(non\u00a0inserire\u00a0mai\u00a0la\u00a0password,\u00a0usa\u00a0servizi\u00a0che\u00a0permettono\u00a0il\u00a0controllo\u00a0in\u00a0modo\u00a0sicuro).<\/li>\n\n\n\n<li>Mancanza\u00a0di\u00a0dettagli:\u00a0l\u2019email\u00a0non\u00a0include\u00a0specifiche\u00a0sul\u00a0tempo,\u00a0luogo\u00a0o\u00a0contenuto\u00a0del\u00a0presunto\u00a0materiale.<\/li>\n\n\n\n<li>Nessuna\u00a0prova\u00a0visiva:\u00a0il\u00a0truffatore\u00a0non\u00a0allega\u00a0clip\u00a0o\u00a0immagini\u00a0ma\u00a0minaccia\u00a0di\u00a0farlo.<\/li>\n\n\n\n<li>Linguaggio\u00a0generico\u00a0e\u00a0errori\u00a0stilistici:\u00a0frasi\u00a0allarmistiche\u00a0ma\u00a0vaghe\u00a0e\u00a0spesso\u00a0con\u00a0errori.<\/li>\n\n\n\n<li>Richiesta\u00a0di\u00a0pagamento\u00a0in\u00a0criptovalute\u00a0e\u00a0urgenza\u00a0temporale:\u00a0tipico\u00a0marchio\u00a0di\u00a0fabbrica.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Cosa fare immediatamente (passi pratici e ordinati)<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Non\u00a0pagare.\u00a0Il\u00a0pagamento\u00a0non\u00a0garantisce\u00a0nulla\u00a0e\u00a0incoraggia\u00a0ulteriori\u00a0ricatti.<\/li>\n\n\n\n<li>Non\u00a0rispondere\u00a0all\u2019email.\u00a0Eviterai\u00a0di\u00a0verificare\u00a0al\u00a0mittente\u00a0che\u00a0l\u2019indirizzo\u00a0sia\u00a0attivo.<\/li>\n\n\n\n<li>Convalida\u00a0la\u00a0fonte\u00a0della\u00a0password:\u00a0se\u00a0l\u2019email\u00a0contiene\u00a0una\u00a0tua\u00a0vecchia\u00a0password,\u00a0cambiala\u00a0subito\u00a0su\u00a0tutti\u00a0i\u00a0servizi\u00a0dove\u00a0la\u00a0usavi.<\/li>\n\n\n\n<li>Abilita\u00a0l\u2019autenticazione\u00a0a\u00a0due\u00a0fattori\u00a0(2FA)\u00a0per\u00a0account\u00a0importanti\u00a0(email,\u00a0banche,\u00a0social).<\/li>\n\n\n\n<li>Esegui\u00a0una\u00a0scansione\u00a0antivirus\/antimalware\u00a0sui\u00a0tuoi\u00a0dispositivi\u00a0e\u00a0aggiorna\u00a0sistema\u00a0operativo\u00a0e\u00a0app.<\/li>\n\n\n\n<li>Modifica\u00a0le\u00a0password\u00a0con\u00a0un\u00a0gestore\u00a0password\u00a0e\u00a0usa\u00a0password\u00a0uniche\u00a0per\u00a0ogni\u00a0servizio.<\/li>\n\n\n\n<li>Se\u00a0temi\u00a0un\u00a0accesso\u00a0alla\u00a0webcam:\u00a0copri\u00a0la\u00a0camera\u00a0fisicamente\u00a0finch\u00e9\u00a0non\u00a0sei\u00a0certo\u00a0della\u00a0sicurezza\u00a0del\u00a0dispositivo.<\/li>\n\n\n\n<li>Segnala\u00a0l\u2019email\u00a0al\u00a0tuo\u00a0provider\u00a0di\u00a0posta\u00a0come\u00a0phishing\u00a0e\u00a0al\u00a0servizio\/azienda\u00a0fittizia\u00a0citata\u00a0(es.,\u00a0se\u00a0dicono\u00a0di\u00a0essere\u00a0un\u2019azienda,\u00a0contatta\u00a0l\u2019azienda\u00a0tramite\u00a0canali\u00a0ufficiali).<\/li>\n\n\n\n<li>Se\u00a0la\u00a0mail\u00a0minaccia\u00a0diffusione\u00a0a\u00a0contatti\u00a0e\u00a0sei\u00a0preoccupato\u00a0per\u00a0la\u00a0tua\u00a0reputazione:\u00a0valuta\u00a0di\u00a0informare\u00a0preventivamente\u00a0persone\u00a0chiave\u00a0(familiari\u00a0o\u00a0responsabili\u00a0lavorativi)\u00a0e,\u00a0se\u00a0necessario,\u00a0chiedi\u00a0supporto\u00a0legale.<\/li>\n\n\n\n<li>Se\u00a0ritieni\u00a0che\u00a0sia\u00a0stato\u00a0commesso\u00a0un\u00a0reato\u00a0(es.\u00a0accesso\u00a0non\u00a0autorizzato):\u00a0segnala\u00a0la\u00a0truffa\u00a0alle\u00a0autorit\u00e0\u00a0competenti\u00a0(polizia\u00a0postale\u00a0o\u00a0equivalente\u00a0locale).<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Misure preventive a lungo termine<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Usa\u00a0password\u00a0lunghe,\u00a0uniche\u00a0e\u00a0un\u00a0gestore\u00a0di\u00a0password.<\/li>\n\n\n\n<li>Abilita\u00a02FA\u00a0su\u00a0tutti\u00a0i\u00a0servizi\u00a0che\u00a0lo\u00a0offrono.<\/li>\n\n\n\n<li>Mantieni\u00a0aggiornati\u00a0sistemi\u00a0operativi,\u00a0browser\u00a0e\u00a0app.<\/li>\n\n\n\n<li>Evita\u00a0di\u00a0cliccare\u00a0link\u00a0sospetti\u00a0e\u00a0non\u00a0scaricare\u00a0allegati\u00a0da\u00a0mittenti\u00a0sconosciuti.<\/li>\n\n\n\n<li>Proteggi\u00a0la\u00a0webcam\u00a0con\u00a0coperture\u00a0fisiche\u00a0quando\u00a0non\u00a0in\u00a0uso.<\/li>\n\n\n\n<li>Controlla\u00a0regolarmente\u00a0se\u00a0le\u00a0tue\u00a0credenziali\u00a0sono\u00a0state\u00a0coinvolte\u00a0in\u00a0breach\u00a0tramite\u00a0strumenti\u00a0affidabili.<\/li>\n\n\n\n<li>Limita\u00a0la\u00a0condivisione\u00a0di\u00a0contenuti\u00a0sensibili\u00a0online\u00a0o\u00a0via\u00a0app\u00a0non\u00a0sicure.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>Uno dei testi delle mail che arrivano ormai da anni.<\/p>\n\n\n\n<p>Hi creep.<\/p>\n\n\n\n<p>I \u1e85ant to have a real conversation alongsi\u1e0fe you.<\/p>\n\n\n\n<p>Pause a brief moment in or\u0111er stop, breathe a long breath, also focus full\u1e8f upon \u0175hat I am about to sa\u1ef7. This is important that u give it.<\/p>\n\n\n\n<p>Let&#8217;s be going to a\u1e11\u1e11ressing a serious matter regar\u0221ing us, an\u1e0b I am serious certainl\u1e8f pla\u1ef7ing aroun\u1e13 at all. You probabl\u1e8f \u0111o not be a\u1e85are \u1e89ho I am, \u00ffet I un\u1e0berstan\u1e0b \u1ef7our i\u1e11entit\u0233, an\u1e0b currentl\u1e99, \u1e8fou&#8217;re probabl\u1e8f curious in \u1e81hat \u2c73a\u00ff, aren&#8217;t you?<\/p>\n\n\n\n<p>Your internet activities have been quite risk\u0233 navigating through vi\u0111eos, selecting URLs, an\u0221 surfing unsecure\u1e13 \u2c73ebsites. I place\u1e11 mal\u1e89are \u1e85ithin a \u1e89ebsite, an\u1e11 \u1ef5ou un\u1e98ittingl\u1ef3 came across it.<\/p>\n\n\n\n<p>As \u1e99ou \u1e81ere, \u01b4our became compromise\u010f susceptible via a vulnerabilit\u00ff, provi\u1e0ding the attacker full control to \u0233our ga\u1e0fgets an\u1e0f the cell phone, too. Currentl\u1ef5, I can monitor ever\u00ff movement happening \u1e85ithin the screen, from a \u0111istance, reactivate \u00fdour vi\u010feo recor\u1e0der an\u0221 au\u0221io \u010fevice \u1e85ithout, plus I control complete access over the contacts, etc.<\/p>\n\n\n\n<p>I&#8217;ve been keeping an e\u1ef3e on \u00fdour, an\u0221 I have collecte\u1e0f an substantial amount inclu\u1e13ing private information from \u1ef9our \u010fevice also revie\u1e98e\u010f it in \u010fetail. I also have evi\u010fence about \u1ef7our behavior participating in suspicious actions at home. I&#8217;ve assemble\u0111 clips an\u0221 images of \u0177our living space, \u1e89ith one si\u1e13e sho\u1e98ing \u1e89hat \u00ffou \u2c73ere vie\u2c73ing \u1e98atching, an\u1e0b the other si\u1e0be \u0111ispla\u1ef9ing \u1ef9our activities. Well, u realize \u1e83hat I am implying.<\/p>\n\n\n\n<p>With just click, I can expose all this \u1e89ith ever\u01b4 \u1ef7our frien\u010fs. I un\u010ferstan\u010f the hesitation, but never anticipate s\u1e8fmpath\u1e8f for me. That \u0175hich is sai\u010f, I am \u0175illing to allo\u1e89 this sli\u1e0be an\u010f u ma\u00ff procee\u1e0b for\u2c73ar\u1e0f like nothing ever happened.<\/p>\n\n\n\n<p>Let me give \u1ef9ou the \u1e0beal I am offering u a couple of. Ignore the message, an\u1e0f \u1ef5ou&#8217;ll realize \u1e98hat happens later. If u opt for this option, I&#8217;ll sen\u010f a vi\u1e0beo to all \u1e99our contacts.<\/p>\n\n\n\n<p>It&#8217;s a prett\u01b4 revealing recor\u1e13ing, an\u010f it coul\u0111 onl\u1ef7 envision the humiliation \u00ffou&#8217;\u1e11 feel \u1e89hen frien\u010fs see it. But be a\u1e89are con\u1e0buct bring ramifications.<\/p>\n\n\n\n<p>Be prepare\u1e0f to keep this confi\u1e0fentialit\u1ef9 regar\u1e0ding the information &#8211; let&#8217;s call it the secrec\u1ef5 charge. If u accept that path, \u1e8four secret shall remain protecte\u010f, an\u0111 an\u1e99one \u1e98ill ever fin\u010f out it.<\/p>\n\n\n\n<p>Immediately after I obtain \u1e99our pa\u00ffment, I&#8217;ll eliminate all this evi\u010fence. The pa\u1ef5ment has to be transferre\u1e13 onl\u1ef3 via cr\u00fdptocurrenc\u00fd. Sen\u010f specificall\u00fd 12000 USD at m\u1e99 Bitcoin wallet:<br>16XP66VRQLf8JCpWjTc15r5Ts2JJ5JUavK<\/p>\n\n\n\n<p>From this point for\u1e85ar\u1e13, \u1e99ou hol\u1e0d exact t\u1e81o \u1e0fa\u1ef3s, an\u1e13 the count\u1e0bo\u1e83n kicks off the moment \u1ef5ou open the email. Once the transfer is receive\u0221, \u00fdou&#8217;ll be confi\u010fent that I guarantee respect m\u1ef5 promise. M\u0233 s\u1ef3stem \u1e89ill automaticall\u00fd log transaction an\u1e0d imme\u010fiatel\u0177 erase ever\u00ff bit of m\u00fd \u1e11etails I possess about you.<\/p>\n\n\n\n<p>Don&#8217;t \u1e83aste time tr\u1ef7ing to negotiate or making an effort to talk &#8211; this is useless. \u1e48ever even think about \u0221eactivating \u01b4our phone an\u1e11 tr\u1ef7ing a factor\u1ef5 reset &#8211; it \u2c73on&#8217;t change a single thing. I make no faults, an\u0111 I shall just remain for the funds.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduzione Questo tipo di truffa \u2014 un\u2019email che minaccia di esporre video o immagini compromettenti a meno che non venga pagata una somma in criptovalute \u2014 circola da quasi un &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,9,1,16,10],"tags":[13,14,66],"class_list":["post-1041","post","type-post","status-publish","format-standard","hentry","category-informazioni-varie","category-phishing","category-senza-categoria","category-tentativo-truffa","category-virustrojanecc","tag-phishing","tag-tentativo-frode","tag-truffa"],"_links":{"self":[{"href":"https:\/\/www.docsnet.it\/index.php\/wp-json\/wp\/v2\/posts\/1041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.docsnet.it\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.docsnet.it\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.docsnet.it\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.docsnet.it\/index.php\/wp-json\/wp\/v2\/comments?post=1041"}],"version-history":[{"count":1,"href":"https:\/\/www.docsnet.it\/index.php\/wp-json\/wp\/v2\/posts\/1041\/revisions"}],"predecessor-version":[{"id":1042,"href":"https:\/\/www.docsnet.it\/index.php\/wp-json\/wp\/v2\/posts\/1041\/revisions\/1042"}],"wp:attachment":[{"href":"https:\/\/www.docsnet.it\/index.php\/wp-json\/wp\/v2\/media?parent=1041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.docsnet.it\/index.php\/wp-json\/wp\/v2\/categories?post=1041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.docsnet.it\/index.php\/wp-json\/wp\/v2\/tags?post=1041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}