{"id":38179,"date":"2021-03-02T12:00:47","date_gmt":"2021-03-02T10:00:47","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=38179"},"modified":"2025-08-30T03:22:32","modified_gmt":"2025-08-30T00:22:32","slug":"scammers-have-started-using-telegram-bots-to-blackmail-users","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/scammers-have-started-using-telegram-bots-to-blackmail-users\/","title":{"rendered":"Scammers have started using Telegram bots to blackmail users"},"content":{"rendered":"<p><span style=\\\"font-weight: 400;\\\">Malicious actors have begun using users&#8217; personal data collected by Telegram bots for blackmail and extortion. <\/span><!--more--><\/p>\n<p><span style=\\\"font-weight: 400;\\\">As reported by <\/span><a href=\\\"https:\/\/www.kommersant.ru\/doc\/4711513\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"><span style=\\\"font-weight: 400;\\\">\u00ab\u042a\u00bb<\/span><\/a><span style=\\\"font-weight: 400;\\\"> cybersecurity experts, criminals extort money by threatening to publicly disclose personal data, as well as the victim&#8217;s online actions to their close ones.<\/span><\/p>\n<p><span style=\\\"font-weight: 400;\\\">As an example of information sources for scammers, experts cite MailSearchBot from the company LeakCheck. It was originally created to check for password leaks. The attackers use data from the service to blackmail users by email, experts say.<\/span><\/p>\n<p><span style=\\\"font-weight: 400;\\\">LeakCheck is aware of such cases:<\/span><\/p>\n<blockquote>\n<p><span style=\\\"font-weight: 400;\\\">\u201cMost often, scammers write to victims that a virus has infected their computer and that all online actions are recorded, and to confirm this they attach the last password used,\u201d the company said.<\/span><\/p>\n<\/blockquote>\n<p><span style=\\\"font-weight: 400;\\\">MailSearchBot does not store query history, so LeakCheck cannot establish a link between the bot and the scammers.<\/span><\/p>\n<p><span style=\\\"font-weight: 400;\\\">Attackers can also impersonate the service&#8217;s security department \u2014 they offer to change the compromised password, thereby gaining full access to the victims&#8217; accounts, experts explain.<\/span><\/p>\n<blockquote>\n<p><span style=\\\"font-weight: 400;\\\">\u201cPeople usually worry about the safety of their photos and messages, so they open such fraudulent emails and believe them,\u201d said Igor Bederov, founder of Internet Rozysk.<\/span><\/p>\n<\/blockquote>\n<p><span style=\\\"font-weight: 400;\\\">Experts believe that in 2021 criminals may intensify activity in connection with the bill regulating publicly available personal data. It prohibits businesses from collecting data of social network users without their explicit consent.<\/span><\/p>\n<p><span style=\\\"font-weight: 400;\\\">Bederov believes this could lead to extortion messages addressed to companies allegedly from the data subject. The expert predicts that criminals may start sending fake letters with fines for violating the new law.<\/span><\/p>\n<p><span style=\\\"font-weight: 400;\\\">Earlier, it was reported that owners of Telegram channels were increasingly <a href=\"https:\/\/forklog.com\/en\/news\/hackers-escalate-attempts-to-steal-telegram-channels-using-a-trojan\"><span style=\\\"font-weight: 400;\\\">receiving messages from attackers with a virus<\/span><\/a><span style=\\\"font-weight: 400;\\\"> that allows hijacking their accounts.<\/span><\/p>\n<p>Subscribe to ForkLog news on Telegram: <a href=\\\"https:\/\/t.me\/forklogfeed\\\" target=\\\"_blank\\\" rel=\\\"nofollow noopener\\\">ForkLog Feed<\/a> \u2014 the full news feed, <a href=\\\"https:\/\/telegram.me\/forklog\\\" target=\\\"_blank\\\" rel=\\\"nofollow noopener\\\">ForkLog<\/a> \u2014 the most important news and polls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malicious actors have begun using users&#8217; personal data collected by Telegram bots for blackmail and extortion.<\/p>\n","protected":false},"author":1,"featured_media":38180,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1154,1256,723],"class_list":["post-38179","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-crimes","tag-privacy-and-personal-data","tag-telegram"],"aioseo_notices":[],"amp_enabled":true,"views":"61","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/38179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=38179"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/38179\/revisions"}],"predecessor-version":[{"id":38181,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/38179\/revisions\/38181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/38180"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=38179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=38179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=38179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}