Design a site like this with
Get started

Marketing, Social, Tech

Sextortion Bitcoin Scams

fake news paper

Hello, greetings from Shunyi for Wednesday 12th October. Today we are looking at DNS and those emails that purport to show the scammer has control over your computer.

For Glenn, a self confessed computer dummy, and others like him. (in fact, they are not)

Today’s short post is in fact, an addition or extension to our hugely successful article re Internet / Email scams that aim to separate you from your money by preying on your fear and ignorance:

99 times out of 100, scammers will claim they somehow control your computer and are technically far, far clever than you, a mere mortal. Both of these claims are false. As we mentioned above, they prey on your fear and ignorance from the get go by sending you a threatening email from your own e-mail account.

If they can write to you from within your own email address, that proves they control your device – right?

THAT is exactly what they want you to think though.
To strike fear they they have control.

They have simply accessed your DNS from the company that handles your Domain Name. (DN) If you are unsure what we are talking about, here is a list of 15 Dominion Name Registrars – it might ring some bells.

Or maybe you use the same one that you host with, which as we say in our above article is an extremely bad and stupid idea. Manipulating a domain name is not difficult. Anyone with basic IT skills taught at most middle or high schools can do it.

Now, that doesn’t mean your DN company is slack or corrupt. Fact is DNS was never designed to be secure. Until now. From around 2020 a new set came into being, DNSSEC – the final SEC meaning secure.

If you need to know more detail these two links are a good start.

Otherwise you have a few options.

  • If you have a “custom Email” eg:, just contact your Domain Name Registrar and check if they offer DNSSEC . Some offer it free, others {Godaddy) consider security a “premium.” You might want to rethink your registrar if they charge a fee. Google Domains include it free.

  • If you have an online account, eg Gmail, Hotmail check to see if they offer DNSSEC. It may well be already active.

  • Some of the modern browsers, eg Chrome, Yandex or Firefox have an option to set DNSSEC up in their tools. Again, if you update your browser regularly (or automate it) it may too be already activated.

Just to round off, most media report scams and web site attacks originating ex China, Russia, Iran (or whatever country is deemed “‘an adversary today.” In fact, these days a lot of our spam, mail is ex either Russia or Ukraine – sort of understandable.

However, as we have mentioned before, the bulk of our sextortion attacks and fake Covid news can be traced back to US servers. Which means nothing. So take this data with a grain of salt. Tracing a malicious email to xyz country does not mean that is the originating source.

So, follow the guide in our original article and refer it to Spam Cop who will ensure the “offending” server is made aware of their rogue client.

And remember, the guy on the end of the email is not a genius, he may be a tad smarter than you as far as IT is concerned, but basically, what she says- yes, some are female too – is good old fashioned horse manure.
So just smile, relax, report it and delete it.

Don’t forget, fighting spam and scammers is a community effort. So feel free to share this, or our other post with friends, colleagues, your blog or own site and social medic circles. You don’t even need to credit us!

Maybe also spend an hour of your time talking with elderly neighbours, nursing homes etc as these are the most vulnerable, softest targets in our society who are easily cheated of their entire savings.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: