Return to site

Hack Mac Camera

broken image


Your Mac's Camera Can Be Hacked. Posted on September 19th, 2016 by Jay Vrijenhoek. Related: Porn Blackmail Scam Rattles Mac Users: What You Need to Know. You might be asking, 'Is my Mac's camera hacked?' The truth is your webcam can be accessed without your consent, and therefore covering your Mac's built-in camera is a good idea. Serious Zoom security flaw could let websites hijack Mac cameras. New, 87 comments. By Dieter Bohn @backlon Jul 8, 2019, 9:19pm EDT Share this story. Share this on Facebook.

How to hack laptop camera using IP address?

Have you ever wondered if you can access another person's webcam by sitting anywhere in the world? With the advancements in cyber crime, this is possible. Almost every smartphone and laptop come with a built-in camera that can be used for different purposes. However, the laptops with cameras are prone to a high risk of hacked cams so each user must be well informed in this area. This guide will investigate 'How to hack laptop camera using IP address' and how we shall prevent ourselves from this scenario?

Note:Important FAQs about webcam hacking

Disclaimer: This article does not in any way endorse such illegal practices of hacking laptop's webcams. This is just an informative guide that is written to keep the users well informed of the potential dangers in today's digital environment.

Camera

What is Hacking?

Before we head into the detailed guide of 'How to hack laptop camera using IP address'? first, we have to find out what actually hacking is? In simple words, hacking is to gain unauthorized access to a computer or network. Once a hacker gains this access, then the data can be stolen and misused for various purposes. This may be just for fun, for example hacking a friend's Facebook account to prove that someone has more technical knowledge than his peers but it can range up to high profile hacking in which data of national importance may be stolen and used for malicious purposes.

Hacking is one of the parts of cybercrime which is a collective term used for describing unethical activities done in the digital space. With the development of Internet, webcam and social media applications, people are interested in learning about new forms of hacking such as 'how to hack webcam'? and 'how to hack IP address'?

History of Cybercrime

In order to base this study on the current problems in cybercrime, one has traveled back at least 50 years. It was in 1969 when two computers were remotely connected in the United States of America (USA) on a network known as Advanced Research Projects Agency Network (ARPANET). Initially, this was used for military purposes before being introduced to commercial organizations in the coming decade. The Web servers emerged in the 1990s as people started to realize the unlimited possibilities of this invention.

Alongside the development of technology, there were people who were working to exploit the inaccuracies in them. This was not always in a harmful manner as witnessed today but just to gain personal benefits. It was in 1981 that a man called Ian Murphy became the first person convicted of cybercrime after hacking the AT&T network. This followed the development of several types of viruses like worms and Trojans and hackers gained confidence as the digital systems grew.

Several incidents have resulted in billions of dollars loss for big companies due to hacking laptops. In 2000, a 15 year old hacked high profile websites like Amazon and CNN, eBay and Yahoo which resulted in a loss of almost $1 billion dollars for the companies.

What are the types of Cybercrime?

As digital technology is evolving, newer forms of cybercrimes are developing. There are roughly 3 major categories in which cybercrimes are set: Property, Individual and Government. The first case includes the unauthorized access of a person's personal details such as bank account, passwords or other information which is the sole property of an individual. The second case, Individual includes acts such as stalking, distributing illegal content like pornography and trafficking data online. Hacking laptops and webcams fall under this category. The third case, Government is a serious crime as it involves hacking high profile data from various government organizations and using it to harm the State.

It is critical to know about the details of such crimes so that criminals can be identified and prosecuted which is the aim of this study. Essentially, these are divided into server attacks, botnets, identity theft, cyber stalking, social engineering, phishing, prohibited content and exploit kits. Server attacks are done to close an online service by sending excessive traffic on it.

Read more: How To Fix a Laptop Screen Without Replacing It

Hack Mac Camera App

This is very common on online shopping websites or servers where a large number of users access the website at a given time. When the online server goes down, the hacker automatically gains access to the system. Botnets are kind of programs that hackers use to externally control the infected systems. They are a type of viruses that can be used to perform unwanted activities. Identity theft is stealing someone's personal information and using it for harmful purposes.

Cyber stalking is one of the most damaging, yet apparently harmless types of digital crime. It includes online harassment where a person may contact and blackmail the victim continuously. People find out 'How to access webcam' and then indulge in such blackmailing practices for users who have a laptop with cameras. These types of activities are very common on social media websites. Social Engineering is a new form of cyber crime where people gain the confidence of the user by posing as agents of known organization and then stealing the data of the user such as bank account details.

Similarly, phishing is performed by sending unwanted emails to users in order to gain access to their systems. Prohibited content is the distribution of illegal content on the Internet which can be highly disturbing for individuals. Exploit kits make use of inaccuracies in software such as bugs to control a person's computer. Just as soft wares are available for purchase, exploit kits can be easily bought and upgraded according to the requirements.

How to find out IP address?

Internet Protocol (IP) address is a distinct form of identification in numbers that are allocated to every device that is connected to a network and uses the Internet for communication. IP addresses can be used for numerous reasons, both good and bad. The good reasons include the identification of users by different companies in order to place them in separate categories.

This can occur when we do online shopping and our IP addresses are collected by the websites so that we may receive personalized offers according to our region. Likewise, many other companies use IP addresses to identify people such as criminals. One of the major problems with it is that hackers can gain access to a particular IP address and then manipulate the user's data. This is very dangerous so we must be vigilant against such attacks. If a person asks 'How to hack someone's webcam', then it is not possible to answer it directly because first, we have to find out 'How to hack IP address'. This will then allow us access to a webcam.

There are different ways to get your IP address easily. Firstly, if your friend or some acquaintance gets your laptop, he/she may find the IP address using different websites available such as WhatisIPaddress.com, etc. Even if your computer is placed anywhere in the world, hackers can gain access to your IP address by tapping into your network. This may occur when we open emails or web pages that are designed to capture our IP addresses whenever we visit them. Additionally, the social media applications that we use today are not completely secure and expert people in this field may have no problem in finding out the IP address of a specific user. The same is the case with instant messaging applications like Whatsapp which millions of people use every day.

However, finding out and using your IP address is not as easy as it sounds. Most devices today are very secure and know how to protect yourself from malicious people. The computers which are connected to the networks today mostly use dynamic addresses for IP. This means that your IP address keeps on changing continuously and it is not possible to find a single one that matches your device. Moreover, people can use Virtual Private Networks (VPN) which hides your IP and provides with a different route to connect to a network.

How to hack a webcam?

For a person to know 'How to hack someone's webcam', first it is important to find out how to hack someone's computer because webcam itself is part of the computer and we need to gain access to the software first. For this purpose, there are several programs that can be downloaded remotely on your computer which are actually some sorts of viruses. Some of them are:

  • Remote Administration Units (RAIs)

A remote organization instrument is a bit of a tool that permits an ‘administrator' to control a framework as though they sitting before your PC. Typically utilized for criminal or malevolent movement, a RAT programming would be introduced without your insight, which is the reason RATs are otherwise called Remote Access Trojan.

They can be downloaded effectively from any site that you search on, or any distributed record sharing projects (P2P) like LimeWire, or P2P conventions like BitTorrent and Freenet.

  • Botnets

A botnet is a system of private PCs that can be controlled as a gathering to perform different assignments. The proprietor of a botnet can control it with an order and control programming (C&C).

Also, the controller of a botnet, with malignant expectations, can assume responsibility for PCs when their security has been ruptured, and it has been infiltrated by malware. The DDoS assault that occurred in 2016 was performed with the Mirai botnet, a malware that turns arranged gadgets, explicitly obsolete renditions of Linux, into the remote-controlled bot. Dyn marked the Marai botnet as the ‘essential wellspring of noxious assault traffic'.

  • Software Tools

There are different software tools that can be used to crack passwords remotely. If a webcam is connected to a central network such as in a hotel, hostel or any shared place, it is very easy to identify the IP address and then crack the username and passwords of the network using tools such as Brutus, Rainbow Crack, Wfuzz and many more. Alternatively, hackers can hide compromising code into seemingly harmless files on the computer. Once a user opens the files, the entire computer will be exposed.

Typically, you follow these steps if you wish to know how to hack laptop camera using IP address:

  1. Stage 1: Set up Meterpreter.

After we've effectively misused the person in question, we presently have our preferred alternative to set a payload. The payload guides metasploit on the unfortunate casualty's PC once it breaks in. Meterpreter is our payload. The accompanying order sets up our payload:

set payload windows/meterpreter/reverse_tcp

On the off chance that the assault was effective, metasploit naturally introduces meterpreter on the objective framework and we can proceed onward to hacking the webcam.

  1. Stage 2: Find the webcam.

Meterpreter has a worked in module for looking and controlling the remote framework's webcam. We can begin via looking if the framework even has a webcam or not. The direction beneath is utilized for that and it additionally returns us the name of the webcam.

meterpreter > webcam_list

What's more, presently you should see your objective's webcam(s) recorded in the yield.

Hack Mac Camera Settings

  1. Stage 3: Take depictions

On the off chance that the last order gave us a webcam we can feel free to snap a photograph:

meterpreter > webcam_snap

Also, presently you should see an image has been spared in the organizer/select/framework3/msf3 Simply head over yonder

  1. Stage 4: Stream ongoing video from the hacked webcam

So we just snapped a photo, we should perceive how to get a live video stream. We can do this by composing the order underneath: (We're utilizing – p parameter to indicate the catalog we need to provide for the video spilling document)

meterpreter > run webcam – p/var/www

This order starts up the unfortunate casualty's webcam and sends its video yield to/var/www/webcam.htm. You can open up this record and look at what's happening at the opposite end in a live video stream.

Why do people hack webcams?

The reasons for hacking may be a lot but to hack someone's webcam must require a specific motive. The main reason is to blackmail the users because the hacker can gain access to compromising photos or videos of them while they are in front of the webcam. This is common with females as men use this tactic to blackmail them for money. Another reason is to find out more about a person or his belongings and residence.

Read more: Is Lenovo a Good Brand?

This may occur if we wish to know about where a person puts different things in his/her house and then use this information to perform a burglary at the house. Although, this seems as a far-fetched idea there have been actual robberies of this kind in many areas of the world. Moreover, some cybercriminals may just do this for fun and amusement which is a very weird thing to do but there are strange people in this world. For several people, the hacking laptop is their passion and so they start from different things such as How to hack someone's webcam and likewise, start hacking other components as well.

How to protect yourself from hacked webcams?

In this era of advancement in digital technology, cyber security is an important part to be considered. It is always better for users to adopt safety measures on their own in order to protect themselves from hacking. Some of the measures that can be taken are as follows:

  • Keep your laptop camera covered when not in use. Put a piece of tape or sticker so that nothing is visible from the webcam even if a hacker gains access to it. This is the most effective and easiest method to protect from hacked cams.
  • Keep your softwares updated. This includes the anti-virus software as well as all the other tools that you use on your computer. This will help your computer to remain up to date with the latest protection systems and your laptop will not be exposed to malicious attacks easily.
  • Avoid connecting to public networks if it the work is not really urgent. The webcams that are connected to public servers or IoT networks are the easiest to exploit so you must be very careful when you use your system in such conditions.

Frequently Asked Questions (FAQs)

In this age of sophisticated tools used by IT experts, it is very easy to hack a webcam. Access can be gained to a computer network through its IP address, remotely controlled softwares, spywares or botnets which allow the hacker to control a computer and any programs that are used in it.
It is possible to see a person remotely by accessing the webcam through malicious software and coding. If such is the case, a light turns on the laptop or some smart phones as well so you should immediately switch off your device. The hacker may install spywares on your system to gain further access of your data.
Once a webcam turns on, a small LED light turns on besides it. If you see it turn on without your command then it means that someone has accessed your webcam. Also, you can open the task manager and see the currently running programs. If it shows webcam as running then it means that your laptop camera is currently switched on. This does not actually mean that the webcam is hacked because it can be set to switch on automatically as well in some cases.
Hackintosh

What is Hacking?

Before we head into the detailed guide of 'How to hack laptop camera using IP address'? first, we have to find out what actually hacking is? In simple words, hacking is to gain unauthorized access to a computer or network. Once a hacker gains this access, then the data can be stolen and misused for various purposes. This may be just for fun, for example hacking a friend's Facebook account to prove that someone has more technical knowledge than his peers but it can range up to high profile hacking in which data of national importance may be stolen and used for malicious purposes.

Hacking is one of the parts of cybercrime which is a collective term used for describing unethical activities done in the digital space. With the development of Internet, webcam and social media applications, people are interested in learning about new forms of hacking such as 'how to hack webcam'? and 'how to hack IP address'?

History of Cybercrime

In order to base this study on the current problems in cybercrime, one has traveled back at least 50 years. It was in 1969 when two computers were remotely connected in the United States of America (USA) on a network known as Advanced Research Projects Agency Network (ARPANET). Initially, this was used for military purposes before being introduced to commercial organizations in the coming decade. The Web servers emerged in the 1990s as people started to realize the unlimited possibilities of this invention.

Alongside the development of technology, there were people who were working to exploit the inaccuracies in them. This was not always in a harmful manner as witnessed today but just to gain personal benefits. It was in 1981 that a man called Ian Murphy became the first person convicted of cybercrime after hacking the AT&T network. This followed the development of several types of viruses like worms and Trojans and hackers gained confidence as the digital systems grew.

Several incidents have resulted in billions of dollars loss for big companies due to hacking laptops. In 2000, a 15 year old hacked high profile websites like Amazon and CNN, eBay and Yahoo which resulted in a loss of almost $1 billion dollars for the companies.

What are the types of Cybercrime?

As digital technology is evolving, newer forms of cybercrimes are developing. There are roughly 3 major categories in which cybercrimes are set: Property, Individual and Government. The first case includes the unauthorized access of a person's personal details such as bank account, passwords or other information which is the sole property of an individual. The second case, Individual includes acts such as stalking, distributing illegal content like pornography and trafficking data online. Hacking laptops and webcams fall under this category. The third case, Government is a serious crime as it involves hacking high profile data from various government organizations and using it to harm the State.

It is critical to know about the details of such crimes so that criminals can be identified and prosecuted which is the aim of this study. Essentially, these are divided into server attacks, botnets, identity theft, cyber stalking, social engineering, phishing, prohibited content and exploit kits. Server attacks are done to close an online service by sending excessive traffic on it.

Read more: How To Fix a Laptop Screen Without Replacing It

Hack Mac Camera App

This is very common on online shopping websites or servers where a large number of users access the website at a given time. When the online server goes down, the hacker automatically gains access to the system. Botnets are kind of programs that hackers use to externally control the infected systems. They are a type of viruses that can be used to perform unwanted activities. Identity theft is stealing someone's personal information and using it for harmful purposes.

Cyber stalking is one of the most damaging, yet apparently harmless types of digital crime. It includes online harassment where a person may contact and blackmail the victim continuously. People find out 'How to access webcam' and then indulge in such blackmailing practices for users who have a laptop with cameras. These types of activities are very common on social media websites. Social Engineering is a new form of cyber crime where people gain the confidence of the user by posing as agents of known organization and then stealing the data of the user such as bank account details.

Similarly, phishing is performed by sending unwanted emails to users in order to gain access to their systems. Prohibited content is the distribution of illegal content on the Internet which can be highly disturbing for individuals. Exploit kits make use of inaccuracies in software such as bugs to control a person's computer. Just as soft wares are available for purchase, exploit kits can be easily bought and upgraded according to the requirements.

How to find out IP address?

Internet Protocol (IP) address is a distinct form of identification in numbers that are allocated to every device that is connected to a network and uses the Internet for communication. IP addresses can be used for numerous reasons, both good and bad. The good reasons include the identification of users by different companies in order to place them in separate categories.

This can occur when we do online shopping and our IP addresses are collected by the websites so that we may receive personalized offers according to our region. Likewise, many other companies use IP addresses to identify people such as criminals. One of the major problems with it is that hackers can gain access to a particular IP address and then manipulate the user's data. This is very dangerous so we must be vigilant against such attacks. If a person asks 'How to hack someone's webcam', then it is not possible to answer it directly because first, we have to find out 'How to hack IP address'. This will then allow us access to a webcam.

There are different ways to get your IP address easily. Firstly, if your friend or some acquaintance gets your laptop, he/she may find the IP address using different websites available such as WhatisIPaddress.com, etc. Even if your computer is placed anywhere in the world, hackers can gain access to your IP address by tapping into your network. This may occur when we open emails or web pages that are designed to capture our IP addresses whenever we visit them. Additionally, the social media applications that we use today are not completely secure and expert people in this field may have no problem in finding out the IP address of a specific user. The same is the case with instant messaging applications like Whatsapp which millions of people use every day.

However, finding out and using your IP address is not as easy as it sounds. Most devices today are very secure and know how to protect yourself from malicious people. The computers which are connected to the networks today mostly use dynamic addresses for IP. This means that your IP address keeps on changing continuously and it is not possible to find a single one that matches your device. Moreover, people can use Virtual Private Networks (VPN) which hides your IP and provides with a different route to connect to a network.

How to hack a webcam?

For a person to know 'How to hack someone's webcam', first it is important to find out how to hack someone's computer because webcam itself is part of the computer and we need to gain access to the software first. For this purpose, there are several programs that can be downloaded remotely on your computer which are actually some sorts of viruses. Some of them are:

  • Remote Administration Units (RAIs)

A remote organization instrument is a bit of a tool that permits an ‘administrator' to control a framework as though they sitting before your PC. Typically utilized for criminal or malevolent movement, a RAT programming would be introduced without your insight, which is the reason RATs are otherwise called Remote Access Trojan.

They can be downloaded effectively from any site that you search on, or any distributed record sharing projects (P2P) like LimeWire, or P2P conventions like BitTorrent and Freenet.

  • Botnets

A botnet is a system of private PCs that can be controlled as a gathering to perform different assignments. The proprietor of a botnet can control it with an order and control programming (C&C).

Also, the controller of a botnet, with malignant expectations, can assume responsibility for PCs when their security has been ruptured, and it has been infiltrated by malware. The DDoS assault that occurred in 2016 was performed with the Mirai botnet, a malware that turns arranged gadgets, explicitly obsolete renditions of Linux, into the remote-controlled bot. Dyn marked the Marai botnet as the ‘essential wellspring of noxious assault traffic'.

  • Software Tools

There are different software tools that can be used to crack passwords remotely. If a webcam is connected to a central network such as in a hotel, hostel or any shared place, it is very easy to identify the IP address and then crack the username and passwords of the network using tools such as Brutus, Rainbow Crack, Wfuzz and many more. Alternatively, hackers can hide compromising code into seemingly harmless files on the computer. Once a user opens the files, the entire computer will be exposed.

Typically, you follow these steps if you wish to know how to hack laptop camera using IP address:

  1. Stage 1: Set up Meterpreter.

After we've effectively misused the person in question, we presently have our preferred alternative to set a payload. The payload guides metasploit on the unfortunate casualty's PC once it breaks in. Meterpreter is our payload. The accompanying order sets up our payload:

set payload windows/meterpreter/reverse_tcp

On the off chance that the assault was effective, metasploit naturally introduces meterpreter on the objective framework and we can proceed onward to hacking the webcam.

  1. Stage 2: Find the webcam.

Meterpreter has a worked in module for looking and controlling the remote framework's webcam. We can begin via looking if the framework even has a webcam or not. The direction beneath is utilized for that and it additionally returns us the name of the webcam.

meterpreter > webcam_list

What's more, presently you should see your objective's webcam(s) recorded in the yield.

Hack Mac Camera Settings

  1. Stage 3: Take depictions

On the off chance that the last order gave us a webcam we can feel free to snap a photograph:

meterpreter > webcam_snap

Also, presently you should see an image has been spared in the organizer/select/framework3/msf3 Simply head over yonder

  1. Stage 4: Stream ongoing video from the hacked webcam

So we just snapped a photo, we should perceive how to get a live video stream. We can do this by composing the order underneath: (We're utilizing – p parameter to indicate the catalog we need to provide for the video spilling document)

meterpreter > run webcam – p/var/www

This order starts up the unfortunate casualty's webcam and sends its video yield to/var/www/webcam.htm. You can open up this record and look at what's happening at the opposite end in a live video stream.

Why do people hack webcams?

The reasons for hacking may be a lot but to hack someone's webcam must require a specific motive. The main reason is to blackmail the users because the hacker can gain access to compromising photos or videos of them while they are in front of the webcam. This is common with females as men use this tactic to blackmail them for money. Another reason is to find out more about a person or his belongings and residence.

Read more: Is Lenovo a Good Brand?

This may occur if we wish to know about where a person puts different things in his/her house and then use this information to perform a burglary at the house. Although, this seems as a far-fetched idea there have been actual robberies of this kind in many areas of the world. Moreover, some cybercriminals may just do this for fun and amusement which is a very weird thing to do but there are strange people in this world. For several people, the hacking laptop is their passion and so they start from different things such as How to hack someone's webcam and likewise, start hacking other components as well.

How to protect yourself from hacked webcams?

In this era of advancement in digital technology, cyber security is an important part to be considered. It is always better for users to adopt safety measures on their own in order to protect themselves from hacking. Some of the measures that can be taken are as follows:

  • Keep your laptop camera covered when not in use. Put a piece of tape or sticker so that nothing is visible from the webcam even if a hacker gains access to it. This is the most effective and easiest method to protect from hacked cams.
  • Keep your softwares updated. This includes the anti-virus software as well as all the other tools that you use on your computer. This will help your computer to remain up to date with the latest protection systems and your laptop will not be exposed to malicious attacks easily.
  • Avoid connecting to public networks if it the work is not really urgent. The webcams that are connected to public servers or IoT networks are the easiest to exploit so you must be very careful when you use your system in such conditions.

Frequently Asked Questions (FAQs)

In this age of sophisticated tools used by IT experts, it is very easy to hack a webcam. Access can be gained to a computer network through its IP address, remotely controlled softwares, spywares or botnets which allow the hacker to control a computer and any programs that are used in it.
It is possible to see a person remotely by accessing the webcam through malicious software and coding. If such is the case, a light turns on the laptop or some smart phones as well so you should immediately switch off your device. The hacker may install spywares on your system to gain further access of your data.
Once a webcam turns on, a small LED light turns on besides it. If you see it turn on without your command then it means that someone has accessed your webcam. Also, you can open the task manager and see the currently running programs. If it shows webcam as running then it means that your laptop camera is currently switched on. This does not actually mean that the webcam is hacked because it can be set to switch on automatically as well in some cases.
Covering your laptop camera is an easy fix to protect you from webcam hacking. You can use tape or sticker to cover the webcam area and then remove it whenever you actually want to use it. The problem may rise for frequent users who communicate through video calls every day. They can use some other method to protect themselves from webcam hacking as they would find it tedious to place and remove the stickers continuously.

Please let us know about your queries and comments in the comments section below. We hope that you found this article helpful and you will be cautious from now on when you sit in front of your laptop camera!

Ransomware is a particularly nasty form of malware because it seeks to exploit computer users' fear that their privacy has been compromised. As more and more malware is reported and makes the headlines, more of us become concerned for the safety of our data, as well as our own privacy and even personal safety. Ransomware, like the 'your camera is hacked' scam, plays on that by sending you a message telling you that the hackers have images taken from your webcam while you were surfing the web. Usually, the message claims you have been visiting porn sites and that the webcam took a video of you while you visited the sites.

Can my Mac's camera be hacked?

The short answer is yes. It is possible for malware running on your Mac to turn on the iSight camera and record video or still images and audio from the microphone, and send it to a storage location on the internet. As recently as 2016, a backdoor called Backdoor.OSX.Mokes, a Mac variant of a piece of malware that had already been found on Windows and Linux computers, was discovered. According to Kaspersky labs, the backdoor could steal data, including Screenshots, Audio-/Video-Captures, Office-Documents, and Keystrokes. There have been other instances of malware that has this capability.

As reported at 'Objective by the Sea,' 2019 security conference, 20% of Macs are infected by PUPs — Potentially Unwanted Applications. Mac 10 15 2.

What can I do to stop my camera from being hacked?

While some suggest using camera covers or lids to protect your privacy, we don't recommend doing so. Closing your Mac with a cover over the camera may seriously damage the display. Lids can also cover the light sensor and prevent your Mac from automatically adjusting brightness. There are other safe methods to make sure you're not being watched. We'll explain them below.

Doesn't a green light come on when the camera is in use?

Yes, it does. Apple assures that the camera indicator is always lit if the camera is activated. It means no one can use your camera without you knowing.

But there are additional security measures you can take to control access to your camera.

Check what apps have access to your camera

If you think that your camera might be hacked, it's a good idea to check what programs on your Mac are allowed to access it. You can easily check the current permissions with the help of the freshly-baked feature in CleanMyMac X. It's called 'Application Permissions,' and it allows you to stay in the know of your app permissions. If you're running macOS Catalina, you can check what programs can access your camera, microphone, files, and folders in just a few clicks.

CleanMyMac X has a free trial version, so try it out and keep your data safe!

I thought you said the 'your computer has been hacked' thing is a scam?

It is. While it's possible to steal video, audio, and photos from your webcam and microphone, and malware exists that can do it, that's not what's happening in this case. The porn blackmail scam that sends out email messages claiming your webcam has been hacked is designed to extract money from people who believe it may be true. Even people who have never visited a porn site become concerned when they receive the email. It's easy for people who have visited porn sites to see how their fears could be exploited.

The scam works by sending spam emails in the hope of luring enough people to make it worthwhile. The email claims that you downloaded a virus while watching porn and that the virus captured video of you while you were on the site, along with screenshots of the site itself. It then threatens to send the video to everyone in your contacts app if you don't pay a ransom of several thousand dollars in Bitcoin. As an extra twist, the email addresses are often harvested from data breaches which also exposed users' passwords. By including the password in the email, the hacker demonstrates that they know something about the recipient. That increases the fear that the hacker has more information, including the images and video they claim to have. It's a tried and tested social engineering trick and a very nasty one.

What to do if I receive one of these emails?

1. Delete it. Don't click on any links in the email and don't pay the ransom. The hacker doesn't have what they claim to have. The email is designed to blackmail porn site visitors. Even if you have visited porn sites, you can safely delete the email.

2. If the email contains a password or part of a password that you've used online, change your password on every site where you use it. Use a unique password for every account, make sure it's hard to guess (Safari's password suggestion tool is a good way to do this), and don't write it down.

3. Take the opportunity to scan your computer for malware. You can do that using one of the many antivirus tools that allow you to download them and scan your computer for free. Some may then charge you if they find anything, and you need to remove it. Alternatively, if you're using a Mac, you can use the malware tool in CleanMyMac X. It uses CleanMyMac's regularly updated malware database and compares what it finds on your Mac with it. If it doesn't find anything, it will tell you your Mac has a clean bill of health. If it does, you can remove it at the press of one button.

This app can detect macOS-specific keyloggers, backdoor viruses, and worms. Download its free version here.

4. Forget about it. Once you've deleted the email, changed passwords, and scanned your computer, try and forget about it. You won't hear any more from the hackers.

Hacking Mac Camera

While it is possible for webcams, like the iSight cam on iMacs and MacBooks, to be hacked and images and video stolen, it's very unusual. Far more common are hackers who try to exploit the fears of people who are worried about privacy by claiming to have video and photos that they don't. While taping over your webcam and microphone will prevent anything from being stolen, for most of us, it's probably not necessary. However, you should make sure that your online accounts have secure, unique passwords and delete any accounts you no longer need or use. And it would be best if you also scan your computer for malware, perhaps using the malware utility in CleanMyMac X.

Hack Mac Camera Screen

These might also interest you:





broken image