{"id":68114,"date":"2025-09-04T13:44:17","date_gmt":"2025-09-04T18:44:17","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=68114"},"modified":"2025-09-04T13:50:55","modified_gmt":"2025-09-04T18:50:55","slug":"webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/","title":{"rendered":"Webcams, Malware, and Blackmail: The Rise of Automated Sextortion Attacks"},"content":{"rendered":"\n<p>Cybercriminals never stop looking for new ways to take advantage of people. One of the most disturbing tricks is known as <strong>sextortion<\/strong>\u2014when a hacker threatens to share private or embarrassing photos or videos unless the victim pays money.<\/p>\n\n<p>Unfortunately, this crime has now become even easier for scammers, thanks to a new type of malware called <strong>Stealerium<\/strong>. Researchers recently found that Stealerium is being used in email scams to trick people into downloading it onto their computers. Once installed, the malware automatically collects sensitive data, including:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Banking details<\/li>\n\n<li>Usernames and passwords<\/li>\n\n<li>Crypto wallet keys<\/li>\n\n<li>Private images<\/li>\n<\/ul>\n\n<p>But Stealerium goes even further. It can watch when a person visits adult websites, take a screenshot of the page, and then secretly snap a photo of the victim through their webcam\u2014all without their knowledge. The hacker can then threaten to release these images unless the victim pays up.<\/p>\n\n<p>As one security researcher described it:<\/p>\n\n<blockquote class=\"is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cThis adds another layer of privacy invasion and sensitive information that you definitely wouldn&#8217;t want in the hands of a hacker.\u201d<\/em><\/p>\n<\/blockquote>\n\n\u00a0\n\n<h2 class=\"wp-block-heading\">How Hackers Spread Stealerium<\/h2>\n\n<p>Like many scams, Stealerium is often spread through <strong>fake emails<\/strong>. Victims receive a message that looks like an invoice, payment notification, or other urgent document. Clicking the link or opening the attachment installs the spyware.<\/p>\n\n<p>The malware is freely available online, making it easy for cybercriminals of all skill levels to use. Once on a victim\u2019s computer, it secretly sends stolen information to hackers through services like Telegram or Discord.<\/p>\n\n\u00a0\n\n<h2 class=\"wp-block-heading\">Why This Matters<\/h2>\n\n<p>Older adults are often prime targets for scams because:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>They may be less familiar with new types of cyberattacks.<\/li>\n\n<li>Scammers assume they may be more trusting of \u201cofficial-looking\u201d emails.<\/li>\n\n<li>Embarrassment can make victims less likely to report sextortion attempts.<\/li>\n<\/ul>\n\n<p>The emotional toll of this kind of crime can be severe. Even if no money is lost, the stress and fear caused by threats of exposure can be overwhelming.<\/p>\n\n\u00a0\n\n<h2 class=\"wp-block-heading\">Protecting Yourself With Cybersecurity Basics<\/h2>\n\n<p>The good news is that you <strong>can protect yourself<\/strong> from this kind of scam with a few simple steps:<\/p>\n\n<ol class=\"wp-block-list\">\n<li><strong>Think before you click<\/strong>: Don\u2019t open unexpected email attachments or click suspicious links.<\/li>\n\n<li><strong>Cover your webcam<\/strong>: A simple cover can prevent hackers from spying on you.<\/li>\n\n<li><strong>Use strong, unique passwords<\/strong>: Never reuse the same password across accounts.<\/li>\n\n<li><strong>Enable automatic updates<\/strong>: Keep your operating system and apps patched.<\/li>\n\n<li><strong>Install antivirus protection<\/strong>: Security software like <strong><a href=\"http:\/\/pcmatic.com\">PC Matic<\/a><\/strong> blocks malware before it can run, preventing spyware like Stealerium from ever gaining access.<\/li>\n<\/ol>\n\n<p><a href=\"http:\/\/pcmatic.com\">PC Matic<\/a> uses a <strong>\u201cdefault-deny\u201d approach<\/strong> that stops unknown programs unless you allow them. That means even if you accidentally click a bad link, the malware can\u2019t execute. Combined with 24\/7 support and identity protection tools, <a href=\"http:\/\/pcmatic.com\">PC Matic<\/a> helps seniors stay safe from today\u2019s most invasive scams.<\/p>\n\n\u00a0\n\n<h2 class=\"wp-block-heading\">Final Thoughts<\/h2>\n\n<p>Sextortion scams like those powered by Stealerium show how far hackers are willing to go to invade people\u2019s privacy. But with basic cybersecurity habits and the right protection, you can stay one step ahead.<\/p>\n\n<p><strong>Don\u2019t give hackers the upper hand. Protect yourself, your computer, and your peace of mind with <a href=\"http:\/\/pcmatic.com\">PC Matic<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals never stop looking for new ways to take advantage of people. One of the most disturbing tricks is known as sextortion\u2014when a hacker threatens to share private or embarrassing photos or videos unless the victim pays money. Unfortunately, this crime has now become even easier for scammers, thanks to a new type of malware [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":68115,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6223],"tags":[],"class_list":["post-68114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scam-alert"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Webcams, Malware, and Blackmail: The Rise of Automated Sextortion Attacks<\/title>\n<meta name=\"description\" content=\"Cybercriminals never stop looking for new ways to take advantage of people. One of the most disturbing tricks is known as sextortion\u2014when a hacker\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webcams, Malware, and Blackmail: The Rise of Automated Sextortion Attacks\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals never stop looking for new ways to take advantage of people. One of the most disturbing tricks is known as sextortion\u2014when a hacker\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-04T18:44:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-04T18:50:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-17.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"Webcams, Malware, and Blackmail: The Rise of Automated Sextortion Attacks\",\"datePublished\":\"2025-09-04T18:44:17+00:00\",\"dateModified\":\"2025-09-04T18:50:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\\\/\"},\"wordCount\":529,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-17.jpg\",\"articleSection\":[\"Scam Alert\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\\\/\",\"name\":\"Webcams, Malware, and Blackmail: The Rise of Automated Sextortion Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-17.jpg\",\"datePublished\":\"2025-09-04T18:44:17+00:00\",\"dateModified\":\"2025-09-04T18:50:55+00:00\",\"description\":\"Cybercriminals never stop looking for new ways to take advantage of people. One of the most disturbing tricks is known as sextortion\u2014when a hacker\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-17.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-17.jpg\",\"width\":2240,\"height\":1260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webcams, Malware, and Blackmail: The Rise of Automated Sextortion Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Webcams, Malware, and Blackmail: The Rise of Automated Sextortion Attacks","description":"Cybercriminals never stop looking for new ways to take advantage of people. One of the most disturbing tricks is known as sextortion\u2014when a hacker","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Webcams, Malware, and Blackmail: The Rise of Automated Sextortion Attacks","og_description":"Cybercriminals never stop looking for new ways to take advantage of people. One of the most disturbing tricks is known as sextortion\u2014when a hacker","og_url":"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2025-09-04T18:44:17+00:00","article_modified_time":"2025-09-04T18:50:55+00:00","og_image":[{"width":2240,"height":1260,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-17.jpg","type":"image\/jpeg"}],"author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"Webcams, Malware, and Blackmail: The Rise of Automated Sextortion Attacks","datePublished":"2025-09-04T18:44:17+00:00","dateModified":"2025-09-04T18:50:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/"},"wordCount":529,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-17.jpg","articleSection":["Scam Alert"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/","url":"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/","name":"Webcams, Malware, and Blackmail: The Rise of Automated Sextortion Attacks","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-17.jpg","datePublished":"2025-09-04T18:44:17+00:00","dateModified":"2025-09-04T18:50:55+00:00","description":"Cybercriminals never stop looking for new ways to take advantage of people. One of the most disturbing tricks is known as sextortion\u2014when a hacker","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-17.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-17.jpg","width":2240,"height":1260},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/webcams-malware-and-blackmail-the-rise-of-automated-sextortion-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Webcams, Malware, and Blackmail: The Rise of Automated Sextortion Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=68114"}],"version-history":[{"count":7,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68114\/revisions"}],"predecessor-version":[{"id":68122,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68114\/revisions\/68122"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/68115"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=68114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=68114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=68114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}