HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Sextortion Scam Sends “I Recorded You” Emails Using Real Passwords Harvested from Disposable Inboxes

A new sextortion campaign is sending emails that claim the victim’s device was compromised and includes an actual password sourced from disposable‑mail services. The tactic highlights the danger of password reuse and the need for strict credential hygiene in third‑party risk programs.

🛡️ LiveThreat™ Intelligence · 📅 March 12, 2026· 📰 malwarebytes.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
3 recommended
📰
Source
malwarebytes.com

Sextortion Scam Sends “I Recorded You” Emails Using Real Passwords Harvested from Disposable Inboxes

What Happened — A wave of sextortion emails titled “You pervert, I recorded you!” has been observed. The messages claim a drive‑by exploit gave the attacker full device control and include an actual password belonging to the recipient, which was sourced from disposable‑inbox services such as FakeMailGenerator.

Why It Matters for TPRM

  • Attackers leverage publicly‑available disposable inboxes to harvest reused credentials, exposing the risk of password reuse across third‑party services.
  • The scam can be used to target employees of vendor organizations, potentially leading to credential compromise and downstream supply‑chain attacks.
  • Payment instructions direct victims to cryptocurrency wallets, creating a financial fraud vector that can affect corporate expense controls.

Who Is Affected — All industries where employees reuse passwords and interact with disposable email services; particularly high‑risk sectors include FIN_SERV, TECH_SAAS, and PROF_SERV.

Recommended Actions

  • Enforce strong, unique password policies and deploy password‑manager solutions for all third‑party users.
  • Block known disposable‑email domains at the gateway level.
  • Conduct phishing awareness training that includes sextortion scenarios.

Technical Notes — Attack vector: phishing emails that embed a real password harvested from disposable inboxes; no known CVE. Data types exposed: usernames, passwords, potentially other credential fragments. Source: Malwarebytes Labs

📰 Original Source
https://www.malwarebytes.com/blog/news/2026/03/sextortion-i-recorded-you-emails-reuse-passwords-found-in-disposable-inboxes

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.