Join Trustwave at the 2023 Gartner Security & Risk Management Summit in London, September 26-28. Learn More

Join Trustwave at the 2023 Gartner Security & Risk Management Summit in London, September 26-28. Learn More

Managed Detection & Response

Eradicate cyberthreats with world-class intel and expertise

Managed Security Services

Expand your team’s capabilities and strengthen your security posture

Consulting & Professional Services

Tap into our global team of tenured cybersecurity specialists

Penetration Testing

Subscription- or project-based testing, delivered by global experts

Database Security

Get ahead of database risk, protect data and exceed compliance requirements

Email Security & Management

Catch email threats others miss with layered security & maximum control

Co-Managed SOC (SIEM)

Eliminate alert fatigue, focus your SecOps team, stop threats fast, and reduce cyber risk

Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
The Trustwave Approach
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Platform
SpiderLabs Fusion Center
Security Operations Centers
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

Fake CIA Sextortion Scam Uses SatoshiBox

Another round of sextortion scam emails with a pdf attachment were pushed out recently claiming to be from the Central Intelligence Agency (CIA). What's new in this batch of spams is that this is the first time we have seen the scammers use an online web platform in collecting the ransom.

The fake CIA sextortion email bodies have the same context as the spams mentioned in our previous sextortion scam blog. The ruse goes like this: because of the recipient’s supposed illegal activity, their personal information was compromised and the email sender managed to obtain it. The recipient must see the attached “proof” and pay the ransom or face arrest.

Figure 1: Fake CIA Sextortion scam email with attachment sample

The ZIP attachment is password protected and the password is provided the email body. Inside there is a PDF with <dd>-<yyyy>.pdf filename format. This PDF file “22-2019.pdf” contains a secured link to the supposed evidence which is hosted in

Figure 2: The PDF file “22-2019.pdf” inside the ZIP attachment contains the details of the sextortion and a link to a file in SatoshiBox[.]com.

SatoshiBox is a web-based platform wherein files can be bought and/or sold for Bitcoins. The seller must upload the file to the server, set its price in dollars, and provide the Bitcoin address where the profit will be sent. SatoshiBox will then provide the Bitcoin equivalent of the file’s price and generate a unique Bitcoin address in which the buyer must use. The file can be downloaded, and the seller will get his profit once the payment is done. The buyer has no way of previewing the content of the file other than purchasing it.

In this scam, the supposed evidence “” is hosted in Once “BUY for $500” button is clicked, the equivalent Bitcoin value of $500 and the newly generated Bitcoin address will pop up. Note that in the pdf attachment, the scammer is asking for $5000 ransom whereas the value of the evidence posted is only $500.

Figure 3: The evidence “” pertained in this scam is hosted in and its price is 500 dollars.
Figure 4: The value of “” in Bitcoin as of this writing is 0.12529789.

It seems that the scammers behind this campaign are eager to victimize more people as they are trying to make the emails scarier and the payment of the ransom easier. Also, aside from SatoshiBox, there are more websites offering hosting and selling files for Bitcoin which they might use on their next set of spams. Thus, BEWARE! Do not fall for this trick. Ignore these kinds of emails and treat any such redirects to these kinds of bitcoin platforms as suspicious.