Rumor has it Maggie Q is one of the latest victim of sextortion. Here is what may be her leaked pussy: –
Maggie Q Tiities Leaked
Maggie Q is American MILF actress, model, and one of the most popular animal rights activist. She is known for starring as Nikita in the action-thriller series âNikitaâ. She also starred as FBI agent and CIA Case Officer Hannah Wells in the political series, âDesignated Survivorâ. Maggie Q had roles in the action films âMission: Impossible IIIâ, âLive Free or Die Hardâ, and âPriestâ. She portrayed Tori Wu in the dystopian science-fiction action film, âDivergentâ, and reprised her role in the sequels, âInsurgentâ and âAllegiantâ. Maggie Q was engaged to her co-star Dylan McDermott. The couple have split after a four-year engagement. Next, she had dated Los Angeles businessman, Paul Alfonso. She has five tattoos. Also, she suffered temporary hearing loss in her right ear, when her eardrum was damaged during an explosive stunt.
Sextortionist whisks away your sex tapes using just your phone number
A 33-year-old businessman from Toronto got jumped by a sextortionist who got at his phoneâs sex tapes via SIM-swap fraud.
CBC News on Sunday reported that the victim, Randall Baran-Chong, knew trouble had come knocking when he got a message last week from his phone carrier about his phone service being cut off.
Baran-Chong said that around 3:30 a.m., he started to get emails warning about changes made to his Microsoft account: his password had been reset, and his email address had been removed as a verification method.
I knew things were about to go badly.
What followed: the attacker locked down his laptop, bought an Xbox video game gift card and charged it to Baran-Chongâs credit card, accessed his personal files, and threatened him with sextortion: all possible because whoever it was had stolen his mobile phone number.
How the crooks swing a SIM swap
As explained, SIM swap fraud, also known as phone-porting fraud, works because phone numbers are actually tied to the phoneâs SIM card â in fact, SIM is short for subscriber identity module, a special system-on-a-chip card that securely stores the cryptographic secret that identifies your phone number to the network.
Most mobile phone shops out there can issue and activate replacement SIM cards quickly, causing your old SIM to go dead and the new SIM card to take over your phone number⊠and your telephonic identity.
That comes in handy when you get a new phone or lose your phone: your phone carrier will be happy to sell you a new phone, with a new SIM, that has your old number.
But if a SIM-swap scammer can get enough information about you, they can just pretend theyâre you and then social-engineer that swap of your phone number to a new SIM card thatâs under their control.
By stealing your phone number, the crooks start receiving your text messages along with your phone calls, and if youâve set up SMS-based two-factor authentication (2FA), the crooks now have access to your 2FA codes â at least, until you notice that your phone has gone dead, and manage to convince your account providers that somebody else has hijacked your account.
Baran-Chong tried to do just that, but he wasnât able to get his number back until the following day.
The fraudster had managed to transfer Baran-Chongâs phone number to that of a prepaid customer with another carrier. According to CBC News, the fraudster apparently used âa password retrieval process involving text message verificationâ to gain access to Baran-Chongâs Microsoft account, which was tied to his computerâs operating system and to a cloud-based file backup service.
By the time Baran-Chong regained control of his accounts, the extortionist already had plenty of time to go through his cloud account content and threaten to release it.
Pay up, or Iâll drop the sex tapes
In one message, the fraudster threatened that if Baran-Chong didnât send two bitcoins (about $25,000), theyâd â[drop] your sex tapes to all of your coworkers, investors and relatives.â
Baran-Chong said that his cloud account had yearsâ worth of photos and videos. That includes tapes of what he said was consensual sex. He said that the women involved have already been informed of the breach.
Another threatening message included a scan of his passport, which he says he saved when applying for a travel visa, along with screen captures of the intimate videos the fraudster was threatening to release.
Baran-Chong said that he hasnât paid the ransom. Nor have the videos been sent to anybody he knows â at least, not yet. But itâs like living âunder the sword of Damocles,â he said: âItâs going to hang over my head for the rest of my life.â
The thin silver lining
There are two upsides to this attack: for one thing, the scumbag who did this to him also provoked Baran-Chongâs entrepreneurial creativity, he told CBC News:
The entrepreneur in me is saying, âThis person may have helped me start a new business,â because Iâm going to tell my story. I know the holes in the system, and there are two things Iâm determined to do: to create a business that protects anyone who is in this situation, and second is to create the legislation, the first of its kind in the world, starting with Canada, to essentially create a digital identity bill of rights.
We should be protected. Donât let the bullies win.
This is the second time this has happened to Baran-Chong. He says that his number was briefly stolen in June, but that no data was accessed after that first attack. The other silver lining is that his carrier, Rogers, is going to add some protection to stop these attacks.
After the first attack Baran-Chong did add a four-digit PIN to his account. The second time around, Rogers has offered to contact Baran-Chong if anybody tries to transfer his number again, and CBC News reports that Rogers is rolling out a text message notification service if thereâs a request to port a customerâs number, but as it stands, âCanadian cellphone users have limited options for safeguarding their number.â
What to do?
Limited options doesnât mean none, and we have tips that can help to protect you. Weâve handed them out far too often. Unfortunately, theyâre still fresh as daisies, since SIM swap fraud is still going strong, with crooks aiming high and low: recent celebrity SIM-jacking victims include British food writer and activist Jack Munroe, as well as Twitter CEO Jack Dorsey. Twitter actually turned off SMS texting soon after the @Jack-hijack, given that it was one of the possible ways Dorseyâs Twitter account got taken over by racist/anti-semitic/bomb-hoaxing hijackers in August 2019.
Hereâs our advice on how to avoid having your sex tapes whisked out from under you, or your bank account balance melt, or your Bitcoin wallet drain, as you stand by helplessly and watch it all go:
- Watch out for phishing emails or fake websites that crooks use to acquire your usernames and passwords in the first place. Generally speaking, SIM swap crooks need access to your text messages as a last step, meaning that theyâve already figured out your account number, username, password and so on.
- Avoid obvious answers to account security questions. Consider using a password manager to generate absurd and unguessable answers to the sort of questions that crooks might otherwise work out from your social media accounts. The crooks might guess that your first car was a Toyota, but theyâre much less likely to figure out that it was a
87X4TNETENNBA
. - Use an on-access (real-time) anti-virus and keep it up-to-date. One common way for crooks to figure out usernames and passwords is by means of keylogger malware, which lies low until you visit specific web pages such as your bankâs login page, then springs into action to record what you type while youâre logging on. A good real-time anti-virus will help you to block dangerous web links, infected email attachments and malicious downloads.
- Be suspicious if your phone drops back to âemergency calls onlyâ unexpectedly. Check with friends or colleagues on the same network to see if theyâre also having problems. If you need to, borrow a friendâs phone to contact your mobile provider to ask for help. Be prepared to attend a shop or service center in person if you can, and take ID and other evidence with you to back yourself up.
- Consider switching from SMS-based 2FA codes to codes generated by an authenticator app. This means the crooks have to steal your phone and figure out your lock code in order to access the app that generates your unique sequence of login codes.
Having said that, Naked Securityâs Paul Ducklin advises that we shouldnât think of switching from SMS to app-based authentication as a panacea:
Malware on your phone may be able to coerce the authenticator app into generating the next token without you realizing it â and canny scammers may even phone you up and try to trick you into reading out your next logon code, often pretending theyâre doing some sort of âfraud checkâ.