Webcam cyber-sextortionist preyed on over 200 women

Spying eye
A perverted hacker who spied upon more than 200 women via their webcams and microphones, after infecting their computers with malware, was arrested earlier this year by the FBI after a two year investigation.

The 31-year-old man broke into victims’ personal computers, and stole personal information. Threatening to share the private information with their parents and email contacts, the man pressured the young women (some of them still young teenagers) into providing him with risque pictures and videos.

The FBI’s Los Angeles cyber division, who investigated the case, described the case as a chilling example of “sextortion”.

According to a report on the FBI’s website, the attacks were spread by the hacker who posed as a young woman on a social networking website:

Sign up to our free newsletter.
Security news, advice, and tips.

In several instances, the hacker posed online as a young woman’s friend or sister and sent messages with attachments asking if the victim wanted to see a scary video. Because the messages appeared to be from a trusted source, the victims usually didn’t think twice about opening the attachment. When they did, the virus secretly installed itself, and the hacker had total control over their computers - including all files and folders, webcams, and microphones.

We’ ve seen many other cases in the past where innocent users’ webcams have been remotely controlled by hackers for sexual kicks.

In early 2005, for instance, Spanish authorities fined a student who took surreptitious movies of unsuspecting users, and arrested a 37-year-old man who spied on victims via a webcam while stealing banking information.

The following year, Adrian Ringland, from the British town of Ilkeston, Derbyshire, was sentenced to jail for ten years after admitting posing as a minor on internet chatrooms and using spyware to take explicit photographs via children’s webcams. And in 2008, a 27-year-old Canadian man was charged with using spyware to take over the webcams of women as young as 14 and coercing them into posing naked for him.

Pretty disgusting stuff I’m sure you’ll agree, and you can imagine how all the victims in these case must feel utterly violated by what happened to them.

But, in this latest investigation, there is a way for you to help. The FBI are asking for assistance in finding other victims of the sextortionist.

How can you help?

The hacker in the latest webcam-spying case used a variety of screen names and email addresses, which are listed below. The FBI asks that if you have information regarding the case (there may be other victims) to contact your nearest FBI office or submit a tip to them online.

Screen names:

  • gui_blt
  • Woods05
  • CoFfEkId014
  • ELEvatrHZrD03
  • Pimpcess03666
  • Your3name3here03
  • Bri23nice
  • Dmagecntr137
  • H2IOW14
  • ELEvATrhRZd03
  • Playgrl37
  • Your3name3here3
  • goldlion14
  • Hotchit13w

Email address:

There are some more details of this case on Gary Warner’s Cybercrime & Doing Time blog.

Young people’s PCs must be properly protected with the latest anti-virus software, security patches and firewalls. It is also essential that young people are taught how to behave safely online, to avoid being exploited by sick-minded hackers.

Thanks for helping, and stay safe online.

What have you taught your children about staying safe online? How easy has it been to take the issues of cyber-security seriously? Leave a comment below and let us know your thoughts.


Graham Cluley is an award-winning keynote speaker who has given presentations around the world about cybersecurity, hackers, and online privacy. A veteran of the computer security industry since the early 1990s, he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows, makes regular media appearances, and is the co-host of the popular "The AI Fix" and "Smashing Security" podcasts. Follow him on Bluesky, Mastodon, and Threads, or drop him an email.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.